Akihiro Yamamura

Orcid: 0000-0003-3602-3231

According to our database1, Akihiro Yamamura authored at least 38 papers between 1997 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC.
Cryptogr., March, 2023

Latin Hexahedra and Related Combinatorial Structures.
Proceedings of the Algorithms and Discrete Applied Mathematics, 2023

2022
The effect of jumping modes on various automata models.
Nat. Comput., 2022

Blind Decryption and Private Information Delivery.
Proceedings of the Mobile Internet Security - 6th International Symposium, 2022

2021
Two-way deterministic automata with jumping mode.
Theor. Comput. Sci., 2021

2020
Two-Way Jumping Automata.
Proceedings of the Frontiers in Algorithmics - 14th International Workshop, 2020

Groupoid Action and Rearrangement Problem of Bicolor Arrays by Prefix Reversals.
Proceedings of the Computer Science - Theory and Applications, 2020

2019
Enhancement of Automata with Jumping Modes.
Proceedings of the Cellular Automata and Discrete Complex Systems, 2019

2017
Application of the firefly algorithm to the uncapacitated facility location problem.
J. Intell. Fuzzy Syst., 2017

2016
Preface.
Int. J. Found. Comput. Sci., 2016

One-Way Jumping Finite Automata.
Int. J. Found. Comput. Sci., 2016

2015
Analysis of a Monte Carlo Tree Search in Knight-Amazons.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

Rearranging Two Dimensional Arrays by Prefix Reversals.
Proceedings of the Reachability Problems - 9th International Workshop, 2015

Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem.
Proceedings of the Information and Communication Technology, 2015

Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons.
Proceedings of the Information and Communication Technology, 2015

2014
Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem.
Proceedings of the Information and Communication Technology, 2014

2013
Reverse Turing Test using Touchscreens and CAPTCHA.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

Certificate-based proxy decryption systems with revocability in the standard model.
Inf. Sci., 2013

CAPTCHA Suitable for Smartphones.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2009
More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Updating Quantum Cryptography Report ver. 1.
CoRR, 2009

2008
Classification of Hash Functions Suitable for Real-Life Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Current Status of Japanese Government PKI Systems.
Proceedings of the Public Key Infrastructure, 2008

2007
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.
Proceedings of the Progress in Cryptology, 2007

Privacy Enhancing Credentials.
Proceedings of the Advances in Computer Science, 2007

Threshold Anonymous Group Identification and Zero-Knowledge Proof.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

Homomorphic Encryptions of Sums of Groups.
Proceedings of the Applied Algebra, 2007

2005
Anonymous Password-Based Authenticated Key Exchange.
Proceedings of the Progress in Cryptology, 2005

2004
Evaluation and Improvement of the Tempest Fonts.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

2002
Embedding Theorems for Groups Presented Via Partial Automorphisms: a Generalization of Semidirect Products and HNN Extensions.
Int. J. Algebra Comput., 2002

2001
Generic Algorithms and Key Agreement Protocols Based on Group Actions.
Proceedings of the Algorithms and Computation, 12th International Symposium, 2001

Private Information Retrieval Based on the Subgroup Membership Problem.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

Error Detection and Authentication in Quantum Key Distribution.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Key Agreement Protocol Securer than DLOG.
Proceedings of the International Colloquium on Words, 2000

1999
Hnn Extensions of Semilattices.
Int. J. Algebra Comput., 1999

A Functional Cryptosystem Using a Group Action.
Proceedings of the Information Security and Privacy, 4th Australasian Conference, 1999

1998
Public-Key Cryptosystems Using the Modular Group.
Proceedings of the Public Key Cryptography, 1998

1997
HNN Extensions of Inverse Semigroups and Applications.
Int. J. Algebra Comput., 1997


  Loading...