|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies Nuttapong ATTRAPADUNG Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A
No. 1
pp. 116-125
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Secure Protocol Keyword: attribute based encryption, ciphertext policy, key policy, | | Summary | Full Text:PDF(230.4KB) | |
|
|
|
|
|
|
|
|
|
|
|
Combining Public Key Encryption with Keyword Search and Public Key Encryption Rui ZHANG Hideki IMAI | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D
No. 5
pp. 888-896
Type of Manuscript:
Special Section PAPER (Special Section on Information and Communication System Security) Category: Cryptographic Techniques Keyword: PEKS, PKE, PEKS/PKE, CCA security, | | Summary | Full Text:PDF(196.5KB) | |
|
|
|
|
|
|
|
|
|
Tag-KEM from Set Partial Domain One-Way Permutations Masayuki ABE Yang CUI Hideki IMAI Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A
No. 1
pp. 42-52
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Public Key Cryptography Keyword: Tag-KEM, hybrid encryption, OAEP, SAEP, | | Summary | Full Text:PDF(282.9KB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
IVs to Skip for Immunizing WEP against FMS Attack Kazukuni KOBARA Hideki IMAI | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2008/01/01
Vol. E91-B
No. 1
pp. 164-171
Type of Manuscript:
PAPER Category: Fundamental Theories for Communications Keyword: RC4, WEP, IEEE802.11, WLAN, FMS attack, | | Summary | Full Text:PDF(1.4MB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure Nuttapong ATTRAPADUNG Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A
No. 1
pp. 187-203
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Application Keyword: broadcast encryption, revocation scheme, | | Summary | Full Text:PDF(678KB) | |
|
Key-Dependent Weak IVs and Weak Keys in WEP--How to Trace Conditions Back to Their Patterns-- Kazukuni KOBARA Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/08/01
Vol. E89-A
No. 8
pp. 2198-2206
Type of Manuscript:
PAPER Category: Information Security Keyword: RC4, WEP, IEEE802.11, WLAN, FMS attack, | | Summary | Full Text:PDF(201.4KB) | |
|
An Efficient Group Signature Scheme from Bilinear Maps Jun FURUKAWA Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A
No. 5
pp. 1328-1338
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: group signature, bilinear map, efficient, | | Summary | Full Text:PDF(230.2KB) | |
|
|
|
|
|
|
|
Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions Masayuki ABE Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A
No. 1
pp. 99-105
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Protocol Keyword: Mix-net, anonymity, chosen-ciphertext attacks, security notion, | | Summary | Full Text:PDF(152.8KB) | |
|
Relation between the XL Algorithm and Grobner Basis Algorithms Makoto SUGITA Mitsuru KAWAZOE Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A
No. 1
pp. 11-18
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Symmetric Key Cryptography Keyword: algebraic attacks, Grobner basis algorithm, F4, XL algorithm, | | Summary | Full Text:PDF(199.4KB) | |
|
|
|
|
|
A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications SeongHan SHIN Kazukuni KOBARA Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/03/01
Vol. E88-A
No. 3
pp. 736-754
Type of Manuscript:
PAPER Category: Information Security Keyword: entropy of passwords, on-line and off-line attacks, authentication, key establishment protocol, leakage of stored secrets, proactive security, DDH problem, standard model, | | Summary | Full Text:PDF(524.8KB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Performance of SUD and MUD Interference Cancellation Receivers in Single-Cell and Multi-Cell CDMA Systems Jonas KARLSSON Hideki IMAI | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2003/10/01
Vol. E86-B
No. 10
pp. 2996-3003
Type of Manuscript:
PAPER Category: Wireless Communication Technology Keyword: interference cancellation, cellular systems, CDMA, | | Summary | Full Text:PDF(461.5KB) | |
|
|
|
|
|
|
|
Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model Kazukuni KOBARA Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A
No. 10
pp. 2229-2237
Type of Manuscript:
Special Section PAPER (Special Section on Information Theory and Its Applications) Category: Information Security Keyword: entropy of passwords, key exchange, authentication, DDH problem, standard model, | | Summary | Full Text:PDF(271.4KB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Modified Aggressive Mode of Internet Key Exchange Resistant against Denial-of-Service Attacks Kanta MATSUURA Hideki IMAI | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/05/25
Vol. E83-D
No. 5
pp. 972-979
Type of Manuscript:
Special Section PAPER (Special Issue on Next Generation Internet Technologies and Their Applications) Category: Keyword: Internet, security, IKE, Denial-of-Service, Cookie, | | Summary | Full Text:PDF(409.8KB) | |
|
|
|
A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF (q) and Time-Variant Table Miodrag MIHALJEVIC Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A
No. 1
pp. 32-39
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: data encryption, stream cipher, keystream generators, cellular automata, | | Summary | Full Text:PDF(155.7KB) | |
|
|
|
|
|
FOREWORD Shojiro SAKATA Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A
No. 11
pp. 2051-2051
Type of Manuscript:
FOREWORD Category: Keyword:
| | Summary | Full Text:PDF(111.9KB) | |
|
|
|
Multi-Dimensional Turbo Codes: Performance and Simplified Decoding Structure Jifeng LI Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A
No. 11
pp. 2089-2094
Type of Manuscript:
Special Section PAPER (Special Section on Information Theory and Its Applications) Category: Coding Theory Keyword: multi-dimensional turbo code, iterative decoding, MAP algorithm, interleaver, | | Summary | Full Text:PDF(451.2KB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Proving Identity in Three Moves Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/11/25
Vol. E74-A
No. 11
pp. 3602-3606
Type of Manuscript:
PAPER Category: Information Security and Cryptography Keyword:
| | Summary | Full Text:PDF(392.4KB) | |
|
Recent Applications of Error-Correcting Codes Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/09/25
Vol. E74-A
No. 9
pp. 2473-2482
Type of Manuscript:
INVITED PAPER (Special Issue on Information Theory and Its Applications) Category: Keyword:
| | Summary | Full Text:PDF(753.3KB) | |
|
New Decoding Techniques for Punctured Convolutional Codes Pisit CHARN KEIT KONG Yuichi SAITOH Kazuhiko YAMAGUCHI Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/09/25
Vol. E74-A
No. 9
pp. 2571-2578
Type of Manuscript:
Special Section PAPER (Special Issue on Information Theory and Its Applications) Category: Keyword:
| | Summary | Full Text:PDF(566.4KB) | |
|
New Binary Encoding Schemes of Positive Integers Yoko MIYAKAWA Yuichi SAITOH Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/09/25
Vol. E74-A
No. 9
pp. 2504-2512
Type of Manuscript:
Special Section PAPER (Special Issue on Information Theory and Its Applications) Category: Keyword:
| | Summary | Full Text:PDF(484.6KB) | |
|
Pseudo-Noise Sequences for Tracking and Data Relay Satellite and Related Systems Hidenobu FUKUMASA Ryuji HOHNO Hideki IMAI | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 1991/05/25
Vol. E74-B
No. 5
pp. 1137-1144
Type of Manuscript:
Special Section PAPER (Special Issue on Spread Spectrum Techniques and Its Applications) Category: Keyword:
| | Summary | Full Text:PDF(602.3KB) | |
|
Performance of Multihop Fast Frequency Hopping/Spread Spectrum Multiple Access System in a Selective Fading Channel Hideya YAMAMURA Ryuji KOHNO Hideki IMAI | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 1991/05/25
Vol. E74-B
No. 5
pp. 1145-1154
Type of Manuscript:
Special Section PAPER (Special Issue on Spread Spectrum Techniques and Its Applications) Category: Keyword:
| | Summary | Full Text:PDF(678KB) | |
|
Information Security of Spread Spectrum Systems Hideki IMAI Ryuji KOHNO Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/03/25
Vol. E74-A
No. 3
pp. 488-505
Type of Manuscript:
INVITED PAPER Category: Keyword:
| | Summary | Full Text:PDF(1.5MB) | |
|
Recent Development of Cryptology in Japan Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E
No. 7
pp. 1026-1030
Type of Manuscript:
REVIEW PAPER Category: Keyword:
| | Summary | Full Text:PDF(408.5KB) | |
|
|
|
Connections among Several Versions of One-Way Hash Functions Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E
No. 7
pp. 1092-1099
Type of Manuscript:
Special Section PAPER (Special Issue on Cryptography and Information Security) Category: Authentication Techniques Keyword:
| | Summary | Full Text:PDF(772.7KB) | |
|
On Generating Cryptographically Desirable Substitutions Kwangjo KIM Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E
No. 7
pp. 1031-1035
Type of Manuscript:
Special Section PAPER (Special Issue on Cryptography and Information Security) Category: Common-Key Systems Keyword:
| | Summary | Full Text:PDF(403.6KB) | |
|
Several Theorems on Probabilistic Cryptosystems Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/07/25
Vol. E72-E
No. 7
pp. 819-827
Type of Manuscript:
PAPER Category: Foundations of Data Security Keyword:
| | Summary | Full Text:PDF(788.4KB) | |
|
Residuosity Problem and Its Applications to Cryptography Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1988/08/25
Vol. E71-E
No. 8
pp. 759-767
Type of Manuscript:
PAPER Category: Foundations of Data Security Keyword:
| | Summary | Full Text:PDF(809.3KB) | |
|
On Seeking Smart Public-Key-Distribution Systems Tsutomu MATSUMOTO Youichi TAKASHIMA Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1986/02/25
Vol. E69-E
No. 2
pp. 99-106
Type of Manuscript:
PAPER Category: Information and Communication Theory Keyword:
| | Summary | Full Text:PDF(504.5KB) | |
|
A Cryptographically Useful Theorem on the Connection between Uni and Multivariate Polynomials Tsutomu MATSUMOTO Hideki IMAI Hiroshi HARASHIMA Hiroshi MIYAKAWA | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1985/03/25
Vol. E68-E
No. 3
pp. 139-146
Type of Manuscript:
PAPER Category: Cryptography Keyword:
| | Summary | Full Text:PDF(467.5KB) | |
|
Boolean-Function Representations of a Mapping Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1982/06/25
Vol. E65-E
No. 6
pp. 337-344
Type of Manuscript:
PAPER Category: Computers Keyword:
| | Summary | Full Text:PDF(592.7KB) | |
|