Search the dblp DataBase
Masayuki Abe :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Masayuki Abe , Yang Cui , Hideki Imai , Kaoru Kurosawa Tag-KEM from Set Partial Domain One-Way Permutations. [Citation Graph (0, 0)][DBLP ] ACISP, 2006, pp:360-370 [Conf ] Masayuki Abe , Hideki Imai Flaws in Some Robust Optimistic Mix-Nets. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:39-50 [Conf ] Masayuki Abe , Masayuki Kanda A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:163-177 [Conf ] Masayuki Abe Mix-Networks on Permutation Networks. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:258-273 [Conf ] Masayuki Abe , Ronald Cramer , Serge Fehr Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:206-223 [Conf ] Masayuki Abe , Eiichiro Fujisaki How to Date Blind Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:244-251 [Conf ] Masayuki Abe , Hikaru Morita Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1994, pp:365-375 [Conf ] Masayuki Abe , Miyako Ohkubo Provably Secure Fair Blind Signatures with Tight Revocation. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:583-602 [Conf ] Masayuki Abe , Tatsuaki Okamoto A Signature Scheme with Message Recovery as Secure as Discrete Logarithm. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:378-389 [Conf ] Masayuki Abe , Miyako Ohkubo , Koutarou Suzuki 1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2002, pp:415-432 [Conf ] Miyako Ohkubo , Masayuki Abe A Length-Invariant Hybrid Mix. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2000, pp:178-191 [Conf ] Masayuki Abe Robust Distributed Multiplicaton with out Interaction. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1999, pp:130-147 [Conf ] Masayuki Abe , Serge Fehr Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2004, pp:317-334 [Conf ] Masayuki Abe , Tatsuaki Okamoto Provably Secure Partially Blind Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2000, pp:271-286 [Conf ] Masayuki Abe Securing "Encryption + Proof of Knowledge" in the Random Oracle Model. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:277-289 [Conf ] Masayuki Abe A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2001, pp:136-151 [Conf ] Masayuki Abe Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1998, pp:437-447 [Conf ] Masayuki Abe , Rosario Gennaro , Kaoru Kurosawa , Victor Shoup Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2005, pp:128-146 [Conf ] Masayuki Abe , Tatsuaki Okamoto Delegation Chains Secure up to Constant Length. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:144-156 [Conf ] Masayuki Abe , Koutarou Suzuki Receipt-Free Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP ] ISC, 2002, pp:191-199 [Conf ] Fumitaka Hoshino , Masayuki Abe , Tetsutaro Kobayashi Lenient/Strict Batch Verification in Several Groups. [Citation Graph (0, 0)][DBLP ] ISC, 2001, pp:81-94 [Conf ] Miyako Ohkubo , Fumiaki Miura , Masayuki Abe , Atsushi Fujioka , Tatsuaki Okamoto An Improvement on a Practical Secret Voting Scheme. [Citation Graph (0, 0)][DBLP ] ISW, 1999, pp:225-234 [Conf ] Masayuki Abe , Fumitaka Hoshino Remarks on Mix-Network Based on Permutation Networks. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:317-324 [Conf ] Masayuki Abe , Koutarou Suzuki M+1-st Price Auction Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:115-124 [Conf ] Masayuki Abe , Serge Fehr Perfect NIZK with Adaptive Soundness. [Citation Graph (0, 0)][DBLP ] TCC, 2007, pp:118-136 [Conf ] Miyako Ohkubo , Masayuki Abe On the Definition of Anonymity for Ring Signatures. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:157-174 [Conf ] Masayuki Abe Combining Encryption and Proof of Knowledge in the Random Oracle Model. [Citation Graph (0, 0)][DBLP ] Comput. J., 2004, v:47, n:1, pp:58-70 [Journal ] Masayuki Abe , Masayuki Kanda A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication Masayuki Abe and Masayuki Kanda. [Citation Graph (0, 0)][DBLP ] Comput. J., 2002, v:45, n:6, pp:661-671 [Journal ] Masayuki Abe , Miyako Ohkubo , Koutarou Suzuki 1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:131-140 [Journal ] Koji Chida , Masayuki Abe Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:211-221 [Journal ] Packet switched network in Japan. [Citation Graph (, )][DBLP ] Chosen Ciphertext Security with Optimal Ciphertext Overhead. [Citation Graph (, )][DBLP ] A Framework for Universally Composable Non-committing Blind Signatures. [Citation Graph (, )][DBLP ] Structure-Preserving Signatures and Commitments to Group Elements. [Citation Graph (, )][DBLP ] Compact CCA-Secure Encryption for Messages of Arbitrary Length. [Citation Graph (, )][DBLP ] Efficient hybrid encryption from ID-based encryption. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.303secs