default search action
Akihiro Yamamura
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Takashi Kurokawa, Takuma Ito, Naoyuki Shinohara, Akihiro Yamamura, Shigenori Uchiyama:
Selection Strategy of F4-Style Algorithm to Solve MQ Problems Related to MPKC. Cryptogr. 7(1): 10 (2023) - [c24]Akihiro Yamamura:
Latin Hexahedra and Related Combinatorial Structures. CALDAM 2023: 351-362 - 2022
- [j12]Szilárd Zsolt Fazekas, Kaito Hoshi, Akihiro Yamamura:
The effect of jumping modes on various automata models. Nat. Comput. 21(1): 17-30 (2022) - [c23]Akihiro Yamamura:
Blind Decryption and Private Information Delivery. MobiSec 2022: 165-179 - 2021
- [j11]Szilárd Zsolt Fazekas, Kaito Hoshi, Akihiro Yamamura:
Two-way deterministic automata with jumping mode. Theor. Comput. Sci. 864: 92-102 (2021) - 2020
- [c22]Akihiro Yamamura, Riki Kase, Tatiana Baginová Jajcayová:
Groupoid Action and Rearrangement Problem of Bicolor Arrays by Prefix Reversals. CSR 2020: 419-431 - [c21]Szilárd Zsolt Fazekas, Kaito Hoshi, Akihiro Yamamura:
Two-Way Jumping Automata. FAW 2020: 108-120
2010 – 2019
- 2019
- [c20]Szilárd Zsolt Fazekas, Kaito Hoshi, Akihiro Yamamura:
Enhancement of Automata with Jumping Modes. Automata 2019: 62-76 - 2017
- [j10]Kohei Tsuya, Mayumi Takaya, Akihiro Yamamura:
Application of the firefly algorithm to the uncapacitated facility location problem. J. Intell. Fuzzy Syst. 32(4): 3201-3208 (2017) - 2016
- [j9]Szilárd Zsolt Fazekas, Kayoko Shikishima-Tsuji, Akihiro Yamamura:
Preface. Int. J. Found. Comput. Sci. 27(3): 301-304 (2016) - [j8]Hiroyuki Chigahara, Szilárd Zsolt Fazekas, Akihiro Yamamura:
One-Way Jumping Finite Automata. Int. J. Found. Comput. Sci. 27(3): 391- (2016) - 2015
- [c19]Yusuke Watanabe, Mayumi Takaya, Akihiro Yamamura:
Fitness Function in ABC Algorithm for Uncapacitated Facility Location Problem. ICT-EurAsia/CONFENIS 2015: 129-138 - [c18]Hikari Kato, Szilárd Zsolt Fazekas, Mayumi Takaya, Akihiro Yamamura:
Comparative Study of Monte-Carlo Tree Search and Alpha-Beta Pruning in Amazons. ICT-EurAsia/CONFENIS 2015: 139-148 - [c17]Akihiro Yamamura:
Rearranging Two Dimensional Arrays by Prefix Reversals. RP 2015: 153-165 - [c16]Hikari Kato, Mayumi Takaya, Akihiro Yamamura:
Analysis of a Monte Carlo Tree Search in Knight-Amazons. SCSE 2015: 31-38 - 2014
- [c15]Akihiro Yamamura:
Security Analysis of Public Key Encryptions Based on Conjugacy Search Problem. ICT-EurAsia 2014: 554-563 - 2013
- [j7]Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang:
Certificate-based proxy decryption systems with revocability in the standard model. Inf. Sci. 247: 188-201 (2013) - [j6]Mayumi Takaya, Yusuke Tsuruta, Akihiro Yamamura:
Reverse Turing Test using Touchscreens and CAPTCHA. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 4(3): 41-57 (2013) - [c14]Yusuke Tsuruta, Mayumi Takaya, Akihiro Yamamura:
CAPTCHA Suitable for Smartphones. ICT-EurAsia 2013: 131-140
2000 – 2009
- 2009
- [j5]DaeHun Nyang, Akihiro Yamamura:
More Efficient Threshold Signature Scheme in Gap Diffie-Hellman Group. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(7): 1720-1723 (2009) - [i1]Donna Dodson, Mikio Fujiwara, Philippe Grangier, Masahito Hayashi, Kentaro Imafuku, Ken-ichi Kitayama, Prem Kumar, Christian Kurtsiefer, Gaby Lenhart, Norbert Lütkenhaus, Tsutomu Matsumoto, William J. Munro, Tsuyoshi Nishioka, Momtchil Peev, Masahide Sasaki, Yutaka Sata, Atsushi Takada, Masahiro Takeoka, Kiyoshi Tamaki, Hidema Tanaka, Yasuhiro Tokura, Akihisa Tomita, Morio Toyoshima, Rodney Van Meter, Atsuhiro Yamagishi, Yoshihisa Yamamoto, Akihiro Yamamura:
Updating Quantum Cryptography Report ver. 1. CoRR abs/0905.4325 (2009) - 2008
- [j4]Yasumasa Hirai, Takashi Kurokawa, Shin'ichiro Matsuo, Hidema Tanaka, Akihiro Yamamura:
Classification of Hash Functions Suitable for Real-Life Systems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 64-73 (2008) - [c13]Yasuo Miyakawa, Takashi Kurokawa, Akihiro Yamamura, Yasushi Matsumoto:
Current Status of Japanese Government PKI Systems. EuroPKI 2008: 104-117 - 2007
- [c12]Akihiro Yamamura:
Homomorphic Encryptions of Sums of Groups. AAECC 2007: 357-366 - [c11]Akihiro Yamamura, Takashi Kurokawa, Junji Nakazato:
Threshold Anonymous Group Identification and Zero-Knowledge Proof. ACISP 2007: 370-384 - [c10]Junji Nakazato, Lihua Wang, Akihiro Yamamura:
Privacy Enhancing Credentials. ASIAN 2007: 55-61 - [c9]Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura:
A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power. INDOCRYPT 2007: 297-311 - 2005
- [c8]Duong Viet, Akihiro Yamamura, Hidema Tanaka:
Anonymous Password-Based Authenticated Key Exchange. INDOCRYPT 2005: 244-257 - 2004
- [c7]Hidema Tanaka, Osamu Takizawa, Akihiro Yamamura:
Evaluation and Improvement of the Tempest Fonts. WISA 2004: 457-469 - 2002
- [j3]Akihiro Yamamura:
Embedding Theorems for Groups Presented Via Partial Automorphisms: a Generalization of Semidirect Products and HNN Extensions. Int. J. Algebra Comput. 12(1-2): 51-83 (2002) - 2001
- [c6]Akihiro Yamamura, Taiichi Saito:
Private Information Retrieval Based on the Subgroup Membership Problem. ACISP 2001: 206-220 - [c5]Akihiro Yamamura, Hirokazu Ishizuka:
Error Detection and Authentication in Quantum Key Distribution. ACISP 2001: 260-273 - [c4]Akihiro Yamamura, Kaoru Kurosawa:
Generic Algorithms and Key Agreement Protocols Based on Group Actions. ISAAC 2001: 208-218 - 2000
- [c3]Akihiro Yamamura, Kaoru Kurosawa:
Key Agreement Protocol Securer than DLOG. Words, Languages & Combinatorics 2000: 450-465
1990 – 1999
- 1999
- [j2]Akihiro Yamamura:
Hnn Extensions of Semilattices. Int. J. Algebra Comput. 9(5): 555-596 (1999) - [c2]Akihiro Yamamura:
A Functional Cryptosystem Using a Group Action. ACISP 1999: 314-325 - 1998
- [c1]Akihiro Yamamura:
Public-Key Cryptosystems Using the Modular Group. Public Key Cryptography 1998: 203-216 - 1997
- [j1]Akihiro Yamamura:
HNN Extensions of Inverse Semigroups and Applications. Int. J. Algebra Comput. 7(5): 605-624 (1997)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint