The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Takeshi Koshiba: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
    Theoretical Analysis of chi2 Attack on RC6. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:142-153 [Conf]
  2. Takeshi Koshiba
    Decision Tree Learning Systems with Switching Evaluators. [Citation Graph (0, 0)][DBLP]
    Canadian Conference on AI, 1996, pp:349-361 [Conf]
  3. Takeshi Koshiba, Erkki Mäkinen, Yuji Takada
    Learning Strongly Deterministic Even Linear Languages from Positive Examples. [Citation Graph (0, 0)][DBLP]
    ALT, 1995, pp:41-54 [Conf]
  4. Takeshi Koshiba
    Typed pattern languages and their learnability. [Citation Graph (0, 0)][DBLP]
    EuroCOLT, 1995, pp:367-379 [Conf]
  5. Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami
    Computational Indistinguishability Between Quantum States and Its Cryptographic Application. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:268-284 [Conf]
  6. Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba
    Multiple Linear Cryptanalysis of a Reduced Round RC6. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:76-88 [Conf]
  7. Takeshi Koshiba
    Computational learning theoretic cryptanalysis of language theoretic cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:28-38 [Conf]
  8. Takeshi Koshiba
    A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:76-81 [Conf]
  9. Takeshi Koshiba
    Polynomial-Time Algorithms for the Equivalence for One-Way Quantum Finite Automata. [Citation Graph (0, 0)][DBLP]
    ISAAC, 2001, pp:268-278 [Conf]
  10. Akinori Kawachi, Hirotada Kobayashi, Takeshi Koshiba, Raymond H. Putra
    Universal Test for Quantum One-Way Permutations. [Citation Graph (0, 0)][DBLP]
    MFCS, 2004, pp:839-850 [Conf]
  11. Takeshi Koshiba
    A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:87-103 [Conf]
  12. Takeshi Koshiba
    On Sufficient Randomness for Secure Public-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:34-47 [Conf]
  13. Takeshi Koshiba, Kaoru Kurosawa
    Short Exponent Diffie-Hellman Problems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:173-186 [Conf]
  14. Takeshi Koshiba, Erkki Mäkinen, Yuji Takada
    Inferring pure context-free languages from positive data. [Citation Graph (0, 0)][DBLP]
    Acta Cybern., 2000, v:14, n:3, pp:469-477 [Journal]
  15. Takeshi Koshiba
    On a Hierarchy of Slender Languages Based on Control Sets. [Citation Graph (0, 0)][DBLP]
    Fundam. Inform., 1997, v:31, n:1, pp:41-47 [Journal]
  16. Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
    Theoretical Analysis of chi2 Attack on RC6. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:28-36 [Journal]
  17. Akinori Kawachi, Takeshi Koshiba
    Progress in Quantum Computational Cryptography. [Citation Graph (0, 0)][DBLP]
    J. UCS, 2006, v:12, n:6, pp:691-709 [Journal]
  18. Akinori Kawachi, Hirotada Kobayashi, Takeshi Koshiba, Raymond H. Putra
    Universal test for quantum one-way permutations. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2005, v:345, n:2-3, pp:370-385 [Journal]
  19. Takeshi Koshiba, Erkki Mäkinen, Yuji Takada
    Learning Deterministic even Linear Languages From Positive Examples. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1997, v:185, n:1, pp:63-79 [Journal]
  20. Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
    Low-density attack revisited. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2007, v:43, n:1, pp:47-59 [Journal]

  21. Strengthening the Security of Distributed Oblivious Transfer. [Citation Graph (, )][DBLP]


  22. Reducing Complexity Assumptions for Oblivious Transfer. [Citation Graph (, )][DBLP]


  23. Enhancing D-ABDUCTOR towards a diagrammatic user interface platform. [Citation Graph (, )][DBLP]


  24. Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification. [Citation Graph (, )][DBLP]


  25. Statistically-Hiding Quantum Bit Commitment from Approximable-Preimage-Size Quantum One-Way Function. [Citation Graph (, )][DBLP]


  26. Round-Efficient One-Way Permutation Based Perfectly Concealing Bit Commitment Scheme. [Citation Graph (, )][DBLP]


Search in 1.002secs, Finished in 1.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002