Hideki Imai

According to our database1, Hideki Imai authored at least 372 papers between 1972 and 2017.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 1992, "For contributions to the theory of coded modulation and two-dimensional codes.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.
IEICE Transactions, 2017

How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services.
IEICE Transactions, 2017

2016
Time-specific encryption from forward-secure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016

2015
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
Int. J. Inf. Sec., 2015

On Finding Secure Domain Parameters Resistant to Cheon's Algorithm.
IEICE Transactions, 2015

Content and Key Management to Trace Traitors in Broadcasting Services.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

2014
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
I. J. Network Security, 2014

In search of secure domain parameters under strong diffie-hellman and related assumptions.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2013
A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack.
IEICE Transactions, 2013

Partially Wildcarded Attribute-based Encryption and Its Efficient Construction.
Proceedings of the SECRYPT 2013, 2013

Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Information Security, 16th International Conference, 2013

2012
Quantum Error Correction Beyond the Bounded Distance Decoding Limit.
IEEE Trans. Information Theory, 2012

Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel.
IEEE Trans. Information Theory, 2012

Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128.
Periodica Mathematica Hungarica, 2012

Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function.
Inf. Process. Lett., 2012

Internal state recovery of grain-v1 employing normality order of the filter function.
IET Information Security, 2012

A Numerical Evaluation of Entanglement Sharing Protocols Using Quantum LDPC CSS Codes.
IEICE Transactions, 2012

A construction method of matroidal networks.
SCIENCE CHINA Information Sciences, 2012

Time-Specific Encryption from Forward-Secure Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Quantum key distribution using Mean King problem with modified measurement schemes.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

HB protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's response.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Ciphertext Policy Multi-dimensional Range Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

2011
CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project).
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks.
IEICE Transactions, 2011

Secure Broadcast System with Simultaneous Individual Messaging.
IEICE Transactions, 2011

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Transactions, 2011

Spatially Coupled Quasi-Cyclic Quantum LDPC Codes
CoRR, 2011

Non-binary quasi-cyclic quantum LDPC codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

Spatially coupled quasi-cyclic quantum LDPC codes.
Proceedings of the 2011 IEEE International Symposium on Information Theory Proceedings, 2011

A secure public cloud storage system.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

On advanced cryptographic techniques for information security of smart grid AMI.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems.
Wireless Personal Communications, 2010

How to Strengthen the Security of RSA-OAEP.
IEEE Trans. Information Theory, 2010

Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols.
IEICE Transactions, 2010

An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions.
IEICE Transactions, 2010

Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions.
IEICE Transactions, 2010

Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies.
IEICE Transactions, 2010

Wolf fingerprints against minutiae count matching systems.
IEICE Electronic Express, 2010

Security Proof of AugPAKE.
IACR Cryptology ePrint Archive, 2010

Efficient hybrid encryption from ID-based encryption.
Des. Codes Cryptogr., 2010

Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm
CoRR, 2010

Quantum Error Correction beyond the Bounded Distance Decoding Limit
CoRR, 2010

Unconditionally Secure Electronic Voting.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

On the security of the quantum key distribution using the Mean King Problem.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

A Security evaluation of certain stream ciphers which involve randomness and coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

LDPC codes with fixed initialization decoding over binary symmetric channel.
Proceedings of the IEEE International Symposium on Information Theory, 2010

Practical Searching over Encrypted Data by Private Information Retrieval.
Proceedings of the Global Communications Conference, 2010

Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking.
Proceedings of the Global Communications Conference, 2010

A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
New security layer for overlay networks.
Journal of Communications and Networks, 2009

Strong Anonymous Signature.
IEICE Transactions, 2009

Combining Public Key Encryption with Keyword Search and Public Key Encryption.
IEICE Transactions, 2009

A Trade-off Traitor Tracing Scheme.
IEICE Transactions, 2009

An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation.
IEICE Transactions, 2009

A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity.
IEICE Transactions, 2009

Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6.
IEICE Transactions, 2009

CCA-Secure Public Key Encryption without Group-Dependent Hash Functions.
IEICE Transactions, 2009

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Transactions, 2009

A Novel Probabilistic Passive Attack on the Protocols HB and HB+.
IEICE Transactions, 2009

Tag-KEM from Set Partial Domain One-Way Permutations.
IEICE Transactions, 2009

Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model.
IACR Cryptology ePrint Archive, 2009

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IACR Cryptology ePrint Archive, 2009

Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems.
IACR Cryptology ePrint Archive, 2009

An improvement of discrete Tardos fingerprinting codes.
Des. Codes Cryptogr., 2009

Theoretical framework for constructing matching algorithms in biometric authentication systems
CoRR, 2009

An approach for stream ciphers design based on joint computing over random and secret data.
Computing, 2009

Lightweight broadcast authentication protocols reconsidered.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Formally verifiable features in embedded vehicular security systems.
Proceedings of the IEEE Vehicular Networking Conference, 2009

Conjunctive Broadcast and Attribute-Based Encryption.
Proceedings of the Pairing-Based Cryptography, 2009

Generic Construction of Stateful Identity Based Encryption.
Proceedings of the Information Security, 12th International Conference, 2009

Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes.
Proceedings of the Cryptography and Coding, 2009

An Image Sanitizing Scheme Using Digital Watermarking.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Efficient and Adaptively Secure Append-Only Signature.
Proceedings of IEEE International Conference on Communications, 2009

Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, Third International Conference, 2009

An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
Proceedings of the Topics in Cryptology, 2009

A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems.
Proceedings of the Biometric ID Management and Multimodal Communication, 2009

Constructing Better KEMs with Partial Message Recovery.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

A generic construction of useful client puzzles.
Proceedings of the 2009 ACM Symposium on Information, 2009

Dual-Policy Attribute Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions.
Proceedings of the Applied Algebra, 2009

Bounds on the Number of Users for Random 2-Secure Codes.
Proceedings of the Applied Algebra, 2009

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
Proceedings of the Applied Algebra, 2009

2008
The Commitment Capacity of the Gaussian Channel Is Infinite.
IEEE Trans. Information Theory, 2008

Introduction to the Special Issue on Information Theoretic Security.
IEEE Trans. Information Theory, 2008

On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
Trans. Data Hiding and Multimedia Security, 2008

Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems.
IEICE Transactions, 2008

A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange.
IEICE Transactions, 2008

RSA-Based Password-Authenticated Key Exchange, Revisited.
IEICE Transactions, 2008

A Secure Authenticated Key Exchange Protocol for Credential Services.
IEICE Transactions, 2008

A New Security Architecture for Personal Networks and Its Performance Evaluation.
IEICE Transactions, 2008

Invisibly Sanitizable Digital Signature Scheme.
IEICE Transactions, 2008

A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Transactions, 2008

IVs to Skip for Immunizing WEP against FMS Attack.
IEICE Transactions, 2008

Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Transactions, 2008

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.
IACR Cryptology ePrint Archive, 2008

An improvement of discrete Tardos fingerprinting codes.
IACR Cryptology ePrint Archive, 2008

A Novel Probabilistic Passive Attack on the Protocols HB and HB+.
IACR Cryptology ePrint Archive, 2008

Semantic security for the McEliece cryptosystem without random oracles.
Des. Codes Cryptogr., 2008

Protocols for purpose-restricted anonymous communications in IP-based wireless networks.
Computer Communications, 2008

Error-correcting codes and cryptography.
Appl. Algebra Eng. Commun. Comput., 2008

Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.
Proceedings of the Advances in Information and Computer Security, 2008

Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.
Proceedings of the Information Security and Cryptology, 2008

A Novel Quaternion Design Construction For STBC.
Proceedings of IEEE International Conference on Communications, 2008

New Attestation Based Security Architecture for In-Vehicle Communication.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

A security framework for personal networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

Strong Anonymous Signatures.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

2007
Modeling Block Decoding Approaches for the Fast Correlation Attack.
IEEE Trans. Information Theory, 2007

Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem.
IEEE Trans. Information Theory, 2007

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction.
IEICE Transactions, 2007

Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs.
IEICE Transactions, 2007

Extension of Broadcasting Service by Using Electronic Tokens.
IEICE Transactions, 2007

Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service.
IEICE Transactions, 2007

Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes.
IEICE Transactions, 2007

Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure.
IEICE Transactions, 2007

Efficient Identity-Based Encryption with Tight Security Reduction.
IEICE Transactions, 2007

Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off.
IEEE Communications Letters, 2007

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IACR Cryptology ePrint Archive, 2007

Efficient Hybrid Encryption from ID-Based Encryption.
IACR Cryptology ePrint Archive, 2007

Quantum Quasi-Cyclic LDPC Codes.
CoRR, 2007

Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007

A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Proceedings of the Provable Security, 2007

Formal Security Treatments for Signatures from Identity-Based Encryption.
Proceedings of the Provable Security, 2007

Protocols for Authenticated Anonymous Communications.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Anonymous Pay-TV System with Secure Revenue Sharing.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Practical Provider Authentication System for Bidirectional Broadcast Service.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.
Proceedings of the Advances in Information and Computer Security, 2007

Quantum Quasi-Cyclic LDPC Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Decimation-Based Fast Correlation Attack.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Trade-Off Traitor Tracing.
Proceedings of the Progress in Cryptology, 2007

Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Unconditionally Secure Chaffing-and-Winnowing for Multiple Use.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems.
Proceedings of the Advances in Biometrics, International Conference, 2007

Algebraic Cryptanalysis of 58-Round SHA-1.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

An Efficient Aggregate Shuffle Argument Scheme.
Proceedings of the Financial Cryptography and Data Security, 2007

Orthogonality between Key Privacy and Data Privacy, Revisited.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

Bounded CCA2-Secure Encryption.
Proceedings of the Advances in Cryptology, 2007

On the Key-Privacy Issue of McEliece Public-Key Encryption.
Proceedings of the Applied Algebra, 2007

An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths.
Proceedings of the Applied Algebra, 2007

2006
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links.
IEEE Journal on Selected Areas in Communications, 2006

Relation between the XL Algorithm and Gröbner Basis Algorithms.
IEICE Transactions, 2006

A Provably Secure Refreshable Partially Anonymous Token and Its Applications.
IEICE Transactions, 2006

Efficient Algorithms for Tate Pairing.
IEICE Transactions, 2006

Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - .
IEICE Transactions, 2006

An Efficient Group Signature Scheme from Bilinear Maps.
IEICE Transactions, 2006

Security Protocols Protection Based on Anomaly Detection.
IEICE Transactions, 2006

Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions.
IEICE Transactions, 2006

Gröbner Basis Based Cryptanalysis of SHA-1.
IACR Cryptology ePrint Archive, 2006

A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries.
IACR Cryptology ePrint Archive, 2006

A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication.
IACR Cryptology ePrint Archive, 2006

Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature
CoRR, 2006

Unconditionally Secure Anonymous Encryption and Group Authentication.
Comput. J., 2006

Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.
Proceedings of the Progressin Cryptology, 2006

Privacy Enhanced and Light Weight RFID System without Tag Synchronization and Exhaustive Search.
Proceedings of the IEEE International Conference on Systems, 2006

Lightweight Privacy for Ubiquitous Devices.
Proceedings of the IEEE International Conference on Systems, 2006

Next Wireless Security Architecture for MJPv6.
Proceedings of the IEEE International Conference on Systems, 2006

Parallel Key-Insulated Public Key Encryption.
Proceedings of the Public Key Cryptography, 2006

A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Relations Among Notions of Security for Identity Based Encryption Schemes.
Proceedings of the LATIN 2006: Theoretical Informatics, 2006

An Authentication and Key Exchange Protocol for Secure Credential Services.
Proceedings of the Information Security, 9th International Conference, 2006

Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

On the Oblivious Transfer Capacity of the Erasure Channel.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Bit Commitment over Gaussian Channels.
Proceedings of the Proceedings 2006 IEEE International Symposium on Information Theory, 2006

Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.
Proceedings of the Progress in Cryptology, 2006

An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.
Proceedings of the Progress in Cryptology, 2006

Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

A New Security Architecture for Personal Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Digitally signed document sanitizing scheme based on bilinear maps.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

Efficient Identity-Based Encryption with Tight Security Reduction.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Advances in Cryptology, 2006

A Hierarchical Key Management Approach for Secure Multicast.
Proceedings of the Architecture of Computing Systems, 2006

Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

Tag-KEM from Set Partial Domain One-Way Permutations.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

Applying Fujisaki-Okamoto to Identity-Based Encryption.
Proceedings of the Applied Algebra, 2006

A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation.
Proceedings of the Applied Algebra, 2006

Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication.
Proceedings of the Applied Algebra, 2006

A Short Random Fingerprinting Code Against a Small Number of Pirates.
Proceedings of the Applied Algebra, 2006

On Achieving Chosen Ciphertext Security with Decryption Errors.
Proceedings of the Applied Algebra, 2006

2005
Cryptrec.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

An information theoretical model for quantum secret sharing.
Quantum Information & Computation, 2005

Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks.
IEEE Journal on Selected Areas in Communications, 2005

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications.
IEICE Transactions, 2005

Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control.
IEICE Transactions, 2005

A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing.
IEICE Transactions, 2005

How to Break COT-Based Fingerprinting Schemes and Design New One.
IEICE Transactions, 2005

Key management with minimized secret storage employing an erasure channel approach.
IEEE Communications Letters, 2005

Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA".
IACR Cryptology ePrint Archive, 2005

Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes.
IACR Cryptology ePrint Archive, 2005

Relations Among Notions of Security for Identity Based Encryption Schemes.
IACR Cryptology ePrint Archive, 2005

Efficient Identity-Based Encryption with Tight Security Reduction.
IACR Cryptology ePrint Archive, 2005

A Secure Traitor Tracing Scheme against Key Exposure
CoRR, 2005

A Secure Network Storage System with Information Privacy.
Proceedings of the WEWoRC 2005, 2005

Authenticated key exchange for wireless security.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Trends and Challenges for Securer Cryptography in Practice.
Proceedings of the Progress in Cryptology, 2005

Hybrid Intrusion Detection Model Based on Ordered Sequences.
Proceedings of the Computer Network Security, 2005

A secure traitor tracing scheme against key exposure.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

A unified analysis for the fast correlation attack.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks.
Proceedings of the Progress in Cryptology, 2005

A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size.
Proceedings of the Networking, 2005

Key Management for Multicast Fingerprinting.
Proceedings of the Information Systems Security, First International Conference, 2005

On the impact of security on latency in WLAN 802.11b.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange.
Proceedings of the Public Key Infrastructure, 2005

A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys.
Proceedings of the Digital Rights Management: Technologies, 2005

Security Weaknesses of Certain Broadcast Encryption Schemes.
Proceedings of the Digital Rights Management: Technologies, 2005

A Generic Conversion with Optimal Redundancy.
Proceedings of the Topics in Cryptology, 2005

Improvements on Security Proofs of Some Identity Based Encryption Schemes.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

How to Protect Peer-to-Peer Online Games from Cheats.
Proceedings of the 2005 IEEE Symposium on Computational Intelligence and Games (CIG05), 2005

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
Proceedings of the Advances in Cryptology, 2005

Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations.
Proceedings of the Advances in Cryptology, 2005

Short Signature and Universal Designated Verifier Signature Without Random Oracles.
Proceedings of the Applied Cryptography and Network Security, 2005

Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA.
Proceedings of the Applied Cryptography and Network Security, 2005

IDS False Alarm Reduction Using Continuous and Discontinuous Patterns.
Proceedings of the Applied Cryptography and Network Security, 2005

An Efficient Group Signature Scheme from Bilinear Maps.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
Phase-noise effects on turbo trellis-coded over M-ary coherent channels.
IEEE Trans. Communications, 2004

On the suboptimality of iterative decoding for turbo-like and LDPC codes with cycles in their graph representation.
IEEE Trans. Communications, 2004

Efficient Unconditionally Secure Digital Signatures.
IEICE Transactions, 2004

Managing Encryption and Key Publication Independently in Digital Rights Management Systems.
IEICE Transactions, 2004

Relation between XL algorithm and Gröbner Bases Algorithms.
IACR Cryptology ePrint Archive, 2004

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
IACR Cryptology ePrint Archive, 2004

Dynamic Fingerprinting over Broadcast Using Revocation Scheme.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Application of trust-metrics for evaluating performance system in ad-hoc networks with privacy.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Proceedings of the Public Key Cryptography, 2004

Rates for bit commitment and coin tossing from noisy correlation.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Bit String Commitment Reductions with a Non-zero Rate.
Proceedings of the Topics in Cryptology, 2004

A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.
Proceedings of the Advances in Cryptology, 2004

Comparison Between XL and Gröbner Basis Algorithms.
Proceedings of the Advances in Cryptology, 2004

On the Security of Cryptosystems with All-or-Nothing Transform.
Proceedings of the Applied Cryptography and Network Security, 2004

Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004

Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC.
IEEE Trans. Information Theory, 2003

Commitment Capacity of Discrete Memoryless Channels.
IACR Cryptology ePrint Archive, 2003

Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions.
IACR Cryptology ePrint Archive, 2003

On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
IACR Cryptology ePrint Archive, 2003

Commitment Capacity of Discrete Memoryless Channels
CoRR, 2003

Anonymous authentication scheme for XML security standard with Refreshable Tokens.
Proceedings of the 2003 ACM Workshop on XML Security, Fairfax, VA, USA, October 31, 2003, 2003

Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks.
Proceedings of the Public Key Cryptography, 2003

Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003

The Role of Arbiters in Asymmetric Authentication Schemes.
Proceedings of the Information Security, 6th International Conference, 2003

Commitment Capacity of Discrete Memoryless Channels.
Proceedings of the Cryptography and Coding, 2003

Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Broadcast encryption with short keys and transmissions.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

Leakage-Resilient Authenticated Key Establishment Protocols.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.
Proceedings of the Applied Cryptography and Network Security, 2003

Separating Encryption and Key Issuance in Digital Rights Management Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

Flaws in Some Robust Optimistic Mix-Nets.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

Unconditionally Secure Homomorphic Pre-distributed Commitments.
Proceedings of the Applied Algebra, 2003

2002
Security in Wireless Communication.
Wireless Personal Communications, 2002

Performance analysis of deliberately clipped OFDM signals.
IEEE Trans. Communications, 2002

Equivalence between semantic security and indistinguishability against chosen ciphertext attacks.
IACR Cryptology ePrint Archive, 2002

OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives.
IACR Cryptology ePrint Archive, 2002

A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks.
Comput. J., 2002

Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).
Proceedings of the Selected Areas in Cryptography, 2002

New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000.
Proceedings of the Public Key Cryptography, 2002

Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Proceedings of the Public Key Cryptography, 2002

Cryptography with information theoretic security.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

Traceability Schemes for Signed Documents.
Proceedings of the Information Security, 5th International Conference, 2002

An Anonymous Loan System Based on Group Signature Scheme.
Proceedings of the Information Security, 5th International Conference, 2002

Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal.
Proceedings of the ICEIS 2002, 2002

Iterative reliability-based decoding of turbo-like codes.
Proceedings of the IEEE International Conference on Communications, 2002

Security Notions for Unconditionally Secure Signature Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

Unconditionally Secure Anonymous Encryption and Group Authentication.
Proceedings of the Advances in Cryptology, 2002

2001
On the distribution of the peak-to-average power ratio in OFDM signals.
IEEE Trans. Communications, 2001

On the iterative decoding of multilevel codes.
IEEE Journal on Selected Areas in Communications, 2001

Quantum Identification Protocol with Technologically Bounded Parties.
Electronic Notes in Discrete Mathematics, 2001

Pretty-Simple Password-Authenticated Key-Exchange Protocol
CoRR, 2001

More Robust Multiparty Protocols with Oblivious Transfer
CoRR, 2001

Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.
Proceedings of the Public Key Cryptography, 2001

Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC.
Proceedings of the Public Key Cryptography, 2001

Decoding of high-rate turbo codes using a syndrome trellis.
Proceedings of the IEEE International Conference on Communications, 2001

Fast Correlation Attack Algorithm with List Decoding and an Application.
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001

Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.
Proceedings of the Topics in Cryptology, 2001

Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.
Proceedings of the Advances in Cryptology, 2001

2000
MDPSK-OFDM with highly power-efficient block codes for frequency-selective fading channels.
IEEE Trans. Vehicular Technology, 2000

Multilevel coded modulation for unequal error protection and multistage decoding .I. Symmetric constellations.
IEEE Trans. Communications, 2000

Multilevel coded modulation for unequal error protection and multistage decoding. II. Asymmetric constellations.
IEEE Trans. Communications, 2000

Performance of the deliberate clipping with adaptive symbol selection for strictly band-limited OFDM systems.
IEEE Journal on Selected Areas in Communications, 2000

On decoding of block codes with peak-power reduction in OFDM systems.
IEEE Communications Letters, 2000

Relating Differential Distribution Tables to Other Properties of of Substitution Boxes.
Des. Codes Cryptogr., 2000

Anonymous Oblivious Transfer
CoRR, 2000

A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation.
Proceedings of the Information Security, Third International Workshop, 2000

On clipping for peak power reduction of OFDM signals.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

Reduced-complexity iterative decoding of high-rate turbo codes.
Proceedings of the Global Telecommunications Conference, 2000. GLOBECOM 2000, San Francisco, CA, USA, 27 November, 2000

A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000

Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP.
Proceedings of the CCS 2000, 2000

CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government.
Proceedings of the Advances in Cryptology, 2000

Unconditionally Secure Digital Signature Schemes Admitting Transferability.
Proceedings of the Advances in Cryptology, 2000

Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Restriction, Terms and Nonlinearity of Boolean Functions.
Theor. Comput. Sci., 1999

Reduced complexity iterative decoding of low-density parity check codes based on belief propagation.
IEEE Trans. Communications, 1999

Performance of OFDM-CDMA with Simple Peak Power Reduction.
European Transactions on Telecommunications, 1999

Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret.
Proceedings of the Public Key Cryptography, 1999

Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks.
Proceedings of the Information Security, Second International Workshop, 1999

A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.
Proceedings of the Information Security, Second International Workshop, 1999

On the Channel Capacity of Narrow-Band Subliminal Channels.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
Proceedings of the Information and Communication Security, Second International Conference, 1999

On Channel Capacity and Modulation of Watermarks in Digital Still Images.
Proceedings of the Financial Cryptography, 1999

Comparing the MOV and FR Reductions in Elliptic Curve Cryptography.
Proceedings of the Advances in Cryptology, 1999

Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
Proceedings of the Advances in Cryptology, 1999

An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
Proceedings of the Advances in Cryptology, 1999

Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications.
Proceedings of the Applied Algebra, 1999

1998
On block-coded modulation using unequal error protection codes over Rayleigh-fading channels.
IEEE Trans. Communications, 1998

Binary multilevel convolutional codes with unequal error protection capabilities.
IEEE Trans. Communications, 1998

How to Construct Efficient Signcryption Schemes on Elliptic Curves.
Inf. Process. Lett., 1998

Compact and Flexible Resolution of CBT Multicast Key-Distribution.
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1998

A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation.
Proceedings of the Public Key Cryptography, 1998

Compact and Unforgeable Key Establishment over an ATM Network.
Proceedings of the Proceedings IEEE INFOCOM '98, The Conference on Computer Communications, Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies, Gateway to the 21st Century, San Francisco, CA, USA, March 29, 1998

A successive carrier-transmission model for narrow-band subliminal channels.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

LITESET: A Light-Weight Secure Electronic Transaction Protocol.
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998

1997
Duality of Boolean functions and its cryptographic significance.
Proceedings of the Information and Communication Security, First International Conference, 1997

Self-synchronized message randomization methods for subliminal channels.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
On classes of rate k/(k+1) convolutional codes and their decoding techniques.
IEEE Trans. Information Theory, 1996

Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification.
Proceedings of the Advances in Cryptology, 1996

1995
A Design of Reed-Solomon Decoder with Systolic Array Structure.
IEEE Trans. Computers, 1995

Integrated receiver structure of staged decoder and CCI canceller for CDMA with multilevel coded modulation.
European Transactions on Telecommunications, 1995

1994
Multiuser detection scheme based on canceling cochannel interference for MFSK/FH-SSMA system.
IEEE Journal on Selected Areas in Communications, 1994

Design of pseudonoise sequences with good odd and even correlation properties for DS/CDMA.
IEEE Journal on Selected Areas in Communications, 1994

Information Security Aspects of Spread Spectrum Systems.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1993
Generalized concatenated codes for channels where unidirectional byte errors are predominant.
IEEE Trans. Information Theory, 1993

Some Codes for Correcting and Detecting Unidirectional Byte Errors.
IEEE Trans. Computers, 1993

A Spread-Spectrum Multiaccess System with Cochannel Interference Cancellation for Multipath Fading Channels.
IEEE Journal on Selected Areas in Communications, 1993

Peak-Shift and Bit Error-Correction with Channel Side Information in Runlength-Limited Sequences.
Proceedings of the Applied Algebra, 1993

1992
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

High-Speed Implementation Methods for RSA Scheme.
Proceedings of the Advances in Cryptology, 1992

On Verifiable Implicit Asking Protocols for RSA Computation.
Proceedings of the Advances in Cryptology, 1992

Non-Interactive Generation of Shared Pseudorandom Sequences.
Proceedings of the Advances in Cryptology, 1992

1991
Multiple unidirectional byte error-correcting codes.
IEEE Trans. Information Theory, 1991

Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference.
Discrete Applied Mathematics, 1991

Human Identification Through Insecure Channel.
Proceedings of the Advances in Cryptology, 1991

A Multi-Purpose Proof System - for Identity and Membership Proofs.
Proceedings of the Advances in Cryptology, 1991

Random and Byte Error Correcting Codes for Asymmetric or Undirectional Error Control.
Proceedings of the Applied Algebra, 1991

1990
Some new binary codes correcting asymmetric/unidirectional errors.
IEEE Trans. Information Theory, 1990

An Adaptive Canceller of Cochannel Interference for Spread-Spectrum Multiple-Access Communication Networks in a Power Line.
IEEE Journal on Selected Areas in Communications, 1990

Combination of an Adaptive Array Antenna and a Canceller of Interference for Direct-Sequence Spread-Spectrum Multiple-Access System.
IEEE Journal on Selected Areas in Communications, 1990

Structural Properties of One-way Hash Functions.
Proceedings of the Advances in Cryptology, 1990

A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
Proceedings of the Advances in Cryptology, 1990

Duality between Two Cryptographic Primitives.
Proceedings of the Applied Algebra, 1990

Periodic Sequences for Absolute Type Shaft Encoders.
Proceedings of the Applied Algebra, 1990

Constructions of Codes Correcting Burst Asymmetric Errors.
Proceedings of the Applied Algebra, 1990

Trellis Coded Modulation Based on Time-Varying Mapping and Encoders for Utilitzing a Channel Intersymbol Interference.
Proceedings of the Applied Algebra, 1990

1989
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
Proceedings of the Advances in Cryptology, 1989

On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
Proceedings of the Advances in Cryptology, 1989

1988
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption.
Proceedings of the Advances in Cryptology, 1988

Speeding Up Secret Computations with Insecure Auxiliary Devices.
Proceedings of the Advances in Cryptology, 1988

A Study on Imai-Hirakawa Trellis-Coded Modulation Schemes.
Proceedings of the Applied Algebra, 1988

1987
A Construction Method of High-Speed Decoders Using ROMS's for Bose-Chaudhuri-Hocquenghem and Reed-Solomon Codes.
IEEE Trans. Computers, 1987

On the Key Predistribution System: A Practical Solution to the Key Distribution Problem.
Proceedings of the Advances in Cryptology, 1987

Coding Theory and its Applications in Japan.
Proceedings of the Applied Algebra, 1987

1985
Design of Automatic Equalizer Including a Decoder of Error-Correcting Code.
IEEE Trans. Communications, 1985

Algebraic Methods for Constructing Asymmetric Cryptosystems.
Proceedings of the Algebraic Algorithms and Error-Correcting Codes, 1985

1984
Multivariate polynomials in coding theory.
Proceedings of the Applied Algebra, 1984

1981
Generalized tensor product codes.
IEEE Trans. Information Theory, 1981

On Optimal Partition of a Query Set into Subsets Having the Consecutive Retrieval Property.
Proceedings of the Data Base File Organization, 1981

1977
A Theory of Two-Dimensional Cyclic Codes
Information and Control, May, 1977

Correction to 'A New Multilevel Coding Method Using Error-Correcting Codes'.
IEEE Trans. Information Theory, 1977

A new multilevel coding method using error-correcting codes.
IEEE Trans. Information Theory, 1977

1974
A construction method for path-invariant comma-free codes (Corresp.).
IEEE Trans. Information Theory, 1974

1973
Two-dimensional Fire codes.
IEEE Trans. Information Theory, 1973

1972
A theory of two-dimensional linear recurring arrays.
IEEE Trans. Information Theory, 1972


  Loading...