Mitsuhiro HATTORI


Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application
Mitsuhiro HATTORI Takato HIRANO Takashi ITO Nori MATSUDA Takumi MORI Yusuke SAKAI Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 53-67
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Protocols
Keyword: 
hidden vector encryptionsearchable encryptionpairing-based cryptography
 Summary | Full Text:PDF(1.2MB)

Complexity of Differential Attacks on SHA-0 with Various Message Schedules
Mitsuhiro HATTORI Shoichi HIROSE Susumu YOSHIDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/12/01
Vol. E88-A  No. 12  pp. 3668-3671
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
hash functionSHA-0Chabaud-Joux attackBiham-Chen attack
 Summary | Full Text:PDF(89.8KB)