|
Search the dblp DataBase
Takaaki Mizuki:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Koichi Koizumi, Takaaki Mizuki, Takao Nishizeki
Necessary and Sufficient Numbers of Cards for the Transformation Protocol. [Citation Graph (0, 0)][DBLP] COCOON, 2004, pp:92-101 [Conf]
- Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
Eulerian Secret Key Exchange. [Citation Graph (0, 0)][DBLP] COCOON, 1998, pp:349-360 [Conf]
- Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota
Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion. [Citation Graph (0, 0)][DBLP] DRMTICS, 2005, pp:203-216 [Conf]
- Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1999, pp:389-401 [Conf]
- Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
Characterization of Optimal Key Set Protocols. [Citation Graph (0, 0)][DBLP] IFIP TCS, 2000, pp:273-285 [Conf]
- Kozo Banno, Shingo Orihara, Takaaki Mizuki, Takao Nishizeki
Best Security Index for Digital Fingerprinting. [Citation Graph (0, 0)][DBLP] Information Hiding, 2005, pp:398-412 [Conf]
- Takaaki Mizuki, Takao Nishizeki
Necessary and Sufficient Numbers of Cards for Sharing Secret Keys on Hierarchical Groups. [Citation Graph (0, 0)][DBLP] ISAAC, 2001, pp:196-207 [Conf]
- Takaaki Mizuki, Taro Otagiri, Hideaki Sone
Secure Computations in a Minimal Model Using Multiple-Valued ESOP Expressions. [Citation Graph (0, 0)][DBLP] TAMC, 2006, pp:547-554 [Conf]
- Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
Characterization of optimal key set protocols. [Citation Graph (0, 0)][DBLP] Discrete Applied Mathematics, 2003, v:131, n:1, pp:213-236 [Journal]
- Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki
A complete characterization of a family of key exchange protocols. [Citation Graph (0, 0)][DBLP] Int. J. Inf. Sec., 2002, v:1, n:2, pp:131-142 [Journal]
- Takaaki Mizuki, Yoshinori Kugimoto, Hideaki Sone
Secure Multiparty Computations Using a Dial Lock. [Citation Graph (0, 0)][DBLP] TAMC, 2007, pp:499-510 [Conf]
- Takaaki Mizuki, Yoshinori Kugimoto, Hideaki Sone
Secure Multiparty Computations Using the 15 Puzzle. [Citation Graph (0, 0)][DBLP] COCOA, 2007, pp:255-266 [Conf]
Minimizing AND-EXOR Expressions for Multiple-Valued Two-Input Logic Functions. [Citation Graph (, )][DBLP]
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. [Citation Graph (, )][DBLP]
Six-Card Secure AND and Four-Card Secure XOR. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|