default search action
Hideki Imai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [c221]Yoshinori Ogawa, Shingo Sato, Junji Shikata, Hideki Imai:
Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes. ISIT 2020: 868-873
2010 – 2019
- 2017
- [j136]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 34-49 (2017) - [j135]Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1846-1856 (2017) - 2016
- [j134]Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai:
Time-specific encryption from forward-secure encryption: generic and direct constructions. Int. J. Inf. Sec. 15(5): 549-571 (2016) - 2015
- [j133]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
On Finding Secure Domain Parameters Resistant to Cheon's Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(12): 2456-2470 (2015) - [j132]Rafael Tonicelli, Anderson C. A. Nascimento, Rafael Dowsley, Jörn Müller-Quade, Hideki Imai, Goichiro Hanaoka, Akira Otsuka:
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model. Int. J. Inf. Sec. 14(1): 73-84 (2015) - [c220]Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Content and Key Management to Trace Traitors in Broadcasting Services. STM 2015: 236-252 - 2014
- [j131]Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai:
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. Int. J. Netw. Secur. 16(1): 19-28 (2014) - [c219]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
In search of secure domain parameters under strong diffie-hellman and related assumptions. ISITA 2014: 483-487 - 2013
- [j130]Manabu Inuma, Akira Otsuka, Hideki Imai:
A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack. IEICE Trans. Inf. Syst. 96-D(2): 357-364 (2013) - [c218]Takashi Kitagawa, Hiroki Kojima, Nuttapong Attrapadung, Hideki Imai:
Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption. ISC 2013: 87-99 - [c217]Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction. SECRYPT 2013: 339-346 - 2012
- [j129]Chen Yuan, Haibin Kan, Xin Wang, Hideki Imai:
A construction method of matroidal networks. Sci. China Inf. Sci. 55(11): 2445-2453 (2012) - [j128]Masakazu Yoshida, Manabu Hagiwara, Takayuki Miyadera, Hideki Imai:
A Numerical Evaluation of Entanglement Sharing Protocols Using Quantum LDPC CSS Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(9): 1561-1569 (2012) - [j127]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of grain-v1 employing normality order of the filter function. IET Inf. Secur. 6(2): 55-64 (2012) - [j126]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Internal state recovery of keystream generator LILI-128 based on a novel weakness of the employed Boolean function. Inf. Process. Lett. 112(21): 805-810 (2012) - [j125]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
Generic cryptographic weakness of k-normal Boolean functions in certain stream ciphers and cryptanalysis of grain-128. Period. Math. Hung. 65(2): 205-227 (2012) - [j124]Kenta Kasai, Manabu Hagiwara, Hideki Imai, Kohichi Sakaniwa:
Quantum Error Correction Beyond the Bounded Distance Decoding Limit. IEEE Trans. Inf. Theory 58(2): 1223-1230 (2012) - [j123]Manabu Hagiwara, Marc P. C. Fossorier, Hideki Imai:
Fixed Initialization Decoding of LDPC Codes Over a Binary Symmetric Channel. IEEE Trans. Inf. Theory 58(4): 2321-2329 (2012) - [c216]Kohei Kasamatsu, Takahiro Matsuda, Goichiro Hanaoka, Hideki Imai:
Ciphertext Policy Multi-dimensional Range Encryption. ICISC 2012: 247-261 - [c215]Masakazu Yoshida, Takayuki Miyadera, Hideki Imai:
Quantum key distribution using Mean King problem with modified measurement schemes. ISITA 2012: 317-321 - [c214]Xuedi Song, Kazukuni Kobara, Kentaro Imafuku, Hideki Imai:
HB♭ protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's response. ISITA 2012: 536-540 - [c213]Kohei Kasamatsu, Takahiro Matsuda, Keita Emura, Nuttapong Attrapadung, Goichiro Hanaoka, Hideki Imai:
Time-Specific Encryption from Forward-Secure Encryption. SCN 2012: 184-204 - 2011
- [j122]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(2): 725-734 (2011) - [j121]Arisa Fujii, Go Ohtake, Goichiro Hanaoka, Nuttapong Attrapadung, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
Secure Broadcast System with Simultaneous Individual Messaging. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1328-1337 (2011) - [j120]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks. IEICE Trans. Inf. Syst. 94-D(11): 2095-2110 (2011) - [c212]Miodrag J. Mihaljevic, Hideki Imai, Michael W. David, Kazukuni Kobara, Hajime Watanabe:
On advanced cryptographic techniques for information security of smart grid AMI. CSIIRW 2011: 64 - [c211]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A secure public cloud storage system. ICITST 2011: 103-109 - [c210]Manabu Hagiwara, Kenta Kasai, Hideki Imai, Kohichi Sakaniwa:
Spatially coupled quasi-cyclic quantum LDPC codes. ISIT 2011: 638-642 - [c209]Kenta Kasai, Manabu Hagiwara, Hideki Imai, Kohichi Sakaniwa:
Non-binary quasi-cyclic quantum LDPC codes. ISIT 2011: 653-657 - [r2]Hideki Imai, Atsuhiro Yamagishi:
CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project). Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 285-288 - [i34]Manabu Hagiwara, Kenta Kasai, Hideki Imai, Kohichi Sakaniwa:
Spatially Coupled Quasi-Cyclic Quantum LDPC Codes. CoRR abs/1102.3181 (2011) - 2010
- [j119]Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz:
Efficient hybrid encryption from ID-based encryption. Des. Codes Cryptogr. 54(3): 205-240 (2010) - [j118]Hyunho Kang, Shoko Yonezawa, Manabu Inuma, Akira Otsuka, Hideki Imai:
Wolf fingerprints against minutiae count matching systems. IEICE Electron. Express 7(10): 738-744 (2010) - [j117]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 102-115 (2010) - [j116]Nuttapong Attrapadung, Hideki Imai:
Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 116-125 (2010) - [j115]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1086-1101 (2010) - [j114]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2092-2095 (2010) - [j113]Alexandra Boldyreva, Hideki Imai, Kazukuni Kobara:
How to Strengthen the Security of RSA-OAEP. IEEE Trans. Inf. Theory 56(11): 5876-5886 (2010) - [j112]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems. Wirel. Pers. Commun. 54(1): 225-236 (2010) - [c208]Jin Tamura, Kazukuni Kobara, Hanane Fathi, Hideki Imai:
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results. Financial Cryptography Workshops 2010: 47-56 - [c207]Tomohiro Sekino, Yang Cui, Kazukuni Kobara, Hideki Imai:
Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking. GLOBECOM 2010: 1-5 - [c206]Rei Yoshida, Yang Cui, Tomohiro Sekino, Rie Shigetomi, Akira Otsuka, Hideki Imai:
Practical Searching over Encrypted Data by Private Information Retrieval. GLOBECOM 2010: 1-5 - [c205]Manabu Hagiwara, Marc P. C. Fossorier, Hideki Imai:
LDPC codes with fixed initialization decoding over binary symmetric channel. ISIT 2010: 784-788 - [c204]Yasunori Onda, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication. ISITA 2010: 571-576 - [c203]Miodrag J. Mihaljevic, Hajime Watanabe, Hideki Imai:
A low complexity authentication protocol based on pseudorandomness, randomness and homophonic coding. ISITA 2010: 690-695 - [c202]Miodrag J. Mihaljevic, Hideki Imai:
A Security evaluation of certain stream ciphers which involve randomness and coding. ISITA 2010: 789-794 - [c201]Miodrag J. Mihaljevic, Sugata Gangopadhyay, Goutam Paul, Hideki Imai:
A generic weakness of the k-normal Boolean functions exposed to dedicated algebraic attack. ISITA 2010: 911-916 - [c200]Masakazu Yoshida, Takayuki Miyadera, Hideki Imai:
On the security of the quantum key distribution using the Mean King Problem. ISITA 2010: 917-912 - [c199]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother. WISA 2010: 307-321 - [c198]Akira Otsuka, Hideki Imai:
Unconditionally Secure Electronic Voting. Towards Trustworthy Elections 2010: 107-123 - [i33]Kenta Kasai, Manabu Hagiwara, Hideki Imai, Kohichi Sakaniwa:
Quantum Error Correction beyond the Bounded Distance Decoding Limit. CoRR abs/1007.1778 (2010) - [i32]Miodrag J. Mihaljevic, Frédérique E. Oggier, Hideki Imai:
Homophonic Coding Design for Communication Systems Employing the Encoding-Encryption Paradigm. CoRR abs/1012.5895 (2010) - [i31]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Security Proof of AugPAKE. IACR Cryptol. ePrint Arch. 2010: 334 (2010)
2000 – 2009
- 2009
- [j111]Miodrag J. Mihaljevic, Hideki Imai:
An approach for stream ciphers design based on joint computing over random and secret data. Computing 85(1-2): 153-168 (2009) - [j110]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
An improvement of discrete Tardos fingerprinting codes. Des. Codes Cryptogr. 52(3): 339-362 (2009) - [j109]Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa:
Tag-KEM from Set Partial Domain One-Way Permutations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 42-52 (2009) - [j108]Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang:
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 53-66 (2009) - [j107]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Hideki Imai, Takashi Kitagawa, Kazuto Ogawa, Hajime Watanabe:
An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 197-206 (2009) - [j106]José Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento:
A Novel Probabilistic Passive Attack on the Protocols HB and HB+. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(2): 658-662 (2009) - [j105]Huanfei Ma, Haibin Kan, Hideki Imai:
A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity. IEICE Trans. Commun. 92-B(2): 671-674 (2009) - [j104]Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
A Trade-off Traitor Tracing Scheme. IEICE Trans. Inf. Syst. 92-D(5): 859-875 (2009) - [j103]Rui Zhang, Hideki Imai:
Combining Public Key Encryption with Keyword Search and Public Key Encryption. IEICE Trans. Inf. Syst. 92-D(5): 888-896 (2009) - [j102]Yang Cui, Goichiro Hanaoka, Hideki Imai:
CCA-Secure Public Key Encryption without Group-Dependent Hash Functions. IEICE Trans. Inf. Syst. 92-D(5): 967-970 (2009) - [j101]Rui Zhang, Hideki Imai:
Strong Anonymous Signature. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2487-2491 (2009) - [j100]Manabu Hagiwara, Marc P. C. Fossorier, Takashi Kitagawa, Hideki Imai:
Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(11): 2891-2894 (2009) - [j99]Hideki Imai, SeongHan Shin, Kazukuni Kobara:
New security layer for overlay networks. J. Commun. Networks 11(3): 211-228 (2009) - [c197]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. AAECC 2009: 149-158 - [c196]Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai:
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. AAECC 2009: 159-168 - [c195]Manabu Hagiwara, Takahiro Yoshida, Hideki Imai:
Bounds on the Number of Users for Random 2-Secure Codes. AAECC 2009: 239-242 - [c194]Nuttapong Attrapadung, Hideki Imai:
Dual-Policy Attribute Based Encryption. ACNS 2009: 168-185 - [c193]Rui Zhang, Goichiro Hanaoka, Hideki Imai:
A generic construction of useful client puzzles. AsiaCCS 2009: 70-79 - [c192]Rui Zhang, Hideki Imai:
Constructing Better KEMs with Partial Message Recovery. Inscrypt 2009: 303-312 - [c191]Yoshihiro Kojima, Rie Shigetomi, Manabu Inuma, Akira Otsuka, Hideki Imai:
A Matching Algorithm Secure against the Wolf Attack in Biometric Authentication Systems. COST 2101/2102 Conference 2009: 293-300 - [c190]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations. CT-RSA 2009: 16-31 - [c189]Manabu Inuma, Akira Otsuka, Hideki Imai:
Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. ICB 2009: 806-815 - [c188]Yang Cui, Mingmei Li, Kazuya Yokoyama, Hideki Imai:
Efficient and Adaptively Secure Append-Only Signature. ICC 2009: 1-5 - [c187]Masatoshi Noguchi, Manabu Inuma, Rie Shigetomi, Hideki Imai:
An Image Sanitizing Scheme Using Digital Watermarking. ICICS 2009: 474-482 - [c186]Nuttapong Attrapadung, Hideki Imai:
Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. IMACC 2009: 278-300 - [c185]Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai:
Generic Construction of Stateful Identity Based Encryption. ISC 2009: 338-346 - [c184]Nuttapong Attrapadung, Hideki Imai:
Conjunctive Broadcast and Attribute-Based Encryption. Pairing 2009: 248-265 - [c183]Gyesik Lee, Hisashi Oguma, Akira Yoshioka, Rie Shigetomi, Akira Otsuka, Hideki Imai:
Formally verifiable features in embedded vehicular security systems. VNC 2009: 1-7 - [c182]Shigenori Yamakawa, Yang Cui, Kazukuni Kobara, Hideki Imai:
Lightweight broadcast authentication protocols reconsidered. WCNC 2009: 3076-3081 - [i30]Manabu Inuma, Akira Otsuka, Hideki Imai:
Theoretical framework for constructing matching algorithms in biometric authentication systems. CoRR abs/0904.1284 (2009) - [i29]Rafael Tonicelli, Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Akira Otsuka, Anderson C. A. Nascimento:
Information-Theoretically Secure Oblivious Polynomial Evaluation in the Commodity-Based Model. IACR Cryptol. ePrint Arch. 2009: 270 (2009) - [i28]Rafael Dowsley, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Reducing the Ciphertext Size of Dolev-Dwork-Naor like Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2009: 271 (2009) - [i27]Rafael Dowsley, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai, Anderson C. A. Nascimento:
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data. IACR Cryptol. ePrint Arch. 2009: 273 (2009) - 2008
- [j98]Hideki Imai, Manabu Hagiwara:
Error-correcting codes and cryptography. Appl. Algebra Eng. Commun. Comput. 19(3): 213-228 (2008) - [j97]Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai:
Protocols for purpose-restricted anonymous communications in IP-based wireless networks. Comput. Commun. 31(15): 3662-3671 (2008) - [j96]Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov:
Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptogr. 49(1-3): 289-305 (2008) - [j95]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Authenticated Key Exchange Protocol for Credential Services. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 139-149 (2008) - [j94]Kazukuni Kobara, Hideki Imai:
IVs to Skip for Immunizing WEP against FMS Attack. IEICE Trans. Commun. 91-B(1): 164-171 (2008) - [j93]Kunihiko Miyazaki, Goichiro Hanaoka, Hideki Imai:
Invisibly Sanitizable Digital Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 392-402 (2008) - [j92]Masashi Une, Akira Otsuka, Hideki Imai:
Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems. IEICE Trans. Inf. Syst. 91-D(5): 1380-1389 (2008) - [j91]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
RSA-Based Password-Authenticated Key Exchange, Revisited. IEICE Trans. Inf. Syst. 91-D(5): 1424-1438 (2008) - [j90]Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai:
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way. IEICE Trans. Inf. Syst. 91-D(5): 1457-1465 (2008) - [j89]Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions. IEICE Trans. Inf. Syst. 91-D(5): 1466-1476 (2008) - [j88]SeongHan Shin, Hanane Fathi, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai:
A New Security Architecture for Personal Networks and Its Performance Evaluation. IEICE Trans. Commun. 91-B(7): 2255-2264 (2008) - [j87]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(11): 3312-3324 (2008) - [j86]Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling:
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. Trans. Data Hiding Multim. Secur. 3: 23-32 (2008) - [j85]Hideki Imai, Goichiro Hanaoka, Ueli M. Maurer, Yuliang Zheng:
Introduction to the Special Issue on Information Theoretic Security. IEEE Trans. Inf. Theory 54(6): 2405-2407 (2008) - [j84]Anderson C. A. Nascimento, João Barros, Stefan Skludarek, Hideki Imai:
The Commitment Capacity of the Gaussian Channel Is Infinite. IEEE Trans. Inf. Theory 54(6): 2785-2789 (2008) - [c181]Rui Zhang, Hideki Imai:
Strong Anonymous Signatures. Inscrypt 2008: 60-71 - [c180]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A security framework for personal networks. COMSWARE 2008: 682-690 - [c179]Hisashi Oguma, Akira Yoshioka, Makoto Nishikawa, Rie Shigetomi, Akira Otsuka, Hideki Imai:
New Attestation Based Security Architecture for In-Vehicle Communication. GLOBECOM 2008: 1909-1914 - [c178]Huanfei Ma, Qinghui Lan, Haibin Kan, Hideki Imai:
A Novel Quaternion Design Construction For STBC. ICC 2008: 2791-2795 - [c177]Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai:
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. ICISC 2008: 1-19 - [c176]Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe:
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure. IWSEC 2008: 20-33 - [e7]Sihan Qing, Hideki Imai, Guilin Wang:
Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings. Lecture Notes in Computer Science 4861, Springer 2008, ISBN 978-3-540-77047-3 [contents] - [i26]José Carrijo, Rafael Tonicelli, Hideki Imai, Anderson C. A. Nascimento:
A Novel Probabilistic Passive Attack on the Protocols HB and HB+. IACR Cryptol. ePrint Arch. 2008: 231 (2008) - [i25]Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai:
An improvement of discrete Tardos fingerprinting codes. IACR Cryptol. ePrint Arch. 2008: 338 (2008) - [i24]SeongHan Shin, Kazukuni Kobara, Hideki Imai:
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. IACR Cryptol. ePrint Arch. 2008: 537 (2008) - 2007
- [j83]Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai:
Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off. IEEE Commun. Lett. 11(12): 988-990 (2007) - [j82]