default search action
Hideki Imai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [c221]Yoshinori Ogawa, Shingo Sato, Junji Shikata, Hideki Imai:
Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes. ISIT 2020: 868-873
2010 – 2019
- 2017
- [j136]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 34-49 (2017) - [j135]Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1846-1856 (2017) - 2016
- [j134]Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai:
Time-specific encryption from forward-secure encryption: generic and direct constructions. Int. J. Inf. Sec. 15(5): 549-571 (2016) - 2015
- [j133]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
On Finding Secure Domain Parameters Resistant to Cheon's Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(12): 2456-2470 (2015) - [j132]Rafael Tonicelli, Anderson C. A. Nascimento, Rafael Dowsley, Jörn Müller-Quade, Hideki Imai, Goichiro Hanaoka, Akira Otsuka:
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model. Int. J. Inf. Sec. 14(1): 73-84 (2015) - [c220]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Content and Key Management to Trace Traitors in Broadcasting Services. STM 2015: 236-252 - 2014
- [j131]Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai:
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. Int. J. Netw. Secur. 16(1): 19-28 (2014) - [c219]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
In search of secure domain parameters under strong diffie-hellman and related assumptions. ISITA 2014: 483-487 - 2013
- [j130]Manabu Inuma, Akira Otsuka, Hideki Imai:
A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack. IEICE Trans. Inf. Syst. 96-D(2): 357-364 (2013) - [c218]Takashi Kitagawa, Hiroki Kojima, Nuttapong Attrapadung, Hideki Imai:
Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption. ISC 2013: 87-99 - [c217]Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction. SECRYPT 2013: 339-346 - 2012
- [j129]Chen Yuan, Haibin Kan, Xin Wang, Hideki Imai:
A construction method of matroidal networks. Sci. China Inf. Sci. 55(11): 2445-2453 (2012) - [j128]Masakazu Yoshida, Manabu Hagiwara, Takayuki Miyadera, Hideki Imai:
A Numerical Evaluation of Entanglement Sharing Protocols Using Quantum LDPC CSS Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(9): 1561-1569 (2012) - [j127]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of grain-v1 employing normality order of the filter function. IET Inf. Secur. 6(2): 55-64 (2012) - [j126]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Inf. Process. Lett. 112(21): 805-810 (2012) - [j125]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128. Period. Math. Hung. 65(2): 205-227 (2012) - [j124]Kenta Kasai, Manabu Hagiwara, Hideki Imai, Kohichi Sakaniwa:
Quantum Error Correction Beyond the Bounded Distance Decoding Limit. IEEE Trans. Inf. Theory 58(2): 1223-1230 (2012) - [j123]Manabu Hagiwara, Marc P. C. Fossorier, Hideki Imai:
Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel. IEEE Trans. Inf. Theory 58(4): 2321-2329 (2012) - [c216]Kohei Kasamatsu, Takahiro Matsuda, Goichiro Hanaoka, Hideki Imai:
Ciphertext Policy Multi-dimensional Range Encryption. ICISC 2012: 247-261 - [c215]Masakazu Yoshida, Takayuki Miyadera, Hideki Imai:
Quantum key distribution using Mean King problem with modified measurement schemes. ISITA 2012: 317-321 - [c214]Xuedi Song, Kazukuni Kobara, Kentaro Imafuku, Hideki Imai:
HB♭ protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's response. ISITA 2012: 536-540 - [c213]Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai:
Time-Specific Encryption from Forward-Secure Encryption. SCN 2012: 184-204 - 2011
- [j122]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 725-734 (2011) - [j121]Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Nuttapong Attrapadung, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
Secure Broadcast System with Simultaneous Individual Messaging. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1328-1337 (2011) - [j120]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks. IEICE Trans. Inf. Syst. 94-D(11): 2095-2110 (2011) - [c212]Miodrag J. Mihaljevic, Hideki Imai, Michael W. David, Kazukuni Kobara, Hajime Watanabe:
On advanced cryptographic techniques for information security of smart grid AMI. CSIIRW 2011: 64 - [c211]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A secure public cloud storage system. ICITST 2011: 103-109 - [c210]Manabu Hagiwara, Kenta Kasai, Hideki Imai, Kohichi Sakaniwa:
Spatially coupled quasi-cyclic quantum LDPC codes. ISIT 2011: 638-642 - [c209]Kenta Kasai, Manabu Hagiwara, Hideki Imai, Kohichi Sakaniwa:
Non-binary quasi-cyclic quantum LDPC codes. ISIT 2011: 653-657 - [r2]Hideki Imai, Atsuhiro Yamagishi:
CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 285-288 - [i34]Manabu Hagiwara, Kenta Kasai, Hideki Imai, Kohichi Sakaniwa:
Spatially Coupled Quasi-Cyclic Quantum LDPC Codes. CoRR abs/1102.3181 (2011) - 2010
- [j119]Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz:
Efficient hybrid encryption from ID-based encryption. Des. Codes Cryptogr. 54(3): 205-240 (2010) - [j118]Hyunho Kang, Shoko Yonezawa, Manabu Inuma, Akira Otsuka, Hideki Imai:
Wolf fingerprints against minutiae count matching systems. IEICE Electron. Express 7(10): 738-744 (2010) - [j117]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 102-115 (2010) - [j116]Nuttapong Attrapadung, Hideki Imai:
Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 116-125 (2010) - [j115]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1086-1101 (2010) - [j114]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2092-2095 (2010) - [j113]Alexandra Boldyreva, Hideki Imai, Kazukuni Kobara:
How to Strengthen the Security of RSA-OAEP. IEEE Trans. Inf. Theory 56(11): 5876-5886 (2010) - [j112]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems. Wirel. Pers. Commun. 54(1): 225-236 (2010) - [c208]Jin Tamura, Kazukuni Kobara, Hanane Fathi, Hideki Imai:
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results. Financial Cryptography Workshops 2010: 47-56 - [c207]Tomohiro Sekino, Yang Cui, Kazukuni Kobara, Hideki Imai:
Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking. GLOBECOM 2010: 1-5 - [c206]Rei Yoshida, Yang Cui, Tomohiro Sekino, Rie Shigetomi, Akira Otsuka, Hideki Imai:
Practical Searching over Encrypted Data by Private Information Retrieval. GLOBECOM 2010: 1-5 - [c205]Manabu Hagiwara, Marc P. C. Fossorier, Hideki Imai:
LDPC codes with fixed initialization decoding over binary symmetric channel. ISIT 2010: 784-788 - [c204]Yasunori Onda, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication. ISITA 2010: 571-576 - [c203]Miodrag J. Mihaljevic, Hajime Watanabe, Hideki Imai:
A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding. ISITA 2010: 690-695 - [c202]Miodrag J. Mihaljevic, Hideki Imai:
A Security evaluation of certain stream ciphers which involve randomness and coding. ISITA 2010: 789-794 - [c201]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack. ISITA 2010: 911-916 - [c200]Masakazu Yoshida, Takayuki Miyadera, Hideki Imai:
On the security of the quantum key distribution using the Mean King Problem. ISITA 2010: 917-912 - [c199]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother. WISA 2010: 307-321 - [c198]Akira Otsuka, Hideki Imai:
Unconditionally Secure Electronic Voting. Towards Trustworthy Elections 2010: 107-123 - [i33]Kenta Kasai, Manabu Hagiwara, Hideki Imai, Kohichi Sakaniwa:
Quantum Error Correction beyond the Bounded Distance Decoding Limit. CoRR abs/1007.1778 (2010) - [i32]Miodrag J. Mihaljevic, Frédérique E. Oggier, Hideki Imai:
Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm. CoRR abs/1012.5895 (2010) - [i31]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Security Proof of AugPAKE. IACR Cryptol. ePrint Arch. 2010: 334 (2010)
2000 – 2009
- 2009
- [j111]Miodrag J. Mihaljevic, Hideki Imai:
An approach for stream ciphers design based on joint computing over random and secret data. Computing 85(1-2): 153-168 (2009) - [j110]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
An improvement of discrete Tardos fingerprinting codes. Des. Codes Cryptogr. 52(3): 339-362 (2009) - [j109]Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa:
Tag-KEM from Set Partial Domain One-Way Permutations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 42-52 (2009) - [j108]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 53-66 (2009) - [j107]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Hideki Imai, Takashi Kitagawa, Kazuto Ogawa, Hajime Watanabe:
An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 197-206 (2009) - [j106]José Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento:
A Novel Probabilistic Passive Attack on the Protocols HB and HB+. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(2): 658-662 (2009) - [j105]Huanfei Ma, Haibin Kan, Hideki Imai:
A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity. IEICE Trans. Commun. 92-B(2): 671-674 (2009) - [j104]Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
A Trade-off Traitor Tracing Scheme. IEICE Trans. Inf. Syst. 92-D(5): 859-875 (2009) - [j103]Rui Zhang, Hideki Imai:
Combining Public Key Encryption with Keyword Search and Public Key Encryption. IEICE Trans. Inf. Syst. 92-D(5): 888-896 (2009) - [j102]Yang Cui, Goichiro Hanaoka, Hideki Imai:
CCA-Secure Public Key Encryption without Group-Dependent Hash Functions. IEICE Trans. Inf. Syst. 92-D(5): 967-970 (2009) - [j101]Rui Zhang, Hideki Imai:
Strong Anonymous Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2487-2491 (2009) - [j100]Manabu Hagiwara, Marc P. C. Fossorier, Takashi Kitagawa, Hideki Imai:
Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(11): 2891-2894 (2009) - [j99]Hideki Imai, SeongHan Shin, Kazukuni Kobara:
New security layer for overlay networks. J. Commun. Networks 11(3): 211-228 (2009) - [c197]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. AAECC 2009: 149-158 - [c196]Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai:
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. AAECC 2009: 159-168 - [c195]Manabu Hagiwara, Takahiro Yoshida, Hideki Imai:
Bounds on the Number of Users for Random 2-Secure Codes. AAECC 2009: 239-242 - [c194]Nuttapong Attrapadung, Hideki Imai:
Dual-Policy Attribute Based Encryption. ACNS 2009: 168-185 - [c193]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
A generic construction of useful client puzzles. AsiaCCS 2009: 70-79 - [c192]Rui Zhang, Hideki Imai:
Constructing Better KEMs with Partial Message Recovery. Inscrypt 2009: 303-312 - [c191]Yoshihiro Kojima, Rie Shigetomi, Manabu Inuma, Akira Otsuka, Hideki Imai:
A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems. COST 2101/2102 Conference 2009: 293-300 - [c190]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. CT-RSA 2009: 16-31 - [c189]Manabu Inuma, Akira Otsuka, Hideki Imai:
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. ICB 2009: 806-815 - [c188]Yang Cui, Mingmei Li, Kazuya Yokoyama, Hideki Imai:
Efficient and Adaptively Secure Append-Only Signature. ICC 2009: 1-5 - [c187]Masatoshi Noguchi, Manabu Inuma, Rie Shigetomi, Hideki Imai:
An Image Sanitizing Scheme Using Digital Watermarking. ICICS 2009: 474-482 - [c186]Nuttapong Attrapadung, Hideki Imai:
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. IMACC 2009: 278-300 - [c185]Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai:
Generic Construction of Stateful Identity Based Encryption. ISC 2009: 338-346 - [c184]Nuttapong Attrapadung, Hideki Imai:
Conjunctive Broadcast and Attribute-Based Encryption. Pairing 2009: 248-265 - [c183]Gyesik Lee, Hisashi Oguma, Akira Yoshioka, Rie Shigetomi, Akira Otsuka, Hideki Imai:
Formally verifiable features in embedded vehicular security systems. VNC 2009: 1-7 - [c182]Shigenori Yamakawa, Yang Cui, Kazukuni Kobara, Hideki Imai:
Lightweight broadcast authentication protocols reconsidered. WCNC 2009: 3076-3081 - [i30]Manabu Inuma, Akira Otsuka, Hideki Imai:
Theoretical framework for constructing matching algorithms in biometric authentication systems. CoRR abs/0904.1284 (2009) - [i29]Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento:
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model. IACR Cryptol. ePrint Arch. 2009: 270 (2009) - [i28]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2009: 271 (2009) - [i27]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IACR Cryptol. ePrint Arch. 2009: 273 (2009) - 2008
- [j98]Hideki Imai, Manabu Hagiwara:
Error-correcting codes and cryptography. Appl. Algebra Eng. Commun. Comput. 19(3): 213-228 (2008) - [j97]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Protocols for purpose-restricted anonymous communications in IP-based wireless networks. Comput. Commun. 31(15): 3662-3671 (2008) - [j96]Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov:
Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptogr. 49(1-3): 289-305 (2008) - [j95]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Authenticated Key Exchange Protocol for Credential Services. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 139-149 (2008) - [j94]Kazukuni Kobara, Hideki Imai:
IVs to Skip for Immunizing WEP against FMS Attack. IEICE Trans. Commun. 91-B(1): 164-171 (2008) - [j93]Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai:
Invisibly Sanitizable Digital Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 392-402 (2008) - [j92]Masashi Une, Akira Otsuka, Hideki Imai:
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems. IEICE Trans. Inf. Syst. 91-D(5): 1380-1389 (2008) - [j91]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
RSA-Based Password-Authenticated Key Exchange, Revisited. IEICE Trans. Inf. Syst. 91-D(5): 1424-1438 (2008) - [j90]Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai:
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way. IEICE Trans. Inf. Syst. 91-D(5): 1457-1465 (2008) - [j89]Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions. IEICE Trans. Inf. Syst. 91-D(5): 1466-1476 (2008) - [j88]SeongHan Shin, Hanane Fathi, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai:
A New Security Architecture for Personal Networks and Its Performance Evaluation. IEICE Trans. Commun. 91-B(7): 2255-2264 (2008) - [j87]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(11): 3312-3324 (2008) - [j86]Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling:
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. Trans. Data Hiding Multim. Secur. 3: 23-32 (2008) - [j85]Hideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng:
Introduction to the Special Issue on Information Theoretic Security. IEEE Trans. Inf. Theory 54(6): 2405-2407 (2008) - [j84]Anderson C. A. Nascimento, João Barros, Stefan Skludarek, Hideki Imai:
The Commitment Capacity of the Gaussian Channel Is Infinite. IEEE Trans. Inf. Theory 54(6): 2785-2789 (2008) - [c181]Rui Zhang, Hideki Imai:
Strong Anonymous Signatures. Inscrypt 2008: 60-71 - [c180]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A security framework for personal networks. COMSWARE 2008: 682-690 - [c179]Hisashi Oguma, Akira Yoshioka, Makoto Nishikawa, Rie Shigetomi, Akira Otsuka, Hideki Imai:
New Attestation Based Security Architecture for In-Vehicle Communication. GLOBECOM 2008: 1909-1914 - [c178]Huanfei Ma, Qinghui Lan, Haibin Kan, Hideki Imai:
A Novel Quaternion Design Construction For STBC. ICC 2008: 2791-2795 - [c177]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ICISC 2008: 1-19 - [c176]Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe:
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. IWSEC 2008: 20-33 - [e7]Sihan Qing, Hideki Imai, Guilin Wang:
Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings. Lecture Notes in Computer Science 4861, Springer 2008, ISBN 978-3-540-77047-3 [contents] - [i26]José Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento:
A Novel Probabilistic Passive Attack on the Protocols HB and HB+. IACR Cryptol. ePrint Arch. 2008: 231 (2008) - [i25]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
An improvement of discrete Tardos fingerprinting codes. IACR Cryptol. ePrint Arch. 2008: 338 (2008) - [i24]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2008: 537 (2008) - 2007
- [j83]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off. IEEE Commun. Lett. 11(12): 988-990 (2007) - [j82]Nuttapong Attrapadung, Hideki Imai:
Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 187-203 (2007) - [j81]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(2): 474-490 (2007) - [j80]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(5): 1000-1011 (2007) - [j79]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(6): 1248-1251 (2007) - [j78]Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1803-1813 (2007) - [j77]Thi Lan Anh Phan, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1814-1829 (2007) - [j76]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Extension of Broadcasting Service by Using Electronic Tokens. IEICE Trans. Inf. Syst. 90-D(11): 1741-1750 (2007) - [j75]Marc P. C. Fossorier, Kazukuni Kobara, Hideki Imai:
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem. IEEE Trans. Inf. Theory 53(1): 402-411 (2007) - [j74]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Modeling Block Decoding Approaches for the Fast Correlation Attack. IEEE Trans. Inf. Theory 53(12): 4728-4737 (2007) - [c175]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths. AAECC 2007: 80-89 - [c174]Shigenori Yamakawa, Yang Cui, Kazukuni Kobara, Manabu Hagiwara, Hideki Imai:
On the Key-Privacy Issue of McEliece Public-Key Encryption. AAECC 2007: 168-177 - [c173]Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan:
Bounded CCA2-Secure Encryption. ASIACRYPT 2007: 502-518 - [c172]Rui Zhang, Hideki Imai:
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption. CANS 2007: 159-174 - [c171]Satoshi Fujitsu, Koji Nuida, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users. CCNC 2007: 1068-1072 - [c170]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
Orthogonality between Key Privacy and Data Privacy, Revisited. Inscrypt 2007: 313-327 - [c169]Jun Furukawa, Hideki Imai:
An Efficient Aggregate Shuffle Argument Scheme. Financial Cryptography 2007: 260-274 - [c168]Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai:
Algebraic Cryptanalysis of 58-Round SHA-1. FSE 2007: 349-365 - [c167]Masashi Une, Akira Otsuka, Hideki Imai:
Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems. ICB 2007: 396-406 - [c166]Wataru Kitada, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use. ICITS 2007: 133-145 - [c165]Hideki Imai, Kirill Morozov, Anderson C. A. Nascimento:
Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation. ICITS 2007: 183-194 - [c164]Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai:
Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount. Information Hiding 2007: 279-293 - [c163]Kazuto Ogawa, Go Ohtake, Goichiro Hanaoka, Hideki Imai:
Trade-Off Traitor Tracing. INDOCRYPT 2007: 331-340 - [c162]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Decimation-Based Fast Correlation Attack. ISIT 2007: 456-460 - [c161]Manabu Hagiwara, Hideki Imai:
Quantum Quasi-Cyclic LDPC Codes. ISIT 2007: 806-810 - [c160]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. IWSEC 2007: 444-458 - [c159]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A Practical Provider Authentication System for Bidirectional Broadcast Service. KES (3) 2007: 967-974 - [c158]Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai:
Anonymous Pay-TV System with Secure Revenue Sharing. KES (3) 2007: 984-991 - [c157]Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai:
Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack. PerCom Workshops 2007: 223-228 - [c156]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Protocols for Authenticated Anonymous Communications. PIMRC 2007: 1-5 - [c155]Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. ProvSec 2007: 68-84 - [c154]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for Signatures from Identity-Based Encryption. ProvSec 2007: 218-227 - [c153]Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka, Hideki Imai:
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services. WEWoRC 2007: 1-12 - [c152]Toru Hashimoto, Takashi Itoh, Masazumi Ueba, Hisato Iwai, Hideichi Sasaoka, Kazukuni Kobara, Hideki Imai:
Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. WISA 2007: 173-187 - [i23]Manabu Hagiwara, Hideki Imai:
Quantum Quasi-Cyclic LDPC Codes. CoRR abs/quant-ph/0701020 (2007) - [i22]Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz:
Efficient Hybrid Encryption from ID-Based Encryption. IACR Cryptol. ePrint Arch. 2007: 23 (2007) - [i21]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IACR Cryptol. ePrint Arch. 2007: 30 (2007) - 2006
- [j73]Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication. Comput. J. 49(3): 310-321 (2006) - [j72]Makoto Sugita, Mitsuru Kawazoe, Hideki Imai:
Relation between the XL Algorithm and Gröbner Basis Algorithms. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 11-18 (2006) - [j71]Masayuki Abe, Hideki Imai:
Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 99-105 (2006) - [j70]Tetsutaro Kobayashi, Kazumaro Aoki, Hideki Imai:
Efficient Algorithms for Tate Pairing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 134-143 (2006) - [j69]Abdulrahman Alharby, Hideki Imai:
Security Protocols Protection Based on Anomaly Detection. IEICE Trans. Inf. Syst. 89-D(1): 189-200 (2006) - [j68]Jun Furukawa, Hideki Imai:
An Efficient Group Signature Scheme from Bilinear Maps. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1328-1338 (2006) - [j67]Rie Shigetomi, Akira Otsuka, Jun Furukawa, Keith Martin, Hideki Imai:
A Provably Secure Refreshable Partially Anonymous Token and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1396-1406 (2006) - [j66]Kazukuni Kobara, Hideki Imai:
Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - . IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(8): 2198-2206 (2006) - [j65]Kentaro Imafuku, Hideki Imai:
A Dynamical Bifurcation of Distinguishability in Thermalization Processes, from Classical to Quantum. Inf. Media Technol. 1(1): 155-160 (2006) - [j64]Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura, Hideki Imai:
Relations among Notions of Security for Identity Based Encryption Schemes. Inf. Media Technol. 1(2): 929-941 (2006) - [j63]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad:
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links. IEEE J. Sel. Areas Commun. 24(9): 1725-1737 (2006) - [c151]Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, Hideki Imai:
Unconditionally Secure Chaffing-and-Winnowing: A Relationship Between Encryption and Authentication. AAECC 2006: 154-162 - [c150]Yang Cui, Kazukuni Kobara, Hideki Imai:
On Achieving Chosen Ciphertext Security with Decryption Errors. AAECC 2006: 173-182 - [c149]Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai:
Applying Fujisaki-Okamoto to Identity-Based Encryption. AAECC 2006: 183-192 - [c148]Manabu Hagiwara, Goichiro Hanaoka, Hideki Imai:
A Short Random Fingerprinting Code Against a Small Number of Pirates. AAECC 2006: 193-202 - [c147]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. AAECC 2006: 203-214 - [c146]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. ACISP 2006: 123-135 - [c145]Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. ACISP 2006: 348-359 - [c144]Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa:
Tag-KEM from Set Partial Domain One-Way Permutations. ACISP 2006: 360-370 - [c143]Jian Wang, Miodrag J. Mihaljevic, Lein Harn, Hideki Imai:
A Hierarchical Key Management Approach for Secure Multicast. ARCS 2006: 422-434 - [c142]Nuttapong Attrapadung, Jun Furukawa, Hideki Imai:
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys. ASIACRYPT 2006: 161-177 - [c141]Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. CANS 2006: 19-36 - [c140]Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai:
Digitally signed document sanitizing scheme based on bilinear maps. AsiaCCS 2006: 343-354 - [c139]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. CIS 2006: 767-777 - [c138]SeongHan Shin, Hanane Fathi, Mohamed Imine, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai:
A New Security Architecture for Personal Networks. GLOBECOM 2006 - [c137]Jun Furukawa, Kaoru Kurosawa, Hideki Imai:
An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge. ICALP (2) 2006: 46-57 - [c136]Tatsuyuki Matsushita, Hideki Imai:
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. ICICS 2006: 92-111 - [c135]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura:
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. INDOCRYPT 2006: 48-62 - [c134]Ryo Nojima, Kazukuni Kobara, Hideki Imai:
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. INDOCRYPT 2006: 303-316 - [c133]Hideki Imai, Kirill Morozov, Anderson C. A. Nascimento:
On the Oblivious Transfer Capacity of the Erasure Channel. ISIT 2006: 1428-1431 - [c132]Hideki Imai, Kirill Morozov, Anderson C. A. Nascimento, Andreas J. Winter:
Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations. ISIT 2006: 1432-1436 - [c131]João Barros, Hideki Imai, Anderson C. A. Nascimento, Stefan Skludarek:
Bit Commitment over Gaussian Channels. ISIT 2006: 1437-1441 - [c130]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
An Authentication and Key Exchange Protocol for Secure Credential Services. ISC 2006: 443-458 - [c129]Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. LATIN 2006: 130-141 - [c128]SeongHan Shin, Mohamed Imine, Hanane Fathi, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai:
A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks. PIMRC 2006: 1-5 - [c127]Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai:
Parallel Key-Insulated Public Key Encryption. Public Key Cryptography 2006: 105-122 - [c126]Akira Otsuka, Rie Shigetomi, Hideki Imai:
Lightweight Privacy for Ubiquitous Devices. SMC 2006: 1233-1237 - [c125]Masataka Suzuki, Kazukuni Kobara, Hideki Imai:
Privacy Enhanced and Light Weight RFID System without Tag Synchronization and Exhaustive Search. SMC 2006: 1250-1255 - [c124]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Next Wireless Security Architecture for MJPv6. SMC 2006: 1256-1261 - [c123]Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption. VIETCRYPT 2006: 366-384 - [e6]Marc P. C. Fossorier, Hideki Imai, Shu Lin, Alain Poli:
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings. Lecture Notes in Computer Science 3857, Springer 2006, ISBN 3-540-31423-7 [contents] - [i20]Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai:
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature. CoRR abs/cs/0610036 (2006) - [i19]Makoto Sugita, Mitsuru Kawazoe, Hideki Imai:
Gröbner Basis Based Cryptanalysis of SHA-1. IACR Cryptol. ePrint Arch. 2006: 98 (2006) - [i18]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura:
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication. IACR Cryptol. ePrint Arch. 2006: 197 (2006) - [i17]Goichiro Hanaoka, Hideki Imai:
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries. IACR Cryptol. ePrint Arch. 2006: 408 (2006) - 2005
- [j62]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Key management with minimized secret storage employing an erasure channel approach. IEEE Commun. Lett. 9(8): 741-743 (2005) - [j61]Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryôichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai:
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 239-246 (2005) - [j60]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(3): 736-754 (2005) - [j59]Tatsuyuki Matsushita, Hideki Imai:
A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(4): 1055-1062 (2005) - [j58]JaeGwi Choi, Goichiro Hanaoka, Kyung Hyune Rhee, Hideki Imai:
How to Break COT-Based Fingerprinting Schemes and Design New One. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(10): 2800-2807 (2005) - [j57]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad:
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks. IEEE J. Sel. Areas Commun. 23(11): 2182-2193 (2005) - [j56]Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Pim Tuyls, Andreas J. Winter:
An information theoretical model for quantum secret sharing. Quantum Inf. Comput. 5(1): 69-80 (2005) - [c122]Jun Furukawa, Hideki Imai:
An Efficient Group Signature Scheme from Bilinear Maps. ACISP 2005: 455-467 - [c121]Abdulrahman Alharby, Hideki Imai:
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns. ACNS 2005: 192-205 - [c120]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. ACNS 2005: 269-284 - [c119]Rui Zhang, Jun Furukawa, Hideki Imai:
Short Signature and Universal Designated Verifier Signature Without Random Oracles. ACNS 2005: 483-498 - [c118]Nuttapong Attrapadung, Hideki Imai:
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations. ASIACRYPT 2005: 100-120 - [c117]Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. ASIACRYPT 2005: 495-514 - [c116]Miodrag J. Mihaljevic, Hideki Imai:
Novel method for implementation of certain key management schemes to minimize secret storage. CCNC 2005: 54-59 - [c115]Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai:
How to Protect Peer-to-Peer Online Games from Cheats. CIG 2005 - [c114]Rui Zhang, Hideki Imai:
Improvements on Security Proofs of Some Identity Based Encryption Schemes. CISC 2005: 28-41 - [c113]Yang Cui, Kazukuni Kobara, Hideki Imai:
A Generic Conversion with Optimal Redundancy. CT-RSA 2005: 104-117 - [c112]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Security Weaknesses of Certain Broadcast Encryption Schemes. DRMTICS 2005: 228-245 - [c111]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. DRMTICS 2005: 258-276 - [c110]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. EuroPKI 2005: 191-205 - [c109]Hanane Fathi, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad:
On the impact of security on latency in WLAN 802.11b. GLOBECOM 2005: 5 - [c108]Jian Wang, Lein Harn, Hideki Imai:
Key Management for Multicast Fingerprinting. ICISS 2005: 191-204 - [c107]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. ICN (2) 2005: 944-952 - [c106]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. INDOCRYPT 2005: 155-168 - [c105]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
A secure traitor tracing scheme against key exposure. ISIT 2005: 1873-1877 - [c104]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
A unified analysis for the fast correlation attack. ISIT 2005: 2012-2015 - [c103]Abdulrahman Alharby, Hideki Imai:
Hybrid Intrusion Detection Model Based on Ordered Sequences. MMM-ACNS 2005: 352-365 - [c102]Hideki Imai:
Trends and Challenges for Securer Cryptography in Practice. Mycrypt 2005: 1 - [c101]Hideki Imai, SeongHan Shin, Kazukuni Kobara:
Authenticated key exchange for wireless security. WCNC 2005: 1180-1186 - [c100]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Network Storage System with Information Privacy. WEWoRC 2005: 22-31 - [r1]Hideki Imai, Atsuhiro Yamagishi:
Cryptrec. Encyclopedia of Cryptography and Security 2005 - [i16]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
A Secure Traitor Tracing Scheme against Key Exposure. CoRR abs/cs/0508011 (2005) - [i15]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Time-Data-Memory Trade-Off Based Cryptanalysis of Certain Broadcast Encryption Schemes. IACR Cryptol. ePrint Arch. 2005: 99 (2005) - [i14]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA". IACR Cryptol. ePrint Arch. 2005: 190 (2005) - [i13]Nuttapong Attrapadung, Yang Cui, Goichiro Hanaoka, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang:
Relations Among Notions of Security for Identity Based Encryption Schemes. IACR Cryptol. ePrint Arch. 2005: 258 (2005) - [i12]Nuttapong Attrapadung, Benoît Chevallier-Mames, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Efficient Identity-Based Encryption with Tight Security Reduction. IACR Cryptol. ePrint Arch. 2005: 320 (2005) - 2004
- [j55]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Efficient Unconditionally Secure Digital Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 120-130 (2004) - [j54]Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai:
Managing Encryption and Key Publication Independently in Digital Rights Management Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 160-172 (2004) - [j53]Motohiko Isaka, Marc P. C. Fossorier, Hideki Imai:
On the suboptimality of iterative decoding for turbo-like and LDPC codes with cycles in their graph representation. IEEE Trans. Commun. 52(5): 845-854 (2004) - [j52]Tadashi Minowa, Hideki Ochiai, Hideki Imai:
Phase-noise effects on turbo trellis-coded over M-ary coherent channels. IEEE Trans. Commun. 52(8): 1333-1343 (2004) - [c99]Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas J. Winter:
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. ACISP 2004: 62-73 - [c98]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
On the Security of Cryptosystems with All-or-Nothing Transform. ACNS 2004: 76-90 - [c97]Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. ACNS 2004: 355-368 - [c96]Tatsuyuki Matsushita, Hideki Imai:
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates. ASIACRYPT 2004: 260-275 - [c95]Gwénolé Ars, Jean-Charles Faugère, Hideki Imai, Mitsuru Kawazoe, Makoto Sugita:
Comparison Between XL and Gröbner Basis Algorithms. ASIACRYPT 2004: 338-353 - [c94]Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai:
Bit String Commitment Reductions with a Non-zero Rate. CT-RSA 2004: 179-193 - [c93]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. ICICS 2004: 375-387 - [c92]Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Andreas J. Winter:
Rates for bit commitment and coin tossing from noisy correlation. ISIT 2004: 45 - [c91]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374 - [c90]Miodrag J. Mihaljevic, Hideki Imai:
The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. SCN 2004: 310-323 - [c89]Jin Tamura, Kazukuni Kobara, Hideki Imai, Ramjee Prasad:
Application of trust-metrics for evaluating performance system in ad-hoc networks with privacy. WCNC 2004: 108-113 - [c88]Mira Kim, Kazukuni Kobara, Hideki Imai:
Dynamic Fingerprinting over Broadcast Using Revocation Scheme. WISA 2004: 251-263 - [i11]Makoto Sugita, Mitsuru Kawazoe, Hideki Imai:
Relation between XL algorithm and Gröbner Bases Algorithms. IACR Cryptol. ePrint Arch. 2004: 112 (2004) - [i10]Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. IACR Cryptol. ePrint Arch. 2004: 338 (2004) - 2003
- [j51]Makoto Sugita, Kazukuni Kobara, Hideki Imai:
Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1): 2-12 (2003) - [j50]Wataru Matsumoto, Weigang Xu, Hideki Imai:
Irregular Low-Density Parity-Check Code Design Based on Euclidean Geometries. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(7): 1820-1834 (2003) - [j49]Mira Kim, Junji Shikata, Hirofumi Muratani, Hideki Imai:
Constructing c-Secure CRT Codes Using Polynomials over Finite Fields. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(12): 3259-3266 (2003) - [j48]Kazukuni Kobara, Hideki Imai:
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC. IEEE Trans. Inf. Theory 49(12): 3160-3168 (2003) - [c87]Anderson C. A. Nascimento, Akira Otsuka, Hideki Imai, Jörn Müller-Quade:
Unconditionally Secure Homomorphic Pre-distributed Commitments. AAECC 2003: 87-97 - [c86]Masayuki Abe, Hideki Imai:
Flaws in Some Robust Optimistic Mix-Nets. ACISP 2003: 39-50 - [c85]Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai:
Separating Encryption and Key Issuance in Digital Rights Management Systems. ACISP 2003: 365-376 - [c84]Rui Zhang, Hideki Imai:
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem. ACNS 2003: 96-110 - [c83]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Leakage-Resilient Authenticated Key Establishment Protocols. ASIACRYPT 2003: 155-172 - [c82]Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai:
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. ASIACRYPT 2003: 374-391 - [c81]Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai:
Broadcast encryption with short keys and transmissions. Digital Rights Management Workshop 2003: 55-66 - [c80]Yang Cui, Kazukuni Kobara, Hideki Imai:
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. ICICS 2003: 269-279 - [c79]Andreas J. Winter, Anderson C. A. Nascimento, Hideki Imai:
Commitment Capacity of Discrete Memoryless Channels. IMACC 2003: 35-51 - [c78]Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai:
Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations. ISC 2003: 151-164 - [c77]Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
The Role of Arbiters in Asymmetric Authentication Schemes. ISC 2003: 428-441 - [c76]Yodai Watanabe, Junji Shikata, Hideki Imai:
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks. Public Key Cryptography 2003: 71-84 - [c75]Rie Shigetomi, Akira Otsuka, Hideki Imai:
Anonymous authentication scheme for XML security standard with Refreshable Tokens. XML Security 2003: 86-93 - [i9]Andreas J. Winter, Anderson C. A. Nascimento, Hideki Imai:
Commitment Capacity of Discrete Memoryless Channels. CoRR cs.CR/0304014 (2003) - [i8]Kazukuni Kobara, Hideki Imai:
Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions. IACR Cryptol. ePrint Arch. 2003: 38 (2003) - [i7]Andreas J. Winter, Anderson C. A. Nascimento, Hideki Imai:
Commitment Capacity of Discrete Memoryless Channels. IACR Cryptol. ePrint Arch. 2003: 165 (2003) - [i6]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? IACR Cryptol. ePrint Arch. 2003: 181 (2003) - 2002
- [j47]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
A Hierarchical Non-interactive Key-Sharing Scheme with Low Memory Size and High Resistance against Collusion Attacks. Comput. J. 45(3): 293-303 (2002) - [j46]Miodrag J. Mihaljevic, Hideki Imai:
Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 66-73 (2002) - [j45]Kazukuni Kobara, Hideki Imai:
Semantically Secure McEliece Public-Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 74-83 (2002) - [j44]Akira Otsuka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 140-148 (2002) - [j43]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
A Traitor Traceable Conference System with Dynamic Sender. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 167-174 (2002) - [j42]Tadashi Minowa, Hideki Imai:
Effect of Noisy Estimation on Turbo-Coded Modulation over Flat Rayleigh Fading Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(10): 2211-2219 (2002) - [j41]Kazukuni Kobara, Hideki Imai:
Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(10): 2229-2237 (2002) - [j40]Hideki Ochiai, Hideki Imai:
Performance analysis of deliberately clipped OFDM signals. IEEE Trans. Commun. 50(1): 89-101 (2002) - [j39]Mohammad Ghulam Rahman, Hideki Imai:
Security in Wireless Communication. Wirel. Pers. Commun. 22(2): 213-228 (2002) - [c74]Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication. ASIACRYPT 2002: 81-99 - [c73]Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes. EUROCRYPT 2002: 434-449 - [c72]Motohiko Isaka, Marc P. C. Fossorier, Hideki Imai:
Iterative reliability-based decoding of turbo-like codes. ICC 2002: 1495-1500 - [c71]Kanta Matsuura, Hideki Imai:
Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal. ICEIS 2002: 962-967 - [c70]Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. ICICS 2002: 85-96 - [c69]Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai:
An Anonymous Loan System Based on Group Signature Scheme. ISC 2002: 244-256 - [c68]Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Traceability Schemes for Signed Documents. ISC 2002: 257-271 - [c67]Hideki Imai, Goichiro Hanaoka, Junji Shikata, Akira Otsuka, Anderson C. A. Nascimento:
Cryptography with information theoretic security. ITW 2002: 73 - [c66]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Public Key Cryptography 2002: 64-79 - [c65]Kazukuni Kobara, Hideki Imai:
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. Public Key Cryptography 2002: 237-251 - [c64]Paul Camion, Miodrag J. Mihaljevic, Hideki Imai:
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). Selected Areas in Cryptography 2002: 196-213 - [i5]Yodai Watanabe, Junji Shikata, Hideki Imai:
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. IACR Cryptol. ePrint Arch. 2002: 33 (2002) - [i4]Kazukuni Kobara, Hideki Imai:
OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives. IACR Cryptol. ePrint Arch. 2002: 130 (2002) - 2001
- [j38]Anderson C. A. Nascimento, Jörn Müller-Quade, Hideki Imai:
Quantum Identification Protocol with Technologically Bounded Parties. Electron. Notes Discret. Math. 6: 15-24 (2001) - [j37]Motohiko Isaka, Hideki Imai:
On the iterative decoding of multilevel codes. IEEE J. Sel. Areas Commun. 19(5): 935-943 (2001) - [j36]Hideki Ochiai, Hideki Imai:
On the distribution of the peak-to-average power ratio in OFDM signals. IEEE Trans. Commun. 49(2): 282-289 (2001) - [c63]Makoto Sugita, Kazukuni Kobara, Hideki Imai:
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. ASIACRYPT 2001: 193-207 - [c62]Yuji Watanabe, Goichiro Hanaoka, Hideki Imai:
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents. CT-RSA 2001: 392-407 - [c61]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Fast Correlation Attack Algorithm with List Decoding and an Application. FSE 2001: 196-210 - [c60]Tadashi Minowa, Hideki Imai:
Decoding of high-rate turbo codes using a syndrome trellis. ICC 2001: 74-78 - [c59]Kazukuni Kobara, Hideki Imai:
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. Public Key Cryptography 2001: 19-35 - [c58]Hirotaka Komaki, Yuji Watanabe, Goichiro Hanaoka, Hideki Imai:
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability. Public Key Cryptography 2001: 225-239 - [i3]Jörn Müller-Quade, Hideki Imai:
More Robust Multiparty Protocols with Oblivious Transfer. CoRR cs.CR/0101020 (2001) - [i2]Kazukuni Kobara, Hideki Imai:
Pretty-Simple Password-Authenticated Key-Exchange Protocol. CoRR cs.CR/0110024 (2001) - 2000
- [j35]Xian-Mo Zhang, Yuliang Zheng, Hideki Imai:
Relating Differential Distribution Tables to Other Properties of of Substitution Boxes. Des. Codes Cryptogr. 19(1): 45-63 (2000) - [j34]Hideki Ochiai, Marc P. C. Fossorier, Hideki Imai:
On decoding of block codes with peak-power reduction in OFDM systems. IEEE Commun. Lett. 4(7): 226-228 (2000) - [j33]Hideki Ochiai, Hideki Imai:
Performance of the deliberate clipping with adaptive symbol selection for strictly band-limited OFDM systems. IEEE J. Sel. Areas Commun. 18(11): 2270-2277 (2000) - [j32]Robert Morelos-Zaragoza, Marc P. C. Fossorier, Shu Lin, Hideki Imai:
Multilevel coded modulation for unequal error protection and multistage decoding .I. Symmetric constellations. IEEE Trans. Commun. 48(2): 204-213 (2000) - [j31]Motohiko Isaka, Marc P. C. Fossorier, Robert Morelos-Zaragoza, Shu Lin, Hideki Imai:
Multilevel coded modulation for unequal error protection and multistage decoding. II. Asymmetric constellations. IEEE Trans. Commun. 48(5): 774-786 (2000) - [j30]Hideki Ochiai, Hideki Imai:
MDPSK-OFDM with highly power-efficient block codes for frequency-selective fading channels. IEEE Trans. Veh. Technol. 49(1): 74-82 (2000) - [c57]Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai:
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. AES Candidate Conference 2000: 242-254 - [c56]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Unconditionally Secure Digital Signature Schemes Admitting Transferability. ASIACRYPT 2000: 130-142 - [c55]Hideki Imai, Atsuhiro Yamagishi:
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. ASIACRYPT 2000: 399-400 - [c54]Yuji Watanabe, Hideki Imai:
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP. CCS 2000: 80-86 - [c53]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. FSE 2000: 196-212 - [c52]Tadashi Minowa, Hideki Imai:
Reduced-complexity iterative decoding of high-rate turbo codes. GLOBECOM 2000: 193-197 - [c51]Hideki Ochiai, Hideki Imai:
On clipping for peak power reduction of OFDM signals. GLOBECOM 2000: 731-735 - [c50]Daisuke Nojiri, Goichiro Hanaoka, Hideki Imai:
A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation. ISW 2000: 224-236 - [e5]Hideki Imai, Yuliang Zheng:
Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings. Lecture Notes in Computer Science 1751, Springer 2000, ISBN 3-540-66967-1 [contents] - [i1]Jörn Müller-Quade, Hideki Imai:
Anonymous Oblivious Transfer. CoRR cs.CR/0011004 (2000)
1990 – 1999
- 1999
- [j29]Hideki Ochiai, Hideki Imai:
Performance of OFDM-CDMA with Simple Peak Power Reduction. Eur. Trans. Telecommun. 10(4): 391-398 (1999) - [j28]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Reduced complexity iterative decoding of low-density parity check codes based on belief propagation. IEEE Trans. Commun. 47(5): 673-680 (1999) - [j27]Yuliang Zheng, Xian-Mo Zhang, Hideki Imai:
Restriction, Terms and Nonlinearity of Boolean Functions. Theor. Comput. Sci. 226(1-2): 207-223 (1999) - [c49]Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai:
Critical Noise for Convergence of Iterative Probabilistic Decoding with Belief Propagation in Cryptographic Applications. AAECC 1999: 282-293 - [c48]Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai:
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. ASIACRYPT 1999: 86-102 - [c47]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks. ASIACRYPT 1999: 348-362 - [c46]Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai:
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography. EUROCRYPT 1999: 190-205 - [c45]Markus Breitbach, Hideki Imai:
On Channel Capacity and Modulation of Watermarks in Digital Still Images. Financial Cryptography 1999: 125-139 - [c44]Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai:
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks. ICICS 1999: 157-168 - [c43]Kazukuni Kobara, Hideki Imai:
On the Channel Capacity of Narrow-Band Subliminal Channels. ICICS 1999: 309-323 - [c42]Yuji Watanabe, Hideki Imai:
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. ISW 1999: 118-135 - [c41]Tsuyoshi Nishioka, Goichiro Hanaoka, Hideki Imai:
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. ISW 1999: 259-270 - [c40]Yuji Watanabe, Hideki Imai:
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret. Public Key Cryptography 1999: 290-305 - [e4]Marc P. C. Fossorier, Hideki Imai, Shu Lin, Alain Poli:
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 13th International Symposium, AAECC-13, Honolulu, Hawaii, USA, November 15-19, 1999, Proceedings. Lecture Notes in Computer Science 1719, Springer 1999, ISBN 3-540-66723-7 [contents] - [e3]Hideki Imai, Yuliang Zheng:
Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings. Lecture Notes in Computer Science 1560, Springer 1999, ISBN 3-540-65644-8 [contents] - 1998
- [j26]Yuliang Zheng, Hideki Imai:
How to Construct Efficient Signcryption Schemes on Elliptic Curves. Inf. Process. Lett. 68(5): 227-233 (1998) - [j25]Robert Morelos-Zaragoza, Tadao Kasami, Shu Lin, Hideki Imai:
On block-coded modulation using unequal error protection codes over Rayleigh-fading channels. IEEE Trans. Commun. 46(1): 1-4 (1998) - [j24]Robert Morelos-Zaragoza, Hideki Imai:
Binary multilevel convolutional codes with unequal error protection capabilities. IEEE Trans. Commun. 46(7): 850-853 (1998) - [j23]Daniel J. Costello Jr., Joachim Hagenauer, Hideki Imai, Stephen B. Wicker:
Applications of Error-Control Coding. IEEE Trans. Inf. Theory 44(6): 2531-2560 (1998) - [c39]Goichiro Hanaoka, Yuliang Zheng, Hideki Imai:
LITESET: A Light-Weight Secure Electronic Transaction Protocol. ACISP 1998: 215-226 - [c38]Hideki Ochiai, Hideki Imai:
OFDM-CDMA with peak power reduction based on the spreading sequences. ICC 1998: 1299-1303 - [c37]Kazukuni Kobara, Hideki Imai:
A successive carrier-transmission model for narrow-band subliminal channels. ICISC 1998: 179-187 - [c36]Yuliang Zheng, Hideki Imai:
Compact and Unforgeable Key Establishment over an ATM Network. INFOCOM 1998: 411-418 - [c35]Miodrag J. Mihaljevic, Yuliang Zheng, Hideki Imai:
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation. Public Key Cryptography 1998: 217-233 - [c34]Kanta Matsuura, Yuliang Zheng, Hideki Imai:
Compact and Flexible Resolution of CBT Multicast Key-Distribution. WWCA 1998: 190-205 - [e2]Hideki Imai, Yuliang Zheng:
Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings. Lecture Notes in Computer Science 1431, Springer 1998, ISBN 3-540-64693-0 [contents] - 1997
- [c33]Xian-Mo Zhang, Yuliang Zheng, Hideki Imai:
Duality of Boolean functions and its cryptographic significance. ICICS 1997: 159-169 - [c32]Kazukuni Kobara, Hideki Imai:
Self-synchronized message randomization methods for subliminal channels. ICICS 1997: 325-334 - 1996
- [j22]P. CharnKeitKong, Hideki Imai, Kazuhiko Yamaguchi:
On classes of rate k/(k+1) convolutional codes and their decoding techniques. IEEE Trans. Inf. Theory 42(6): 2181-2193 (1996) - [c31]Kazukuni Kobara, Hideki Imai:
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. ASIACRYPT 1996: 185-195 - 1995
- [j21]Ahmed Saifuddin, Ryuji Kohno, Hideki Imai:
Integrated receiver structure of staged decoder and CCI canceller for CDMA with multilevel coded modulation. Eur. Trans. Telecommun. 6(1): 9-19 (1995) - [j20]Keiichi Iwamura, Yasunori Dohi, Hideki Imai:
A Design of Reed-Solomon Decoder with Systolic Array Structure. IEEE Trans. Computers 44(1): 118-122 (1995) - 1994
- [j19]Tetsuo Mabuchi, Ryuji Kohno, Hideki Imai:
Multiuser detection scheme based on canceling cochannel interference for MFSK/FH-SSMA system. IEEE J. Sel. Areas Commun. 12(4): 593-604 (1994) - [j18]Hidenobu Fukumasa, Ryuji Kohno, Hideki Imai:
Design of pseudonoise sequences with good odd and even correlation properties for DS/CDMA. IEEE J. Sel. Areas Commun. 12(5): 828-836 (1994) - [c30]Hideki Imai:
Information Security Aspects of Spread Spectrum Systems. ASIACRYPT 1994: 193-208 - 1993
- [j17]Young C. Yoon, Ryuji Kohno, Hideki Imai:
A Spread-Spectrum Multiaccess System with Cochannel Interference Cancellation for Multipath Fading Channels. IEEE J. Sel. Areas Commun. 11(7): 1067-1075 (1993) - [j16]Yuichi Saitoh, Hideki Imai:
Some Codes for Correcting and Detecting Unidirectional Byte Errors. IEEE Trans. Computers 42(5): 547-552 (1993) - [j15]Yuichi Saitoh, Hideki Imai:
Generalized concatenated codes for channels where unidirectional byte errors are predominant. IEEE Trans. Inf. Theory 39(3): 1014-1022 (1993) - [c29]Yuichi Saitoh, Ikuyo Ibe, Hideki Imai:
Peak-Shift and Bit Error-Correction with Channel Side Information in Runlength-Limited Sequences. AAECC 1993: 304-315 - [e1]Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto:
Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings. Lecture Notes in Computer Science 739, Springer 1993, ISBN 3-540-57332-1 [contents] - 1992
- [c28]Tsutomu Matsumoto, Hideki Imai, Chi-Sung Laih, Sung-Ming Yen:
On Verifiable Implicit Asking Protocols for RSA Computation. AUSCRYPT 1992: 296-307 - [c27]Manuel Cerecedo, Tsutomu Matsumoto, Hideki Imai:
Non-Interactive Generation of Shared Pseudorandom Sequences. AUSCRYPT 1992: 385-396 - [c26]Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai:
High-Speed Implementation Methods for RSA Scheme. EUROCRYPT 1992: 221-238 - [c25]Keiichi Iwamura, Tsutomu Matsumoto, Hideki Imai:
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract). EUROCRYPT 1992: 477-481 - [c24]Ryuji Kohno, Hefeng Wang, Hideki Imai:
Adaptive array antenna combined with tapped delay line using processing gain for spread-spectrum CDMA systems. PIMRC 1992: 634-638 - 1991
- [j14]Ryuji Kohno, Hideki Imai:
Combination of decoding of error-correcting codes and equalization for channels with intersymbol interference. Discret. Appl. Math. 33(1-3): 129-146 (1991) - [j13]Yuichi Saitoh, Hideki Imai:
Multiple unidirectional byte error-correcting codes. IEEE Trans. Inf. Theory 37(3): 903-908 (1991) - [c23]Yuichi Saitoh, Hideki Imai:
Random and Byte Error Correcting Codes for Asymmetric or Undirectional Error Control. AAECC 1991: 403-413 - [c22]Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai:
A Multi-Purpose Proof System - for Identity and Membership Proofs. ASIACRYPT 1991: 397-411 - [c21]Tsutomu Matsumoto, Hideki Imai:
Human Identification Through Insecure Channel. EUROCRYPT 1991: 409-421 - [c20]Ryuji Kohno, Choonsik Yim, Hideki Imai:
Array Antenna Beamforming Based On Estimation Of Arrival Angles Using DFT On Spatial Domain. PIMRC 1991: 38-43 - 1990
- [j12]Ryuji Kohno, Hideki Imai, Mitsutoshi Hatori, Subbarayan Pasupathy:
Combination of an Adaptive Array Antenna and a Canceller of Interference for Direct-Sequence Spread-Spectrum Multiple-Access System. IEEE J. Sel. Areas Commun. 8(4): 675-681 (1990) - [j11]Ryuji Kohno, Hideki Imai, Mitsutoshi Hatori, Subbarayan Pasupathy:
An Adaptive Canceller of Cochannel Interference for Spread-Spectrum Multiple-Access Communication Networks in a Power Line. IEEE J. Sel. Areas Commun. 8(4): 691-699 (1990) - [j10]Yuichi Saitoh, Kazuhiko Yamaguchi, Hideki Imai:
Some new binary codes correcting asymmetric/unidirectional errors. IEEE Trans. Inf. Theory 36(3): 645-647 (1990) - [c19]Kazuhiko Yamaguchi, Hideki Imai:
Periodic Sequences for Absolute Type Shaft Encoders. AAECC 1990: 36-45 - [c18]Yuichi Saitoh, Hideki Imai:
Constructions of Codes Correcting Burst Asymmetric Errors. AAECC 1990: 59-70 - [c17]Ryuji Kohno, Choonsik Yim, Hideki Imai:
Trellis Coded Modulation Based on Time-Varying Mapping and Encoders for Utilitzing a Channel Intersymbol Interference. AAECC 1990: 132-143 - [c16]Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai:
Duality between Two Cryptographic Primitives. AAECC 1990: 379-390 - [c15]Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai:
Structural Properties of One-way Hash Functions. CRYPTO 1990: 285-302 - [c14]Kwangjo Kim, Tsutomu Matsumoto, Hideki Imai:
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion. CRYPTO 1990: 564-574 - [c13]Ryuji Kohno, Mitsuru Arai, Hideki Imai:
Image compression using a neural network with learning capability of variable function of a neural unit. VCIP 1990
1980 – 1989
- 1989
- [c12]Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai:
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. CRYPTO 1989: 461-480 - [c11]Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai:
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract). EUROCRYPT 1989: 412-422 - [c10]Ryuji Kohno, Hideki Imai, Subbarayan Pasupathy:
An automatic equalizer including a Viterbi decoder for trellis coded modulation system. ICASSP 1989: 1368-1371 - 1988
- [c9]Kazuhiko Yamaguchi, Hideki Imai:
A Study on Imai-Hirakawa Trellis-Coded Modulation Schemes. AAECC 1988: 443-453 - [c8]Tsutomu Matsumoto, Koki Kato, Hideki Imai:
Speeding Up Secret Computations with Insecure Auxiliary Devices. CRYPTO 1988: 497-506 - [c7]Tsutomu Matsumoto, Hideki Imai:
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption. EUROCRYPT 1988: 419-453 - 1987
- [j9]Hirokazu Okano, Hideki Imai:
A Construction Method of High-Speed Decoders Using ROMS's for Bose-Chaudhuri-Hocquenghem and Reed-Solomon Codes. IEEE Trans. Computers 36(10): 1165-1171 (1987) - [c6]Hideki Imai, Tsutomu Matsumoto:
Coding Theory and its Applications in Japan. AAECC 1987: 301-305 - [c5]Tsutomu Matsumoto, Hideki Imai:
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem. CRYPTO 1987: 185-193 - 1986
- [c4]Ryuji Kohno, Subbarayan Pasupathy, Hideki Imai, Mitsutoshi Hatori:
A robust ADPCM system using an error-correcting code. ICASSP 1986: 3091-3094 - 1985
- [j8]Ryuji Kohno, Hideki Imai, Mitsutoshi Hatori:
Design of Automatic Equalizer Including a Decoder of Error-Correcting Code. IEEE Trans. Commun. 33(10): 1142-1146 (1985) - [c3]Hideki Imai, Tsutomu Matsumoto:
Algebraic Methods for Constructing Asymmetric Cryptosystems. AAECC 1985: 108-119 - 1984
- [c2]Hideki Imai:
Multivariate polynomials in coding theory. AAECC 1984: 36-60 - 1981
- [j7]Hideki Imai, Hiroshi Fujiya:
Generalized tensor product codes. IEEE Trans. Inf. Theory 27(2): 181-186 (1981) - [c1]Susumu Suzuki, Hideki Imai:
On Optimal Partition of a Query Set into Subsets Having the Consecutive Retrieval Property. FODO 1981: 75-97
1970 – 1979
- 1977
- [j6]Hideki Imai:
A Theory of Two-Dimensional Cyclic Codes. Inf. Control. 34(1): 1-21 (1977) - [j5]Hideki Imai, Shuji Hirakawa:
A new multilevel coding method using error-correcting codes. IEEE Trans. Inf. Theory 23(3): 371-377 (1977) - [j4]Hideki Imai, Shuji Hirakawa:
Correction to 'A New Multilevel Coding Method Using Error-Correcting Codes'. IEEE Trans. Inf. Theory 23(6): 784 (1977) - 1974
- [j3]Hideki Imai:
A construction method for path-invariant comma-free codes (Corresp.). IEEE Trans. Inf. Theory 20(4): 555-559 (1974) - 1973
- [j2]Hideki Imai:
Two-dimensional Fire codes. IEEE Trans. Inf. Theory 19(6): 796-806 (1973) - 1972
- [j1]Tamiya Nomura, Hiroshi Miyakawa, Hideki Imai, Akira Fukuda:
A theory of two-dimensional linear recurring arrays. IEEE Trans. Inf. Theory 18(6): 775-785 (1972)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint