The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuichi Komano: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yuichi Komano, Kazuo Ohta
    Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:366-382 [Conf]
  2. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
    Toward the Fair Anonymous Signatures: Deniable Ring Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:174-191 [Conf]
  3. Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro
    Provably Secure Electronic Cash Based on Blind Multisignature Schemes. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:236-250 [Conf]
  4. Yuichi Komano, Kazuo Ohta
    Taxonomic Consideration to OAEP Variants and Their Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:105-117 [Conf]
  5. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
    Formal Security Model of Multisignatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:146-160 [Conf]
  6. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
    On the Security of Probabilistic Multisignature Schemes and Their Optimality. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:132-150 [Conf]
  7. Norio Adachi, Yuichi Komano, Satoshi Aoki, Kazuo Ohta
    The Security Problems of Rivest and Shamir's PayWord Scheme. [Citation Graph (0, 0)][DBLP]
    CEC, 2003, pp:20-23 [Conf]
  8. Norio Adachi, Satoshi Aoki, Yuichi Komano, Kazuo Ohta
    Solutions to Security Problems of Rivest and Shamir's PayWord Scheme. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:195-202 [Journal]
  9. Yuichi Komano, Kazuo Ohta
    OAEP-ES - Methodology of Universal Padding Technique. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:110-119 [Journal]

  10. Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. [Citation Graph (, )][DBLP]


  11. Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. [Citation Graph (, )][DBLP]


Search in 0.403secs, Finished in 0.404secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002