Yuichi Kaji

According to our database1, Yuichi Kaji authored at least 37 papers between 1993 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Information Leakage Through Passive Timing Attacks on RSA Decryption System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Improvement of Winternitz OTS with a Novel Fingerprinting Function.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

2020
Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience.
IACR Cryptol. ePrint Arch., 2020

2018
A Stacked CMOS Image Sensor With Array-Parallel ADC Architecture.
IEEE J. Solid State Circuits, 2018

RBAC-SC: Role-Based Access Control Using Smart Contract.
IEEE Access, 2018

Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2016
On the Computational Complexity of the Linear Solvability of Information Flow Problems with Hierarchy Constraint.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Converging bounds of the entropy of multinomial distributions.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Constant-sum fingerprinting for Winternitz one-time signature.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2015
Bounds on the entropy of multinomial distribution.
Proceedings of the IEEE International Symposium on Information Theory, 2015

On the computational complexity of the solvability of information flow problem with hierarchy constraint.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
A flash code utilizing dynamic segment allocation.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Information theoretical evaluation of the bucketing technique to mitigate timing attacks.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2013
Flash Code Utilizing Binary-Indexed Slice Encoding and Resizable-Clusters.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Flash code utilizing resizable-clusters.
Proceedings of the IEEE International Conference on Electro-Information Technology , 2013

2012
The Expected Write Deficiency of Index-Less Indexed Flash Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Index-less flash codes with arbitrary small slices.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
The expected write deficiency of index-less flash codes and their improvement.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Poster: trans-organizational role-based access control.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
Foreword.
IEICE Trans. Inf. Syst., 2010

Chomsky-Schützenberger-Type Characterization of Multiple Context-Free Languages.
Proceedings of the Language and Automata Theory and Applications, 2010

Anti-phishing mutual authentication using the visual secret sharing scheme.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
On the number of minimum weight codewords of SFA-LDPC codes.
Proceedings of the IEEE International Symposium on Information Theory, 2009

2008
On the Minimum Weight of Simple Full-Length Array LDPC Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Key Predistribution Schemes for Sensor Networks Using Finite Plane Geometry.
IEICE Trans. Inf. Syst., 2008

2007
FEC-Based Reliable Transmission for Multiple Bursts in OBS Networks.
IEICE Trans. Commun., 2007

2006
Encoding LDPC Codes Using the Triangular Factorization.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

2005
Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

2003
A Call-by-Need Recursive Algorithm for the LogMAP Decoding of a Binary Linear Block Code.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Maximum Likelihood Decoding for Linear Block Codes Using Grobner Bases.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

2002
Layered Transducing Term Rewriting System and Its Recognizability Preserving Property.
Proceedings of the Rewriting Techniques and Applications, 13th International Conference, 2002

2001
Sufficient Conditions on Most Likely Local Sub-codewords in Recursive Maximum Likelihood Decoding Algorithms.
Proceedings of the Applied Algebra, 2001

2000
Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability.
Proceedings of the Rewriting Techniques and Applications, 11th International Conference, 2000

1997
Solving a Unification Problem under Constrained Substitutions Using Tree Automata.
J. Symb. Comput., 1997

1994
The Computational Complexity of the Universal Recognition Problem for Parallel Multiple Context-Free Grammars.
Comput. Intell., 1994

1993
Parallel Multiple Context-Free Grammars, Finite-State Translation Systems, and Polynomial-Time Recognizable Subclasses of Lexical-Functional Grammars.
Proceedings of the 31st Annual Meeting of the Association for Computational Linguistics, 1993


  Loading...