-
[文献書誌] Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai: "Security Notions for Unconditionally Secure Signature Schemes"Advances in Cryptology -EUROCRYPT. 2332. 434-449 (2002)
-
[文献書誌] Rui Zhang, Michiharu Kudo, Kanta Matsuura, Hideki Imai: "Instance revocation regarding digital signatures"Proceeding of the 2002 Symposium on Cryptography and Information Security (SCIS). 1143-1148 (2002)
-
[文献書誌] Jian WANG, Hideki Imai: "Boolean Expression of Subtree in Secure Broadcasting"Name of journal. volume. number. page. publishing office : Proceedings of the 25th Symposium on Information Theory and Its Applications (SITA2002). IEEE Information Theory Society. Japan Chapter. Vol.1. 131-134 (2002)
-
[文献書誌] Rui Zhang, Lein Harn, Hideki Imai: "Decomposable commitment schemes and its applications"Symposium on Information Theory and its Applications (ISTA). 527-530 (2002)
-
[文献書誌] Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: "A traitor traceable conference system with dynamic sender"IEICE Trans.. vol.E85-A no.1. 167-174 (2002)
-
[文献書誌] Akira Otsuka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: "An unconditionally secure electronic cash scheme with computational untraceability"IEICE Trans.. vol.E85-A no.1. 140-148 (2002)
-
[文献書誌] M.Mihaljevic, H.Imai: "Cryptanalysis of TOYOCRYPT-HS1 stream cipher"IEICE Transactions on Fundamentals. E-85-A. 66-73 (2002)
-
[文献書誌] Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: "A hierarchical noninteractive key-sharing scheme with low memory size and high resistance against collusion attacks"the Computer Journal. vol.45.3. 293-303 (2002)
-
[文献書誌] 松本 渉, 今井 秀樹: "OFDM変調及びMC-CDMA変調方式のハーフシンボル化の検討"電子情報通信学会論文誌.B. Vol.J85-B No.6. 910-921 (2002)
-
[文献書誌] 松本 渉, 許 偉剛.今井 秀樹: "ランダム系列のラテン方陣/長方形構造によるターボ符号インタリーバの構成法"電子情報通信学会論文誌.A. Vol.J85-A No.6. 691-703 (2002)
-
[文献書誌] M.Mihaljevic, M.P.C.Fossorier, H.Imai: "Fast correlation attack algorithm with the list decoding and an application". FSE2001"Lecture Notes in Computer Science. vol.2355. 196-210 (2002)
-
[文献書誌] Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai: "An Anonymous Loan System Based on Group Signature"Springer in Informarion Security Conference 2002. 244-256 (2002)
-
[文献書誌] K.Kobara, H.Imai: "Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model"IEICE Trans.. E85-A.10. 2229-2237 (2002)
-
[文献書誌] 古原 和邦, 今井秀樹: "電子透かし技術とその周辺 --攻撃とその対策--"画像電子学会誌. 31.6. 1213-1217 (2002)
-
[文献書誌] K.Kobara, H.Imai: "New chosen-plaintext attacks on the one-wayness of the modified McEliece PKC proposed at Asiacrypt 2000"Proc. of PKC '02.. 2274. 237-251 (2002)
-
[文献書誌] Kanta Matsuura, Hideki Imai: "Digital Timestamps for Dispute Settlement in Electronic Commerce : Generation. Verification. and Renewal"Proceedings of 4th International Conference on Enterprise Information Systems (ICEIS 2002). Press.. Volume 2. 962-967 (2002)
-
[文献書誌] Junji Shikata, Goichiro Hanaoka, Yumiko Zheng, Hideki Imai: "Security notions of unconditionally secure signature schemes"Lecture Notes in Computer Science. vol.2332. 434-449 (2002)
-
[文献書誌] Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: "Efficient and unconditionally secure digital signatures and a security analysis on a multireceiver authentication code"Lecture Notes in Computer Science. Springer-Verlag. vol.2274. 64-79 (2002)
-
[文献書誌] Wataru Matsumoto, Hideki Imai: "Irregular extended Euclidean geometry low-density parity-check codes"Proceeding of 3rd International Symposium on Communication System. Networks and Digital Signal Processing (CSNDSP2002). 148-151 (2002)
-
[文献書誌] P.Camion, M.Mihaljevic, H.Imai: "On employment of LFSRs over GF(q) in certain stream ciphers"IEEE Int.Symp.Inform.Theory -ISIT'2002. Lausanne, Switzerland. July 2002. Proceedings. 210 (2002)
-
[文献書誌] P.Camion, M.Mihaljevic, H.Imai: "Two alerts for design of certain stream ciphers : Trapped LFSR and weak resilient function over GF(q)"Selected Areas in Cryptography -SAC2002. St. John's. Newfoundland. Canada. August 2002. Workshop Record. 203-217 (2002)
-
[文献書誌] Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai: "Traceability Schemes for Signed Documents"Proceedings of Information Security Conference (ISC2002). 2433. 257-271 (2002)
-
[文献書誌] Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai: "An Anonymous Loan System Using Secret Sharing Scheme"ISITA2002 Xi'an. 227-230 (2002)
-
[文献書誌] Wataru Matsumoto, HAGIWARA Manabu, Hideki Imai: "Irregular Low-Density Parity-Check Code Design Based on Euclidean Geometry and Cayley Graph"International Symposium on Information Theory and Its Applications (ISITA2002). S3-2-2. 278-290 (2002)
-
[文献書誌] Wataru Matsumoto, Hideki Imai: "Blind Synchronization with Enhanced Sum-Product Algorithm for Low-Density Parity-Check Codes"The Fifth International Symposium on Wireless Personal Multimedia Communications (WPMC'02). 966-970 (2002)
-
[文献書誌] Jonas Karlsson, Hideki Imai: "Performance of Combined Serial IC and Normalized Griffiths' Algorithm in Multi-Cell CDMA Systems"The 5th International Symposium on Wireless Personal Multimedia Communications. Honolulu. USA. 1237-1241 (2002)
-
[文献書誌] Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai: "Traceability schemes for signed documents"Lecture Notes in Computer Science. vo. 2433. 257-271 (2002)
-
[文献書誌] Mohammad Ghulam Rahman, Hideki Imai: "Anonymous Authenticated Key Agreement Protocol Integrating End-User Authentication for Mobile Communications"Proceedings of International Symposium on Information Theory and Its Applications (ISITA). 219-222 (2002)
-
[文献書誌] K.Kobara, H.Imai: "OAEP++ another very simple way to fix the bug in OAEP"Proc.of 2002 International Symposium on Information Theory and Its Applications. S6-4-5. 563-566 (2002)
-
[文献書誌] K.Kobara, H.Imai: "PAKE vs.password-based authentications in wireless standards"Proc.of The 3rd International Workshop on ITS Telecommunications. 135-138 (2002)
-
[文献書誌] Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: "Unconditionally secure key insulated cryptosystems : models bounds and constructions"Lecture Notes in Computer Science. vol.2513. 85-96 (2002)
-
[文献書誌] Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: "Unconditionally secure anonymous encryption and group authentication"Lecture Notes in Computer Science. vol.2501. 81-99 (2002)
-
[文献書誌] 繁富利恵, 大塚玲, 小川貴英, 今井秀樹: "匿名貸し出しプトロトル"暗号と情報セキュリティシンポジウム.電子情報通信学会情報セキュリティ研究専門委員会. 2巻. 271 (2002)
-
[文献書誌] 渡辺 曜大, 松本 渉, 今井秀樹: "低密度パリティ検査行列を用いた量子鍵配送のための誤り訂正技術"2003年暗号と情報セキュリティシンポジウム. Vol.2. 1219-1220 (2002)
-
[文献書誌] 米沢祥子, 花岡悟一郎, 今井秀樹: "署名つき文書に対する漏洩者追跡方式"2002年暗号と情報セキュリティシンポジウム(SCIS2002)予稿集. 429-434 (2002)
-
[文献書誌] 金 美羅, 四方 順司, 村谷 博文, 今井 秀樹: "c-Secure CRT符号について"2002年暗号と情報セキュリティシンポジウム予稿集 Iy2. 第2号. 1015-1020 (2002)
-
[文献書誌] Mohammad Ghulam Rahman, Hideki Imai: "Mutual Authentication with User Anonymity in Mobile Communications"Proceedings of the 2002 Symposium on Cryptography and Information Security (SCIS2002). 445-450 (2002)
-
[文献書誌] 山中 晋爾, 松浦 幹太, 今井 秀樹: "侵入検知及び内部攻撃者検知とヒューマンクリプト"2002年暗号と情報セキュリティシンポジウム(SCIS2002)予稿集. 979-984 (2002)
-
[文献書誌] 松本 渉, 今井 秀樹: "OFDM変調及びMC-CDMA変調方式のハーフシンボル化の検討"電子情報通信学会論文誌.B. Vol.J85-B No.6. 910-921 (2002)
-
[文献書誌] Akira Otsuka, Junji Shikata, Hideki Imai: "Discussions on Unconditionally Secure VSS Robust against Dishonest Majority"情報セキュリティ研究会(ISEC). Vol.102 No.212. 81-88 (2002)
-
[文献書誌] 鬼頭大介, 大塚玲, 今井秀樹: "情報量的に安全な地域内公開検証可能秘密分散法"情報セキュリティ研究会(ISEC).発行所:電子情報通信学会. Vol.102 No.212. 89-94 (2002)
-
[文献書誌] 松本 渉, 今井 秀樹: "決定論的非正則LDPC符号設計法"2002年電子情報通信学会基礎・境界ソサイエティ大会. A-6-12. 126 (2002)
-
[文献書誌] Akira Otsuka, Hideki Imai: "Unconditionally Secure Electronic Cash Based on Secure Computation"第25回情報理論とその応用シンポジウム(SITA2002). Vol.2. 35-38 (2002)
-
[文献書誌] 萩原 学, 松本 渉, 今井 秀樹: "量子鍵配送における誤り訂正符号に関する考察"第25回情報理論とその応用シンポジウム予稿集. Vol.2. 431-434 (2002)
-
[文献書誌] Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai: "Anonymous Refreshability of Tokens"第25回情報理論とその応用シンポジウム予稿集.情報理論とその応用学会. 第1分冊. 43-46 (2002)
-
[文献書誌] 田村 仁, 古原 和邦, 今井 秀樹: "個人情報の保護を考慮したトラストメトリックスの提案"Proceedings of the 25th Symposium on Information Theory and Its Applications (SITA2002). Volume I of II. 135-138 (2002)
-
[文献書誌] Misa Nakane, Anderson Clayton, A.Nascimento, Hideki Imai: "Security of a Quantum Bit Commitment Protocol Based on a Physical Assumption against a Single Particle Measurement Attack"第25回情報理論とその応用シンポジウム予稿集,「情報理論とその応用学会」. Vol.1. 535-538 (2002)
-
[文献書誌] 赤尾 雅人, 今井秀樹: "バイオメトリックスを用いた暗号鍵生成"第25回情報理論とその応用シンポジウム(SITA2002)予稿集. Vol.1. 339-342 (2002)
-
[文献書誌] 金 美羅, 古原 和邦, 今井 秀樹: "コンテンツの不正配布を考慮したBroadcast Encryption方式"第25回情報理論とその応用シンポジウム予稿集. 1巻1号. 127-130 (2002)
-
[文献書誌] Mohammad Ghulam Rahman, Anderson C.A.Nascimento, Joern Mueller-Quade, Hideki Imai: "On Interactive Key Pre-Distribution Schemes"Proceedings of the 25th Symposium of Information Theory and its Applications (SITA2002). Vol.1. 347-350 (2002)
-
[文献書誌] 鬼頭大介, 大塚玲, 古原和邦, 今井秀樹: "Distributed Trusted Initializer in Unconditionally Secure VSS"情報理論とその応用シンポジウム(SITA).第25回.主催:情報理論とその応用学会. Vol.1. 231-234 (2002)
-
[文献書誌] 山中 晋爾, 繁富 利恵, 今井 秀樹: "侵入検知技術の内部攻撃者検知技術への応用"第25回情報理論とその応用シンポジウム(SITA2002)予稿集. Vol.1. 247-250 (2002)
-
[文献書誌] Yang Cui, Kazukuni Kobara, Hideki Imai: "Evaluation of OAEP Variants with IND-CCA2 Security"第25回情報理論とその応用シンポジウム(SITA2002)、第25回情報理論とその応用シンポジウム実行委員会、創文社. Vol.2. 619-622 (2002)
-
[文献書誌] Boonying Srivanasont, Akira Otsuka, Hideki Imai: "Secure blind signature based on one-way accumulators"Proceeding of the 25th Symposium on Information Theory and Its Applications. Volume 1 of 2. 47-50 (2002)
-
[文献書誌] K.Kobara, H.Imai: "PAKE vs.password-based authentications in wireless standards"Proc.25th Symp.Inform.Theory and Its Applications (SITA '02). Vol.1. 243-246 (2002)
-
[文献書誌] 副島 晋, 松浦 幹太, 今井 秀樹: "電子権利流通方式対に関する特性分析"2002年暗号と情報セキュリティシンポジウム予稿集. Vol.1. 223-228 (2002)
-
[文献書誌] Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai: "A Note on Anonymous Loan System"情報処理学会.コンピュータセキュリティ研究会(CSEC). 153-160 (2002)