|
Search the dblp DataBase
Atsushi Fujioka:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta
A Practical Secret Voting Scheme for Large Scale Elections. [Citation Graph (0, 0)][DBLP] ASIACRYPT, 1992, pp:244-251 [Conf]
- Tatsuaki Okamoto, Atsushi Fujioka, Eiichiro Fujisaki
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Zn. [Citation Graph (0, 0)][DBLP] CRYPTO, 1992, pp:54-65 [Conf]
- Atsushi Fujioka, Tatsuaki Okamoto, Shoji Miyaguchi
ESIGN: An Efficient Digital Signature Implementation for Smard Cards. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1991, pp:446-457 [Conf]
- Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta
Interactive Bi-Proof Systems and Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1991, pp:243-256 [Conf]
- Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka
Secure Bit Commitment Function against Divertibility. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1992, pp:324-340 [Conf]
- S. Shinozaki, Toshiya Itoh, Atsushi Fujioka, Shigeo Tsujii
Provably Secure Key-Updating Schemes in Identity-Based Systems. [Citation Graph (0, 0)][DBLP] EUROCRYPT, 1990, pp:16-30 [Conf]
- Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto
An Improvement on a Practical Secret Voting Scheme. [Citation Graph (0, 0)][DBLP] ISW, 1999, pp:225-234 [Conf]
- Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting. [Citation Graph (0, 0)][DBLP] SECRYPT, 2006, pp:141-148 [Conf]
Strongly Secure Authenticated Key Exchange without NAXOS' Approach. [Citation Graph (, )][DBLP]
Security of Sequential Multiple Encryption. [Citation Graph (, )][DBLP]
Search in 0.006secs, Finished in 0.006secs
|