![]() |
| 2008 | ||
|---|---|---|
| 4 | EE | Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptography 49(1-3): 289-305 (2008) |
| 2006 | ||
| 3 | EE | Ryo Nojima, Kazukuni Kobara, Hideki Imai: Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. INDOCRYPT 2006: 303-316 |
| 2005 | ||
| 2 | EE | Ryo Nojima, Yuichi Kaji: Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method. IEICE Transactions 88-A(1): 189-194 (2005) |
| 1 | EE | Ryo Nojima, Yuichi Kaji: Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption. IEICE Transactions 88-A(2): 568-574 (2005) |
| 1 | Hideki Imai | [3] [4] |
| 2 | Yuichi Kaji | [1] [2] |
| 3 | Kazukuni Kobara | [3] [4] |
| 4 | Kirill Morozov | [4] |