Search the dblp DataBase
Hideki Imai :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yang Cui , Kazukuni Kobara , Hideki Imai On Achieving Chosen Ciphertext Security with Decryption Errors. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:173-182 [Conf ] Marc P. C. Fossorier , Miodrag J. Mihaljevic , Hideki Imai Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications. [Citation Graph (0, 0)][DBLP ] AAECC, 1999, pp:282-293 [Conf ] Manabu Hagiwara , Goichiro Hanaoka , Hideki Imai A Short Random Fingerprinting Code Against a Small Number of Pirates. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:193-202 [Conf ] Goichiro Hanaoka , Yumiko Hanaoka , Manabu Hagiwara , Hajime Watanabe , Hideki Imai Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:154-162 [Conf ] Hideki Imai Multivariate polynomials in coding theory. [Citation Graph (0, 0)][DBLP ] AAECC, 1984, pp:36-60 [Conf ] Hideki Imai , Tsutomu Matsumoto Algebraic Methods for Constructing Asymmetric Cryptosystems. [Citation Graph (0, 0)][DBLP ] AAECC, 1985, pp:108-119 [Conf ] Hideki Imai , Tsutomu Matsumoto Coding Theory and its Applications in Japan. [Citation Graph (0, 0)][DBLP ] AAECC, 1987, pp:301-305 [Conf ] Ryuji Kohno , Choonsik Yim , Hideki Imai Trellis Coded Modulation Based on Time-Varying Mapping and Encoders for Utilitzing a Channel Intersymbol Interference. [Citation Graph (0, 0)][DBLP ] AAECC, 1990, pp:132-143 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:203-214 [Conf ] Anderson C. A. Nascimento , Akira Otsuka , Hideki Imai , Jörn Müller-Quade Unconditionally Secure Homomorphic Pre-distributed Commitments. [Citation Graph (0, 0)][DBLP ] AAECC, 2003, pp:87-97 [Conf ] Yuichi Saitoh , Hideki Imai Constructions of Codes Correcting Burst Asymmetric Errors. [Citation Graph (0, 0)][DBLP ] AAECC, 1990, pp:59-70 [Conf ] Yuichi Saitoh , Hideki Imai Random and Byte Error Correcting Codes for Asymmetric or Undirectional Error Control. [Citation Graph (0, 0)][DBLP ] AAECC, 1991, pp:403-413 [Conf ] Yuichi Saitoh , Ikuyo Ibe , Hideki Imai Peak-Shift and Bit Error-Correction with Channel Side Information in Runlength-Limited Sequences. [Citation Graph (0, 0)][DBLP ] AAECC, 1993, pp:304-315 [Conf ] Kazuhiko Yamaguchi , Hideki Imai A Study on Imai-Hirakawa Trellis-Coded Modulation Schemes. [Citation Graph (0, 0)][DBLP ] AAECC, 1988, pp:443-453 [Conf ] Kazuhiko Yamaguchi , Hideki Imai Periodic Sequences for Absolute Type Shaft Encoders. [Citation Graph (0, 0)][DBLP ] AAECC, 1990, pp:36-45 [Conf ] Peng Yang 0002 , Takashi Kitagawa , Goichiro Hanaoka , Rui Zhang 0002 , Kanta Matsuura , Hideki Imai Applying Fujisaki-Okamoto to Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:183-192 [Conf ] Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai Duality between Two Cryptographic Primitives. [Citation Graph (0, 0)][DBLP ] AAECC, 1990, pp:379-390 [Conf ] Goichiro Hanaoka , Yuliang Zheng , Hideki Imai LITESET: A Light-Weight Secure Electronic Transaction Protocol. [Citation Graph (0, 0)][DBLP ] ACISP, 1998, pp:215-226 [Conf ] Masayuki Abe , Yang Cui , Hideki Imai , Kaoru Kurosawa Tag-KEM from Set Partial Domain One-Way Permutations. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:360-370 [Conf ] Masayuki Abe , Hideki Imai Flaws in Some Robust Optimistic Mix-Nets. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:39-50 [Conf ] Jun Furukawa , Hideki Imai An Efficient Group Signature Scheme from Bilinear Maps. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:455-467 [Conf ] Takashi Kitagawa , Peng Yang 0002 , Goichiro Hanaoka , Rui Zhang 0002 , Hajime Watanabe , Kanta Matsuura , Hideki Imai Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:348-359 [Conf ] Goichiro Hanaoka , Hideki Imai , Jörn Müller-Quade , Anderson C. A. Nascimento , Akira Otsuka , Andreas Winter Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:62-73 [Conf ] Goichiro Hanaoka , Kazuto Ogawa , Itsuro Murota , Go Ohtake , Keigo Majima , Kimiyuki Oyamada , Seiichi Gohshi , Seiichi Namba , Hideki Imai Separating Encryption and Key Issuance in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:365-376 [Conf ] Kazuto Ogawa , Goichiro Hanaoka , Hideki Imai Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:123-135 [Conf ] Abdulrahman Alharby , Hideki Imai IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:192-205 [Conf ] Anderson C. A. Nascimento , Jörn Müller-Quade , Akira Otsuka , Goichiro Hanaoka , Hideki Imai Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:355-368 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:269-284 [Conf ] Rui Zhang 0002 , Jun Furukawa , Hideki Imai Short Signature and Universal Designated Verifier Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:483-498 [Conf ] Rui Zhang 0002 , Goichiro Hanaoka , Hideki Imai On the Security of Cryptosystems with All-or-Nothing Transform. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:76-90 [Conf ] Rui Zhang 0002 , Hideki Imai Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:96-110 [Conf ] Makoto Sugita , Kazukuni Kobara , Kazuhiro Uehara , Shuji Kubota , Hideki Imai Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:242-254 [Conf ] Jian Wang , Miodrag J. Mihaljevic , Lein Harn , Hideki Imai A Hierarchical Key Management Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP ] ARCS, 2006, pp:422-434 [Conf ] Gwénolé Ars , Jean-Charles Faugère , Hideki Imai , Mitsuru Kawazoe , Makoto Sugita Comparison Between XL and Gröbner Basis Algorithms. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:338-353 [Conf ] Nuttapong Attrapadung , Jun Furukawa , Hideki Imai Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:161-177 [Conf ] Nuttapong Attrapadung , Hideki Imai Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:100-120 [Conf ] Nuttapong Attrapadung , Kazukuni Kobara , Hideki Imai Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:374-391 [Conf ] Manuel Cerecedo , Tsutomu Matsumoto , Hideki Imai Non-Interactive Generation of Shared Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:385-396 [Conf ] Yumiko Hanaoka , Goichiro Hanaoka , Junji Shikata , Hideki Imai Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2005, pp:495-514 [Conf ] Goichiro Hanaoka , Tsuyoshi Nishioka , Yuliang Zheng , Hideki Imai An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:348-362 [Conf ] Goichiro Hanaoka , Junji Shikata , Yumiko Hanaoka , Hideki Imai Unconditionally Secure Anonymous Encryption and Group Authentication. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:81-99 [Conf ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Unconditionally Secure Digital Signature Schemes Admitting Transferability. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:130-142 [Conf ] Kazukuni Kobara , Hideki Imai Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:185-195 [Conf ] Hideki Imai Information Security Aspects of Spread Spectrum Systems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:193-208 [Conf ] Hideki Imai , Atsuhiro Yamagishi CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:399-400 [Conf ] Tsutomu Matsumoto , Hideki Imai , Chi-Sung Laih , Sung-Ming Yen On Verifiable Implicit Asking Protocols for RSA Computation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:296-307 [Conf ] Tatsuyuki Matsushita , Hideki Imai A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2004, pp:260-275 [Conf ] Junji Shikata , Yuliang Zheng , Joe Suzuki , Hideki Imai Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:86-102 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai Leakage-Resilient Authenticated Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:155-172 [Conf ] Chaosheng Shu , Tsutomu Matsumoto , Hideki Imai A Multi-Purpose Proof System - for Identity and Membership Proofs. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:397-411 [Conf ] Makoto Sugita , Kazukuni Kobara , Hideki Imai Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:193-207 [Conf ] Nuttapong Attrapadung , Jun Furukawa , Takeshi Gomi , Goichiro Hanaoka , Hideki Imai , Rui Zhang 0002 Efficient Identity-Based Encryption with Tight Security Reduction. [Citation Graph (0, 0)][DBLP ] CANS, 2006, pp:19-36 [Conf ] Kunihiko Miyazaki , Goichiro Hanaoka , Hideki Imai Digitally signed document sanitizing scheme based on bilinear maps. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:343-354 [Conf ] Yuji Watanabe , Hideki Imai Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:80-86 [Conf ] Rui Zhang 0002 , Hideki Imai Improvements on Security Proofs of Some Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP ] CISC, 2005, pp:28-41 [Conf ] Kwangjo Kim , Tsutomu Matsumoto , Hideki Imai A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:564-574 [Conf ] Tsutomu Matsumoto , Hideki Imai On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:185-193 [Conf ] Tsutomu Matsumoto , Koki Kato , Hideki Imai Speeding Up Secret Computations with Insecure Auxiliary Devices. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:497-506 [Conf ] Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:461-480 [Conf ] Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai Structural Properties of One-way Hash Functions. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:285-302 [Conf ] Yang Cui , Kazukuni Kobara , Hideki Imai A Generic Conversion with Optimal Redundancy. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2005, pp:104-117 [Conf ] Anderson C. A. Nascimento , Jörn Müller-Quade , Hideki Imai Bit String Commitment Reductions with a Non-zero Rate. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:179-193 [Conf ] Yuji Watanabe , Goichiro Hanaoka , Hideki Imai Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2001, pp:392-407 [Conf ] Nuttapong Attrapadung , Kazukuni Kobara , Hideki Imai Broadcast encryption with short keys and transmissions. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:55-66 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai Security Weaknesses of Certain Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:228-245 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. [Citation Graph (0, 0)][DBLP ] DRMTICS, 2005, pp:258-276 [Conf ] Ryuichi Harasawa , Junji Shikata , Joe Suzuki , Hideki Imai Comparing the MOV and FR Reductions in Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1999, pp:190-205 [Conf ] Keiichi Iwamura , Tsutomu Matsumoto , Hideki Imai High-Speed Implementation Methods for RSA Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:221-238 [Conf ] Keiichi Iwamura , Tsutomu Matsumoto , Hideki Imai Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:477-481 [Conf ] Tsutomu Matsumoto , Hideki Imai Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:419-453 [Conf ] Junji Shikata , Goichiro Hanaoka , Yuliang Zheng , Hideki Imai Security Notions for Unconditionally Secure Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2002, pp:434-449 [Conf ] Yuliang Zheng , Tsutomu Matsumoto , Hideki Imai Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:412-422 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2005, pp:191-205 [Conf ] Markus Breitbach , Hideki Imai On Channel Capacity and Modulation of Watermarks in Digital Still Images. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 1999, pp:125-139 [Conf ] Susumu Suzuki , Hideki Imai On Optimal Partition of a Query Set into Subsets Having the Consecutive Retrieval Property. [Citation Graph (0, 0)][DBLP ] FODO, 1981, pp:75-97 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:196-212 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai Fast Correlation Attack Algorithm with List Decoding and an Application. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:196-210 [Conf ] Jun Furukawa , Kaoru Kurosawa , Hideki Imai An Efficient Compiler from Sigma -Protocol to 2-Move Deniable Zero-Knowledge. [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:46-57 [Conf ] Kanta Matsuura , Hideki Imai Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal. [Citation Graph (0, 0)][DBLP ] ICEIS, 2002, pp:962-967 [Conf ] Yumiko Hanaoka , Goichiro Hanaoka , Junji Shikata , Hideki Imai Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:85-96 [Conf ] Goichiro Hanaoka , Tsuyoshi Nishioka , Yuliang Zheng , Hideki Imai Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:157-168 [Conf ] Yang Cui , Kazukuni Kobara , Hideki Imai Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:269-279 [Conf ] Kazukuni Kobara , Hideki Imai Self-synchronized message randomization methods for subliminal channels. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:325-334 [Conf ] Kazukuni Kobara , Hideki Imai On the Channel Capacity of Narrow-Band Subliminal Channels. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:309-323 [Conf ] Tatsuyuki Matsushita , Hideki Imai Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:92-111 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:375-387 [Conf ] Xian-Mo Zhang , Yuliang Zheng , Hideki Imai Duality of Boolean functions and its cryptographic significance. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:159-169 [Conf ] Kazukuni Kobara , Hideki Imai A successive carrier-transmission model for narrow-band subliminal channels. [Citation Graph (0, 0)][DBLP ] ICISC, 1998, pp:179-187 [Conf ] Jian Wang , Lein Harn , Hideki Imai Key Management for Multicast Fingerprinting. [Citation Graph (0, 0)][DBLP ] ICISS, 2005, pp:191-204 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:944-952 [Conf ] Andreas Winter , Anderson C. A. Nascimento , Hideki Imai Commitment Capacity of Discrete Memoryless Channels. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:35-51 [Conf ] Marc P. C. Fossorier , Miodrag J. Mihaljevic , Hideki Imai , Yang Cui , Kanta Matsuura An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:48-62 [Conf ] Miodrag J. Mihaljevic , Marc P. C. Fossorier , Hideki Imai Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2005, pp:155-168 [Conf ] Ryo Nojima , Kazukuni Kobara , Hideki Imai Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:303-316 [Conf ] Yuliang Zheng , Hideki Imai Compact and Unforgeable Key Establishment over an ATM Network. [Citation Graph (0, 0)][DBLP ] INFOCOM, 1998, pp:411-418 [Conf ] Goichiro Hanaoka , Junji Shikata , Yumiko Hanaoka , Hideki Imai The Role of Arbiters in Asymmetric Authentication Schemes. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:428-441 [Conf ] Rie Shigetomi , Akira Otsuka , Takahide Ogawa , Hideki Imai An Anonymous Loan System Based on Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:244-256 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai An Authentication and Key Exchange Protocol for Secure Credential Services. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:443-458 [Conf ] Anderson C. A. Nascimento , Jörn Müller-Quade , Akira Otsuka , Goichiro Hanaoka , Hideki Imai Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. [Citation Graph (0, 0)][DBLP ] ISC, 2003, pp:151-164 [Conf ] Tsuyoshi Nishioka , Goichiro Hanaoka , Hideki Imai A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:259-270 [Conf ] Daisuke Nojiri , Goichiro Hanaoka , Hideki Imai A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:224-236 [Conf ] Yuji Watanabe , Hideki Imai Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:118-135 [Conf ] Shoko Yonezawa , Goichiro Hanaoka , Junji Shikata , Hideki Imai Traceability Schemes for Signed Documents. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:257-271 [Conf ] Nuttapong Attrapadung , Yang Cui , David Galindo , Goichiro Hanaoka , Ichiro Hasuo , Hideki Imai , Kanta Matsuura , Peng Yang 0002 , Rui Zhang 0002 Relations Among Notions of Security for Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP ] LATIN, 2006, pp:130-141 [Conf ] Abdulrahman Alharby , Hideki Imai Hybrid Intrusion Detection Model Based on Ordered Sequences. [Citation Graph (0, 0)][DBLP ] MMM-ACNS, 2005, pp:352-365 [Conf ] Hideki Imai Trends and Challenges for Securer Cryptography in Practice. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:1- [Conf ] Kazukuni Kobara , Hideki Imai Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:19-35 [Conf ] Kazukuni Kobara , Hideki Imai New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:237-251 [Conf ] Hirotaka Komaki , Yuji Watanabe , Goichiro Hanaoka , Hideki Imai Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:225-239 [Conf ] Goichiro Hanaoka , Yumiko Hanaoka , Hideki Imai Parallel Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2006, pp:105-122 [Conf ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:64-79 [Conf ] Miodrag J. Mihaljevic , Yuliang Zheng , Hideki Imai A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1998, pp:217-233 [Conf ] Yuji Watanabe , Hideki Imai Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 1999, pp:290-305 [Conf ] Yodai Watanabe , Junji Shikata , Hideki Imai Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:71-84 [Conf ] Rui Zhang 0002 , Goichiro Hanaoka , Junji Shikata , Hideki Imai On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2004, pp:360-374 [Conf ] Paul Camion , Miodrag J. Mihaljevic , Hideki Imai Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2002, pp:196-213 [Conf ] Miodrag J. Mihaljevic , Hideki Imai The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:310-323 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai A Secure Network Storage System with Information Privacy. [Citation Graph (0, 0)][DBLP ] WEWoRC, 2005, pp:22-31 [Conf ] Mira Kim , Kazukuni Kobara , Hideki Imai Dynamic Fingerprinting over Broadcast Using Revocation Scheme. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:251-263 [Conf ] Kanta Matsuura , Yuliang Zheng , Hideki Imai Compact and Flexible Resolution of CBT Multicast Key-Distribution. [Citation Graph (0, 0)][DBLP ] WWCA, 1998, pp:190-205 [Conf ] Thi Lan Anh Phan , Yumiko Hanaoka , Goichiro Hanaoka , Kanta Matsuura , Hideki Imai Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:366-384 [Conf ] Haruhiro Yoshimoto , Rie Shigetomi , Hideki Imai How to Protect Peer-to-Peer Online Games from Cheats. [Citation Graph (0, 0)][DBLP ] CIG, 2005, pp:- [Conf ] Goichiro Hanaoka , Tsuyoshi Nishioka , Yuliang Zheng , Hideki Imai A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. [Citation Graph (0, 0)][DBLP ] Comput. J., 2002, v:45, n:3, pp:293-303 [Journal ] Goichiro Hanaoka , Junji Shikata , Yumiko Hanaoka , Hideki Imai Unconditionally Secure Anonymous Encryption and Group Authentication. [Citation Graph (0, 0)][DBLP ] Comput. J., 2006, v:49, n:3, pp:310-321 [Journal ] Jörn Müller-Quade , Hideki Imai Anonymous Oblivious Transfer [Citation Graph (0, 0)][DBLP ] CoRR, 2000, v:0, n:, pp:- [Journal ] Jörn Müller-Quade , Hideki Imai More Robust Multiparty Protocols with Oblivious Transfer [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Kazukuni Kobara , Hideki Imai Pretty-Simple Password-Authenticated Key-Exchange Protocol [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Andreas Winter , Anderson C. A. Nascimento , Hideki Imai Commitment Capacity of Discrete Memoryless Channels [Citation Graph (0, 0)][DBLP ] CoRR, 2003, v:0, n:, pp:- [Journal ] Xian-Mo Zhang , Yuliang Zheng , Hideki Imai Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. [Citation Graph (0, 0)][DBLP ] Des. Codes Cryptography, 2000, v:19, n:1, pp:45-63 [Journal ] Hideki Imai A Theory of Two-Dimensional Cyclic Codes [Citation Graph (0, 0)][DBLP ] Information and Control, 1977, v:34, n:1, pp:1-21 [Journal ] Goichiro Hanaoka , Kazuto Ogawa , Itsuro Murota , Go Ohtake , Keigo Majima , Seiichi Gohshi , Kimiyuki Oyamada , Seiichi Namba , Hideki Imai Managing Encryption and Key Publication Independently in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:160-172 [Journal ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Efficient Unconditionally Secure Digital Signatures. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:120-130 [Journal ] Kunihiko Miyazaki , Mitsuru Iwamura , Tsutomu Matsumoto , Ryôichi Sasaki , Hiroshi Yoshiura , Satoru Tezuka , Hideki Imai Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:239-246 [Journal ] Yuliang Zheng , Hideki Imai How to Construct Efficient Signcryption Schemes on Elliptic Curves. [Citation Graph (0, 0)][DBLP ] Inf. Process. Lett., 1998, v:68, n:5, pp:227-233 [Journal ] Ryuji Kohno , Hideki Imai , Mitsutoshi Hatori , Subbarayan Pasupathy Combination of an Adaptive Array Antenna and a Canceller of Interference for Direct-Sequence Spread-Spectrum Multiple-Access System. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1990, v:8, n:4, pp:675-681 [Journal ] Ryuji Kohno , Hideki Imai , Mitsutoshi Hatori , Subbarayan Pasupathy An Adaptive Canceller of Cochannel Interference for Spread-Spectrum Multiple-Access Communication Networks in a Power Line. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1990, v:8, n:4, pp:691-699 [Journal ] Young C. Yoon , Ryuji Kohno , Hideki Imai A Spread-Spectrum Multiaccess System with Cochannel Interference Cancellation for Multipath Fading Channels. [Citation Graph (0, 0)][DBLP ] IEEE Journal on Selected Areas in Communications, 1993, v:11, n:7, pp:1067-1075 [Journal ] Keiichi Iwamura , Yasunori Dohi , Hideki Imai A Design of Reed-Solomon Decoder with Systolic Array Structure. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1995, v:44, n:1, pp:118-122 [Journal ] Hirokazu Okano , Hideki Imai A Construction Method of High-Speed Decoders Using ROMS's for Bose-Chaudhuri-Hocquenghem and Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1987, v:36, n:10, pp:1165-1171 [Journal ] Yuichi Saitoh , Hideki Imai Some Codes for Correcting and Detecting Unidirectional Byte Errors. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 1993, v:42, n:5, pp:547-552 [Journal ] Motohiko Isaka , Marc P. C. Fossorier , Hideki Imai On the suboptimality of iterative decoding for turbo-like and LDPC codes with cycles in their graph representation. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2004, v:52, n:5, pp:845-854 [Journal ] Tadashi Minowa , Hideki Ochiai , Hideki Imai Phase-noise effects on turbo trellis-coded over M-ary coherent channels. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Communications, 2004, v:52, n:8, pp:1333-1343 [Journal ] Yuliang Zheng , Xian-Mo Zhang , Hideki Imai Restriction, Terms and Nonlinearity of Boolean Functions. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 1999, v:226, n:1-2, pp:207-223 [Journal ] P. CharnKeitKong , Hideki Imai , Kazuhiko Yamaguchi On classes of rate k/(k+1) convolutional codes and their decoding techniques. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1996, v:42, n:6, pp:2181-2193 [Journal ] Hideki Imai , Hiroshi Fujiya Generalized tensor product codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1981, v:27, n:2, pp:181-186 [Journal ] Kazukuni Kobara , Hideki Imai On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2003, v:49, n:12, pp:3160-3168 [Journal ] Yuichi Saitoh , Hideki Imai Multiple unidirectional byte error-correcting codes. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1991, v:37, n:3, pp:903-0 [Journal ] Yuichi Saitoh , Hideki Imai Generalized concatenated codes for channels where unidirectional byte errors are predominant. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1993, v:39, n:3, pp:1014-1022 [Journal ] Yuichi Saitoh , Kazuhiko Yamaguchi , Hideki Imai Some new binary codes correcting asymmetric/unidirectional errors. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 1990, v:36, n:3, pp:645-0 [Journal ] Marc P. C. Fossorier , Kazukuni Kobara , Hideki Imai Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:402-411 [Journal ] Ronald Cramer , Goichiro Hanaoka , Dennis Hofheinz , Hideki Imai , Eike Kiltz , Rafael Pass , Abhi Shelat , Vinod Vaikuntanathan Bounded CCA2-Secure Encryption. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:502-518 [Conf ] Rui Zhang 0002 , Hideki Imai Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. [Citation Graph (0, 0)][DBLP ] CANS, 2007, pp:159-174 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:767-777 [Conf ] Makoto Sugita , Mitsuru Kawazoe , Ludovic Perret , Hideki Imai Algebraic Cryptanalysis of 58-Round SHA-1. [Citation Graph (0, 0)][DBLP ] FSE, 2007, pp:349-365 [Conf ] Masashi Une , Akira Otsuka , Hideki Imai Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems. [Citation Graph (0, 0)][DBLP ] ICB, 2007, pp:396-406 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:444-458 [Conf ] Takahiro Matsuda , Goichiro Hanaoka , Kanta Matsuura , Hideki Imai A Practical Provider Authentication System for Bidirectional Broadcast Service. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:967-974 [Conf ] Kazuto Ogawa , Goichiro Hanaoka , Kazukuni Kobara , Kanta Matsuura , Hideki Imai Anonymous Pay-TV System with Secure Revenue Sharing. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:984-991 [Conf ] Takahiro Matsuda , Nuttapong Attrapadung , Goichiro Hanaoka , Kanta Matsuura , Hideki Imai A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. [Citation Graph (0, 0)][DBLP ] ProvSec, 2007, pp:68-84 [Conf ] Yang Cui , Eiichiro Fujisaki , Goichiro Hanaoka , Hideki Imai , Rui Zhang 0002 Formal Security Treatments for Signatures from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP ] ProvSec, 2007, pp:218-227 [Conf ] SeongHan Shin , Hanane Fathi , Mohamed Imine , Kazukuni Kobara , Neeli R. Prasad , Hideki Imai A New Security Architecture for Personal Networks. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Koji Nuida , Manabu Hagiwara , Hajime Watanabe , Hideki Imai Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature [Citation Graph (0, 0)][DBLP ] CoRR, 2006, v:0, n:, pp:- [Journal ] Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. [Citation Graph (, )][DBLP ] Bounds on the Number of Users for Random 2-Secure Codes. [Citation Graph (, )][DBLP ] An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths. [Citation Graph (, )][DBLP ] On the Key-Privacy Issue of McEliece Public-Key Encryption. [Citation Graph (, )][DBLP ] Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. [Citation Graph (, )][DBLP ] Dual-Policy Attribute Based Encryption. [Citation Graph (, )][DBLP ] A generic construction of useful client puzzles. [Citation Graph (, )][DBLP ] Orthogonality between Key Privacy and Data Privacy, Revisited. [Citation Graph (, )][DBLP ] Strong Anonymous Signatures. [Citation Graph (, )][DBLP ] A security framework for personal networks. [Citation Graph (, )][DBLP ] A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems. [Citation Graph (, )][DBLP ] An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. [Citation Graph (, )][DBLP ] An Efficient Aggregate Shuffle Argument Scheme. [Citation Graph (, )][DBLP ] A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results. [Citation Graph (, )][DBLP ] Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. [Citation Graph (, )][DBLP ] A Novel Quaternion Design Construction For STBC. [Citation Graph (, )][DBLP ] Efficient and Adaptively Secure Append-Only Signature. [Citation Graph (, )][DBLP ] An Image Sanitizing Scheme Using Digital Watermarking. [Citation Graph (, )][DBLP ] Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. [Citation Graph (, )][DBLP ] Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount. [Citation Graph (, )][DBLP ] Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. [Citation Graph (, )][DBLP ] Trade-Off Traitor Tracing. [Citation Graph (, )][DBLP ] Generic Construction of Stateful Identity Based Encryption. [Citation Graph (, )][DBLP ] Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. [Citation Graph (, )][DBLP ] Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack. [Citation Graph (, )][DBLP ] A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services. [Citation Graph (, )][DBLP ] Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. [Citation Graph (, )][DBLP ] Conjunctive Broadcast and Attribute-Based Encryption. [Citation Graph (, )][DBLP ] New Attestation Based Security Architecture for In-Vehicle Communication. [Citation Graph (, )][DBLP ] Anonymous authentication scheme for XML security standard with Refreshable Tokens. [Citation Graph (, )][DBLP ] Lightweight broadcast authentication protocols reconsidered. [Citation Graph (, )][DBLP ] A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks. [Citation Graph (, )][DBLP ] Unconditionally Secure Electronic Voting. [Citation Graph (, )][DBLP ] Error-correcting codes and cryptography. [Citation Graph (, )][DBLP ] Protocols for purpose-restricted anonymous communications in IP-based wireless networks. [Citation Graph (, )][DBLP ] An approach for stream ciphers design based on joint computing over random and secret data. [Citation Graph (, )][DBLP ] A Secure Traitor Tracing Scheme against Key Exposure [Citation Graph (, )][DBLP ] Theoretical framework for constructing matching algorithms in biometric authentication systems [Citation Graph (, )][DBLP ] Quantum Error Correction beyond the Bounded Distance Decoding Limit [Citation Graph (, )][DBLP ] Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference. [Citation Graph (, )][DBLP ] Semantic security for the McEliece cryptosystem without random oracles. [Citation Graph (, )][DBLP ] An improvement of discrete Tardos fingerprinting codes. [Citation Graph (, )][DBLP ] Efficient hybrid encryption from ID-based encryption. [Citation Graph (, )][DBLP ] Search in 0.013secs, Finished in 0.021secs