Shuji Isobe
  According to our database1,
  Shuji Isobe
  authored at least 26 papers
  between 1998 and 2023.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2023
    J. Math. Cryptol., 2023
    
  
  2021
On a Relation between Knowledge-of-Exponent Assumptions and the DLog vs. CDH Question.
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
    
  
  2018
A Construction of Cramer-Shoup Like Encryption Protocols Based on the Anshel-Anshel-Goldfeld Key Exchange Protocol.
    
  
    Proceedings of the Sixth International Symposium on Computing and Networking, 2018
    
  
  2017
    IEICE Trans. Inf. Syst., 2017
    
  
A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability.
    
  
    Proceedings of the Fifth International Symposium on Computing and Networking, 2017
    
  
  2016
    Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
    
  
  2015
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
    
  
  2014
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2014
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2014
    
  
    Proceedings of the International Symposium on Information Theory and its Applications, 2014
    
  
On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption.
    
  
    Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
    
  
  2013
On the Length-Decreasing Self-Reducibility and the Many-One-Like Reducibilities for Partial Multivalued Functions.
    
  
    IEICE Trans. Inf. Syst., 2013
    
  
Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption.
    
  
    Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
    
  
  2009
    Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
    
  
  2008
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
    
  
  2007
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
    
  
  2005
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
    
  
  2004
  2001
    Proceedings of the Automata, Languages and Programming, 28th International Colloquium, 2001
    
  
  1999
    Proceedings of the Algorithms and Computation, 10th International Symposium, 1999
    
  
  1998
    Proceedings of the Graph-Theoretic Concepts in Computer Science, 1998