The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Takaaki Mizuki: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki
    Necessary and Sufficient Numbers of Cards for the Transformation Protocol. [Citation Graph (0, 0)][DBLP]
    COCOON, 2004, pp:92-101 [Conf]
  2. Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
    Eulerian Secret Key Exchange. [Citation Graph (0, 0)][DBLP]
    COCOON, 1998, pp:349-360 [Conf]
  3. Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota
    Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:203-216 [Conf]
  4. Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
    Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:389-401 [Conf]
  5. Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
    Characterization of Optimal Key Set Protocols. [Citation Graph (0, 0)][DBLP]
    IFIP TCS, 2000, pp:273-285 [Conf]
  6. Kozo Banno, Shingo Orihara, Takaaki Mizuki, Takao Nishizeki
    Best Security Index for Digital Fingerprinting. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:398-412 [Conf]
  7. Takaaki Mizuki, Takao Nishizeki
    Necessary and Sufficient Numbers of Cards for Sharing Secret Keys on Hierarchical Groups. [Citation Graph (0, 0)][DBLP]
    ISAAC, 2001, pp:196-207 [Conf]
  8. Takaaki Mizuki, Taro Otagiri, Hideaki Sone
    Secure Computations in a Minimal Model Using Multiple-Valued ESOP Expressions. [Citation Graph (0, 0)][DBLP]
    TAMC, 2006, pp:547-554 [Conf]
  9. Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
    Characterization of optimal key set protocols. [Citation Graph (0, 0)][DBLP]
    Discrete Applied Mathematics, 2003, v:131, n:1, pp:213-236 [Journal]
  10. Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
    A complete characterization of a family of key exchange protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:2, pp:131-142 [Journal]
  11. Takaaki Mizuki, Yoshinori Kugimoto, Hideaki Sone
    Secure Multiparty Computations Using a Dial Lock. [Citation Graph (0, 0)][DBLP]
    TAMC, 2007, pp:499-510 [Conf]
  12. Takaaki Mizuki, Yoshinori Kugimoto, Hideaki Sone
    Secure Multiparty Computations Using the 15 Puzzle. [Citation Graph (0, 0)][DBLP]
    COCOA, 2007, pp:255-266 [Conf]

  13. Minimizing AND-EXOR Expressions for Multiple-Valued Two-Input Logic Functions. [Citation Graph (, )][DBLP]


  14. Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. [Citation Graph (, )][DBLP]


  15. Six-Card Secure AND and Four-Card Secure XOR. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002