|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
The Sibling Intractable Function Family (SIFF): Notion, Construction and Applications Yuliang ZHENG Thomas HARDJONO Josef PIEPRZYK | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A
No. 1
pp. 4-13
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: information, security, cryptography, | | Summary | Full Text:PDF(983.9KB) | |
|
Proving Identity in Three Moves Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/11/25
Vol. E74-A
No. 11
pp. 3602-3606
Type of Manuscript:
PAPER Category: Information Security and Cryptography Keyword:
| | Summary | Full Text:PDF(392.4KB) | |
|
Connections among Several Versions of One-Way Hash Functions Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E
No. 7
pp. 1092-1099
Type of Manuscript:
Special Section PAPER (Special Issue on Cryptography and Information Security) Category: Authentication Techniques Keyword:
| | Summary | Full Text:PDF(772.7KB) | |
|
Several Theorems on Probabilistic Cryptosystems Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/07/25
Vol. E72-E
No. 7
pp. 819-827
Type of Manuscript:
PAPER Category: Foundations of Data Security Keyword:
| | Summary | Full Text:PDF(788.4KB) | |
|
Residuosity Problem and Its Applications to Cryptography Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1988/08/25
Vol. E71-E
No. 8
pp. 759-767
Type of Manuscript:
PAPER Category: Foundations of Data Security Keyword:
| | Summary | Full Text:PDF(809.3KB) | |
|