The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Hideki Imai: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yang Cui, Kazukuni Kobara, Hideki Imai
    On Achieving Chosen Ciphertext Security with Decryption Errors. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:173-182 [Conf]
  2. Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai
    Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications. [Citation Graph (0, 0)][DBLP]
    AAECC, 1999, pp:282-293 [Conf]
  3. Manabu Hagiwara, Goichiro Hanaoka, Hideki Imai
    A Short Random Fingerprinting Code Against a Small Number of Pirates. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:193-202 [Conf]
  4. Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai
    Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:154-162 [Conf]
  5. Hideki Imai
    Multivariate polynomials in coding theory. [Citation Graph (0, 0)][DBLP]
    AAECC, 1984, pp:36-60 [Conf]
  6. Hideki Imai, Tsutomu Matsumoto
    Algebraic Methods for Constructing Asymmetric Cryptosystems. [Citation Graph (0, 0)][DBLP]
    AAECC, 1985, pp:108-119 [Conf]
  7. Hideki Imai, Tsutomu Matsumoto
    Coding Theory and its Applications in Japan. [Citation Graph (0, 0)][DBLP]
    AAECC, 1987, pp:301-305 [Conf]
  8. Ryuji Kohno, Choonsik Yim, Hideki Imai
    Trellis Coded Modulation Based on Time-Varying Mapping and Encoders for Utilitzing a Channel Intersymbol Interference. [Citation Graph (0, 0)][DBLP]
    AAECC, 1990, pp:132-143 [Conf]
  9. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:203-214 [Conf]
  10. Anderson C. A. Nascimento, Akira Otsuka, Hideki Imai, Jörn Müller-Quade
    Unconditionally Secure Homomorphic Pre-distributed Commitments. [Citation Graph (0, 0)][DBLP]
    AAECC, 2003, pp:87-97 [Conf]
  11. Yuichi Saitoh, Hideki Imai
    Constructions of Codes Correcting Burst Asymmetric Errors. [Citation Graph (0, 0)][DBLP]
    AAECC, 1990, pp:59-70 [Conf]
  12. Yuichi Saitoh, Hideki Imai
    Random and Byte Error Correcting Codes for Asymmetric or Undirectional Error Control. [Citation Graph (0, 0)][DBLP]
    AAECC, 1991, pp:403-413 [Conf]
  13. Yuichi Saitoh, Ikuyo Ibe, Hideki Imai
    Peak-Shift and Bit Error-Correction with Channel Side Information in Runlength-Limited Sequences. [Citation Graph (0, 0)][DBLP]
    AAECC, 1993, pp:304-315 [Conf]
  14. Kazuhiko Yamaguchi, Hideki Imai
    A Study on Imai-Hirakawa Trellis-Coded Modulation Schemes. [Citation Graph (0, 0)][DBLP]
    AAECC, 1988, pp:443-453 [Conf]
  15. Kazuhiko Yamaguchi, Hideki Imai
    Periodic Sequences for Absolute Type Shaft Encoders. [Citation Graph (0, 0)][DBLP]
    AAECC, 1990, pp:36-45 [Conf]
  16. Peng Yang 0002, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang 0002, Kanta Matsuura, Hideki Imai
    Applying Fujisaki-Okamoto to Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:183-192 [Conf]
  17. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    Duality between Two Cryptographic Primitives. [Citation Graph (0, 0)][DBLP]
    AAECC, 1990, pp:379-390 [Conf]
  18. Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
    LITESET: A Light-Weight Secure Electronic Transaction Protocol. [Citation Graph (0, 0)][DBLP]
    ACISP, 1998, pp:215-226 [Conf]
  19. Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa
    Tag-KEM from Set Partial Domain One-Way Permutations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:360-370 [Conf]
  20. Masayuki Abe, Hideki Imai
    Flaws in Some Robust Optimistic Mix-Nets. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:39-50 [Conf]
  21. Jun Furukawa, Hideki Imai
    An Efficient Group Signature Scheme from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:455-467 [Conf]
  22. Takashi Kitagawa, Peng Yang 0002, Goichiro Hanaoka, Rui Zhang 0002, Hajime Watanabe, Kanta Matsuura, Hideki Imai
    Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:348-359 [Conf]
  23. Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas Winter
    Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:62-73 [Conf]
  24. Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai
    Separating Encryption and Key Issuance in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:365-376 [Conf]
  25. Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai
    Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:123-135 [Conf]
  26. Abdulrahman Alharby, Hideki Imai
    IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:192-205 [Conf]
  27. Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
    Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:355-368 [Conf]
  28. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:269-284 [Conf]
  29. Rui Zhang 0002, Jun Furukawa, Hideki Imai
    Short Signature and Universal Designated Verifier Signature Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:483-498 [Conf]
  30. Rui Zhang 0002, Goichiro Hanaoka, Hideki Imai
    On the Security of Cryptosystems with All-or-Nothing Transform. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:76-90 [Conf]
  31. Rui Zhang 0002, Hideki Imai
    Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:96-110 [Conf]
  32. Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai
    Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:242-254 [Conf]
  33. Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai
    A Hierarchical Key Management Approach for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    ARCS, 2006, pp:422-434 [Conf]
  34. Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita
    Comparison Between XL and Gröbner Basis Algorithms. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:338-353 [Conf]
  35. Nuttapong Attrapadung, Jun Furukawa, Hideki Imai
    Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:161-177 [Conf]
  36. Nuttapong Attrapadung, Hideki Imai
    Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:100-120 [Conf]
  37. Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
    Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:374-391 [Conf]
  38. Manuel Cerecedo, Tsutomu Matsumoto, Hideki Imai
    Non-Interactive Generation of Shared Pseudorandom Sequences. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:385-396 [Conf]
  39. Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:495-514 [Conf]
  40. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:348-362 [Conf]
  41. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    Unconditionally Secure Anonymous Encryption and Group Authentication. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:81-99 [Conf]
  42. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Unconditionally Secure Digital Signature Schemes Admitting Transferability. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:130-142 [Conf]
  43. Kazukuni Kobara, Hideki Imai
    Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:185-195 [Conf]
  44. Hideki Imai
    Information Security Aspects of Spread Spectrum Systems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:193-208 [Conf]
  45. Hideki Imai, Atsuhiro Yamagishi
    CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:399-400 [Conf]
  46. Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen
    On Verifiable Implicit Asking Protocols for RSA Computation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:296-307 [Conf]
  47. Tatsuyuki Matsushita, Hideki Imai
    A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2004, pp:260-275 [Conf]
  48. Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai
    Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:86-102 [Conf]
  49. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Leakage-Resilient Authenticated Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:155-172 [Conf]
  50. Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai
    A Multi-Purpose Proof System - for Identity and Membership Proofs. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:397-411 [Conf]
  51. Makoto Sugita, Kazukuni Kobara, Hideki Imai
    Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:193-207 [Conf]
  52. Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
    Efficient Identity-Based Encryption with Tight Security Reduction. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:19-36 [Conf]
  53. Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai
    Digitally signed document sanitizing scheme based on bilinear maps. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:343-354 [Conf]
  54. Yuji Watanabe, Hideki Imai
    Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:80-86 [Conf]
  55. Rui Zhang 0002, Hideki Imai
    Improvements on Security Proofs of Some Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    CISC, 2005, pp:28-41 [Conf]
  56. Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai
    A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:564-574 [Conf]
  57. Tsutomu Matsumoto, Hideki Imai
    On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:185-193 [Conf]
  58. Tsutomu Matsumoto, Koki Kato, Hideki Imai
    Speeding Up Secret Computations with Insecure Auxiliary Devices. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:497-506 [Conf]
  59. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:461-480 [Conf]
  60. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    Structural Properties of One-way Hash Functions. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:285-302 [Conf]
  61. Yang Cui, Kazukuni Kobara, Hideki Imai
    A Generic Conversion with Optimal Redundancy. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:104-117 [Conf]
  62. Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai
    Bit String Commitment Reductions with a Non-zero Rate. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:179-193 [Conf]
  63. Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
    Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:392-407 [Conf]
  64. Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
    Broadcast encryption with short keys and transmissions. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:55-66 [Conf]
  65. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Security Weaknesses of Certain Broadcast Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:228-245 [Conf]
  66. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. [Citation Graph (0, 0)][DBLP]
    DRMTICS, 2005, pp:258-276 [Conf]
  67. Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai
    Comparing the MOV and FR Reductions in Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1999, pp:190-205 [Conf]
  68. Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
    High-Speed Implementation Methods for RSA Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:221-238 [Conf]
  69. Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai
    Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:477-481 [Conf]
  70. Tsutomu Matsumoto, Hideki Imai
    Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:419-453 [Conf]
  71. Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai
    Security Notions for Unconditionally Secure Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2002, pp:434-449 [Conf]
  72. Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:412-422 [Conf]
  73. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:191-205 [Conf]
  74. Markus Breitbach, Hideki Imai
    On Channel Capacity and Modulation of Watermarks in Digital Still Images. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 1999, pp:125-139 [Conf]
  75. Susumu Suzuki, Hideki Imai
    On Optimal Partition of a Query Set into Subsets Having the Consecutive Retrieval Property. [Citation Graph (0, 0)][DBLP]
    FODO, 1981, pp:75-97 [Conf]
  76. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:196-212 [Conf]
  77. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Fast Correlation Attack Algorithm with List Decoding and an Application. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:196-210 [Conf]
  78. Jun Furukawa, Kaoru Kurosawa, Hideki Imai
    An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge. [Citation Graph (0, 0)][DBLP]
    ICALP (2), 2006, pp:46-57 [Conf]
  79. Kanta Matsuura, Hideki Imai
    Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal. [Citation Graph (0, 0)][DBLP]
    ICEIS, 2002, pp:962-967 [Conf]
  80. Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:85-96 [Conf]
  81. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:157-168 [Conf]
  82. Yang Cui, Kazukuni Kobara, Hideki Imai
    Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:269-279 [Conf]
  83. Kazukuni Kobara, Hideki Imai
    Self-synchronized message randomization methods for subliminal channels. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:325-334 [Conf]
  84. Kazukuni Kobara, Hideki Imai
    On the Channel Capacity of Narrow-Band Subliminal Channels. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:309-323 [Conf]
  85. Tatsuyuki Matsushita, Hideki Imai
    Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:92-111 [Conf]
  86. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:375-387 [Conf]
  87. Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
    Duality of Boolean functions and its cryptographic significance. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:159-169 [Conf]
  88. Kazukuni Kobara, Hideki Imai
    A successive carrier-transmission model for narrow-band subliminal channels. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:179-187 [Conf]
  89. Jian Wang, Lein Harn, Hideki Imai
    Key Management for Multicast Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:191-204 [Conf]
  90. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:944-952 [Conf]
  91. Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
    Commitment Capacity of Discrete Memoryless Channels. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2003, pp:35-51 [Conf]
  92. Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura
    An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:48-62 [Conf]
  93. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2005, pp:155-168 [Conf]
  94. Ryo Nojima, Kazukuni Kobara, Hideki Imai
    Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:303-316 [Conf]
  95. Yuliang Zheng, Hideki Imai
    Compact and Unforgeable Key Establishment over an ATM Network. [Citation Graph (0, 0)][DBLP]
    INFOCOM, 1998, pp:411-418 [Conf]
  96. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    The Role of Arbiters in Asymmetric Authentication Schemes. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:428-441 [Conf]
  97. Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai
    An Anonymous Loan System Based on Group Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:244-256 [Conf]
  98. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    An Authentication and Key Exchange Protocol for Secure Credential Services. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:443-458 [Conf]
  99. Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai
    Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:151-164 [Conf]
  100. Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai
    A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:259-270 [Conf]
  101. Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai
    A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:224-236 [Conf]
  102. Yuji Watanabe, Hideki Imai
    Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:118-135 [Conf]
  103. Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    Traceability Schemes for Signed Documents. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:257-271 [Conf]
  104. Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang 0002, Rui Zhang 0002
    Relations Among Notions of Security for Identity Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    LATIN, 2006, pp:130-141 [Conf]
  105. Abdulrahman Alharby, Hideki Imai
    Hybrid Intrusion Detection Model Based on Ordered Sequences. [Citation Graph (0, 0)][DBLP]
    MMM-ACNS, 2005, pp:352-365 [Conf]
  106. Hideki Imai
    Trends and Challenges for Securer Cryptography in Practice. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:1- [Conf]
  107. Kazukuni Kobara, Hideki Imai
    Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:19-35 [Conf]
  108. Kazukuni Kobara, Hideki Imai
    New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:237-251 [Conf]
  109. Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai
    Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:225-239 [Conf]
  110. Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai
    Parallel Key-Insulated Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:105-122 [Conf]
  111. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:64-79 [Conf]
  112. Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai
    A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:217-233 [Conf]
  113. Yuji Watanabe, Hideki Imai
    Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:290-305 [Conf]
  114. Yodai Watanabe, Junji Shikata, Hideki Imai
    Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:71-84 [Conf]
  115. Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai
    On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:360-374 [Conf]
  116. Paul Camion, Miodrag J. Mihaljevic, Hideki Imai
    Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:196-213 [Conf]
  117. Miodrag J. Mihaljevic, Hideki Imai
    The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:310-323 [Conf]
  118. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Secure Network Storage System with Information Privacy. [Citation Graph (0, 0)][DBLP]
    WEWoRC, 2005, pp:22-31 [Conf]
  119. Mira Kim, Kazukuni Kobara, Hideki Imai
    Dynamic Fingerprinting over Broadcast Using Revocation Scheme. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:251-263 [Conf]
  120. Kanta Matsuura, Yuliang Zheng, Hideki Imai
    Compact and Flexible Resolution of CBT Multicast Key-Distribution. [Citation Graph (0, 0)][DBLP]
    WWCA, 1998, pp:190-205 [Conf]
  121. Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:366-384 [Conf]
  122. Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
    How to Protect Peer-to-Peer Online Games from Cheats. [Citation Graph (0, 0)][DBLP]
    CIG, 2005, pp:- [Conf]
  123. Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai
    A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2002, v:45, n:3, pp:293-303 [Journal]
  124. Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai
    Unconditionally Secure Anonymous Encryption and Group Authentication. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2006, v:49, n:3, pp:310-321 [Journal]
  125. Jörn Müller-Quade, Hideki Imai
    Anonymous Oblivious Transfer [Citation Graph (0, 0)][DBLP]
    CoRR, 2000, v:0, n:, pp:- [Journal]
  126. Jörn Müller-Quade, Hideki Imai
    More Robust Multiparty Protocols with Oblivious Transfer [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  127. Kazukuni Kobara, Hideki Imai
    Pretty-Simple Password-Authenticated Key-Exchange Protocol [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  128. Andreas Winter, Anderson C. A. Nascimento, Hideki Imai
    Commitment Capacity of Discrete Memoryless Channels [Citation Graph (0, 0)][DBLP]
    CoRR, 2003, v:0, n:, pp:- [Journal]
  129. Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
    Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2000, v:19, n:1, pp:45-63 [Journal]
  130. Hideki Imai
    A Theory of Two-Dimensional Cyclic Codes [Citation Graph (0, 0)][DBLP]
    Information and Control, 1977, v:34, n:1, pp:1-21 [Journal]
  131. Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai
    Managing Encryption and Key Publication Independently in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:160-172 [Journal]
  132. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Efficient Unconditionally Secure Digital Signatures. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:120-130 [Journal]
  133. Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai
    Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:239-246 [Journal]
  134. Yuliang Zheng, Hideki Imai
    How to Construct Efficient Signcryption Schemes on Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1998, v:68, n:5, pp:227-233 [Journal]
  135. Ryuji Kohno, Hideki Imai, Mitsutoshi Hatori, Subbarayan Pasupathy
    Combination of an Adaptive Array Antenna and a Canceller of Interference for Direct-Sequence Spread-Spectrum Multiple-Access System. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1990, v:8, n:4, pp:675-681 [Journal]
  136. Ryuji Kohno, Hideki Imai, Mitsutoshi Hatori, Subbarayan Pasupathy
    An Adaptive Canceller of Cochannel Interference for Spread-Spectrum Multiple-Access Communication Networks in a Power Line. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1990, v:8, n:4, pp:691-699 [Journal]
  137. Young C. Yoon, Ryuji Kohno, Hideki Imai
    A Spread-Spectrum Multiaccess System with Cochannel Interference Cancellation for Multipath Fading Channels. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:7, pp:1067-1075 [Journal]
  138. Keiichi Iwamura, Yasunori Dohi, Hideki Imai
    A Design of Reed-Solomon Decoder with Systolic Array Structure. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1995, v:44, n:1, pp:118-122 [Journal]
  139. Hirokazu Okano, Hideki Imai
    A Construction Method of High-Speed Decoders Using ROMS's for Bose-Chaudhuri-Hocquenghem and Reed-Solomon Codes. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1987, v:36, n:10, pp:1165-1171 [Journal]
  140. Yuichi Saitoh, Hideki Imai
    Some Codes for Correcting and Detecting Unidirectional Byte Errors. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 1993, v:42, n:5, pp:547-552 [Journal]
  141. Motohiko Isaka, Marc P. C. Fossorier, Hideki Imai
    On the suboptimality of iterative decoding for turbo-like and LDPC codes with cycles in their graph representation. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2004, v:52, n:5, pp:845-854 [Journal]
  142. Tadashi Minowa, Hideki Ochiai, Hideki Imai
    Phase-noise effects on turbo trellis-coded over M-ary coherent channels. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Communications, 2004, v:52, n:8, pp:1333-1343 [Journal]
  143. Yuliang Zheng, Xian-Mo Zhang, Hideki Imai
    Restriction, Terms and Nonlinearity of Boolean Functions. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1999, v:226, n:1-2, pp:207-223 [Journal]
  144. P. CharnKeitKong, Hideki Imai, Kazuhiko Yamaguchi
    On classes of rate k/(k+1) convolutional codes and their decoding techniques. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1996, v:42, n:6, pp:2181-2193 [Journal]
  145. Hideki Imai, Hiroshi Fujiya
    Generalized tensor product codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1981, v:27, n:2, pp:181-186 [Journal]
  146. Kazukuni Kobara, Hideki Imai
    On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:12, pp:3160-3168 [Journal]
  147. Yuichi Saitoh, Hideki Imai
    Multiple unidirectional byte error-correcting codes. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1991, v:37, n:3, pp:903-0 [Journal]
  148. Yuichi Saitoh, Hideki Imai
    Generalized concatenated codes for channels where unidirectional byte errors are predominant. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1993, v:39, n:3, pp:1014-1022 [Journal]
  149. Yuichi Saitoh, Kazuhiko Yamaguchi, Hideki Imai
    Some new binary codes correcting asymmetric/unidirectional errors. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1990, v:36, n:3, pp:645-0 [Journal]
  150. Marc P. C. Fossorier, Kazukuni Kobara, Hideki Imai
    Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:402-411 [Journal]
  151. Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
    Bounded CCA2-Secure Encryption. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2007, pp:502-518 [Conf]
  152. Rui Zhang 0002, Hideki Imai
    Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. [Citation Graph (0, 0)][DBLP]
    CANS, 2007, pp:159-174 [Conf]
  153. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:767-777 [Conf]
  154. Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai
    Algebraic Cryptanalysis of 58-Round SHA-1. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:349-365 [Conf]
  155. Masashi Une, Akira Otsuka, Hideki Imai
    Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems. [Citation Graph (0, 0)][DBLP]
    ICB, 2007, pp:396-406 [Conf]
  156. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:444-458 [Conf]
  157. Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    A Practical Provider Authentication System for Bidirectional Broadcast Service. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:967-974 [Conf]
  158. Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai
    Anonymous Pay-TV System with Secure Revenue Sharing. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:984-991 [Conf]
  159. Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai
    A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:68-84 [Conf]
  160. Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang 0002
    Formal Security Treatments for Signatures from Identity-Based Encryption. [Citation Graph (0, 0)][DBLP]
    ProvSec, 2007, pp:218-227 [Conf]
  161. SeongHan Shin, Hanane Fathi, Mohamed Imine, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai
    A New Security Architecture for Personal Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]
  162. Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai
    Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature [Citation Graph (0, 0)][DBLP]
    CoRR, 2006, v:0, n:, pp:- [Journal]

  163. Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. [Citation Graph (, )][DBLP]


  164. Bounds on the Number of Users for Random 2-Secure Codes. [Citation Graph (, )][DBLP]


  165. An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths. [Citation Graph (, )][DBLP]


  166. On the Key-Privacy Issue of McEliece Public-Key Encryption. [Citation Graph (, )][DBLP]


  167. Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. [Citation Graph (, )][DBLP]


  168. Dual-Policy Attribute Based Encryption. [Citation Graph (, )][DBLP]


  169. A generic construction of useful client puzzles. [Citation Graph (, )][DBLP]


  170. Orthogonality between Key Privacy and Data Privacy, Revisited. [Citation Graph (, )][DBLP]


  171. Strong Anonymous Signatures. [Citation Graph (, )][DBLP]


  172. A security framework for personal networks. [Citation Graph (, )][DBLP]


  173. A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems. [Citation Graph (, )][DBLP]


  174. An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. [Citation Graph (, )][DBLP]


  175. An Efficient Aggregate Shuffle Argument Scheme. [Citation Graph (, )][DBLP]


  176. A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results. [Citation Graph (, )][DBLP]


  177. Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. [Citation Graph (, )][DBLP]


  178. A Novel Quaternion Design Construction For STBC. [Citation Graph (, )][DBLP]


  179. Efficient and Adaptively Secure Append-Only Signature. [Citation Graph (, )][DBLP]


  180. An Image Sanitizing Scheme Using Digital Watermarking. [Citation Graph (, )][DBLP]


  181. Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. [Citation Graph (, )][DBLP]


  182. Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount. [Citation Graph (, )][DBLP]


  183. Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. [Citation Graph (, )][DBLP]


  184. Trade-Off Traitor Tracing. [Citation Graph (, )][DBLP]


  185. Generic Construction of Stateful Identity Based Encryption. [Citation Graph (, )][DBLP]


  186. Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. [Citation Graph (, )][DBLP]


  187. Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack. [Citation Graph (, )][DBLP]


  188. A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services. [Citation Graph (, )][DBLP]


  189. Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. [Citation Graph (, )][DBLP]


  190. Conjunctive Broadcast and Attribute-Based Encryption. [Citation Graph (, )][DBLP]


  191. New Attestation Based Security Architecture for In-Vehicle Communication. [Citation Graph (, )][DBLP]


  192. Anonymous authentication scheme for XML security standard with Refreshable Tokens. [Citation Graph (, )][DBLP]


  193. Lightweight broadcast authentication protocols reconsidered. [Citation Graph (, )][DBLP]


  194. A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks. [Citation Graph (, )][DBLP]


  195. Unconditionally Secure Electronic Voting. [Citation Graph (, )][DBLP]


  196. Error-correcting codes and cryptography. [Citation Graph (, )][DBLP]


  197. Protocols for purpose-restricted anonymous communications in IP-based wireless networks. [Citation Graph (, )][DBLP]


  198. An approach for stream ciphers design based on joint computing over random and secret data. [Citation Graph (, )][DBLP]


  199. A Secure Traitor Tracing Scheme against Key Exposure [Citation Graph (, )][DBLP]


  200. Theoretical framework for constructing matching algorithms in biometric authentication systems [Citation Graph (, )][DBLP]


  201. Quantum Error Correction beyond the Bounded Distance Decoding Limit [Citation Graph (, )][DBLP]


  202. Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference. [Citation Graph (, )][DBLP]


  203. Semantic security for the McEliece cryptosystem without random oracles. [Citation Graph (, )][DBLP]


  204. An improvement of discrete Tardos fingerprinting codes. [Citation Graph (, )][DBLP]


  205. Efficient hybrid encryption from ID-based encryption. [Citation Graph (, )][DBLP]


Search in 0.072secs, Finished in 0.082secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002