2008 | ||
---|---|---|
4 | EE | Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptography 49(1-3): 289-305 (2008) |
2006 | ||
3 | EE | Ryo Nojima, Kazukuni Kobara, Hideki Imai: Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. INDOCRYPT 2006: 303-316 |
2005 | ||
2 | EE | Ryo Nojima, Yuichi Kaji: Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method. IEICE Transactions 88-A(1): 189-194 (2005) |
1 | EE | Ryo Nojima, Yuichi Kaji: Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption. IEICE Transactions 88-A(2): 568-574 (2005) |
1 | Hideki Imai | [3] [4] |
2 | Yuichi Kaji | [1] [2] |
3 | Kazukuni Kobara | [3] [4] |
4 | Kirill Morozov | [4] |