default search action
Yuichi Kaji
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Yuichi Kaji:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 359 (2024) - [c23]Motonari Honda, Yuichi Kaji:
Optimum Fingerprinting Function for Winternitz One-Time Signature. ISIT 2024: 2898-2902 - 2023
- [j19]Tomonori Hirata, Yuichi Kaji:
Information Leakage Through Passive Timing Attacks on RSA Decryption System. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 406-413 (2023) - [c22]Motonari Honda, Yuichi Kaji:
Improvement of Winternitz OTS with a Novel Fingerprinting Function. SECRYPT 2023: 303-311 - 2020
- [c21]Tomonori Hirata, Yuichi Kaji:
Information leakage through passive timing attacks on RSA decryption system. ISITA 2020: 392-396 - [i1]Atsuki Momose, Jason Paul Cruz, Yuichi Kaji:
Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience. IACR Cryptol. ePrint Arch. 2020: 406 (2020)
2010 – 2019
- 2018
- [j18]Jason Paul Cruz, Yuichi Kaji, Naoto Yanai:
RBAC-SC: Role-Based Access Control Using Smart Contract. IEEE Access 6: 12240-12251 (2018) - [j17]Tomohiro Takahashi, Yuichi Kaji, Yasunori Tsukuda, Shinichiro Futami, Katsuhiko Hanzawa, Takahito Yamauchi, Ping Wah Wong, Frederick T. Brady, Phil Holden, Thomas Ayers, Kyohei Mizuta, Susumu Ohki, Keiji Tatani, Hayato Wakabayashi, Yoshikazu Nitta:
A Stacked CMOS Image Sensor With Array-Parallel ADC Architecture. IEEE J. Solid State Circuits 53(4): 1061-1070 (2018) - [c20]Yuichi Kaji, Jason Paul Cruz, Yoshio Yatani:
Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains. ICETE (2) 2018: 463-470 - 2016
- [j16]Yuki Takeda, Yuichi Kaji, Minoru Ito:
On the Computational Complexity of the Linear Solvability of Information Flow Problems with Hierarchy Constraint. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(12): 2211-2217 (2016) - [c19]Yuichi Kaji:
Converging bounds of the entropy of multinomial distributions. ISITA 2016: 433-437 - [c18]Jason Paul Cruz, Yoshio Yatani, Yuichi Kaji:
Constant-sum fingerprinting for Winternitz one-time signature. ISITA 2016: 703-707 - 2015
- [j15]Yuichi Kaji:
Performance Evaluation of Index-less Indexed Flash Codes for Non-uniform Write Operations. Inf. Media Technol. 10(2): 204-209 (2015) - [c17]Yuki Takeda, Yuichi Kaji, Minoru Ito:
On the computational complexity of the solvability of information flow problem with hierarchy constraint. Allerton 2015: 1205-1210 - [c16]Yuichi Kaji:
Bounds on the entropy of multinomial distribution. ISIT 2015: 1362-1366 - 2014
- [c15]Yasuyuki Kobayashi, Yuichi Kaji, Hiroyuki Seki:
Information theoretical evaluation of the bucketing technique to mitigate timing attacks. ISITA 2014: 561-565 - [c14]Kazuki Kumagai, Yuichi Kaji:
A flash code utilizing dynamic segment allocation. ISITA 2014: 605-609 - 2013
- [j14]Michael Joseph Tan, Yuichi Kaji:
Flash Code Utilizing Binary-Indexed Slice Encoding and Resizable-Clusters. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2360-2367 (2013) - [c13]Michael Joseph Tan, Yuichi Kaji:
Flash code utilizing resizable-clusters. EIT 2013: 1-6 - 2012
- [j13]Yuichi Kaji:
The Expected Write Deficiency of Index-Less Indexed Flash Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(12): 2130-2138 (2012) - [j12]Ramon Francisco Pacquiao Mejia, Yuichi Kaji, Hiroyuki Seki:
Error Control for High-density Monochrome Two-dimensional Barcodes. Inf. Media Technol. 7(3): 1136-1144 (2012) - [c12]Hiroyuki Nagahara, Yuichi Kaji:
Index-less flash codes with arbitrary small slices. ISITA 2012: 106-110 - 2011
- [c11]Ramon Francisco Pacquiao Mejia, Yuichi Kaji, Hiroyuki Seki:
Poster: trans-organizational role-based access control. CCS 2011: 817-820 - [c10]Yuichi Kaji:
The expected write deficiency of index-less flash codes and their improvement. ITW 2011: 35-39 - 2010
- [j11]Yuichi Kaji:
Foreword. IEICE Trans. Inf. Syst. 93-D(2): 207 (2010) - [c9]Kai Zhao, Yuichi Kaji:
Anti-phishing mutual authentication using the visual secret sharing scheme. ISITA 2010: 560-565 - [c8]Ryo Yoshinaka, Yuichi Kaji, Hiroyuki Seki:
Chomsky-Schützenberger-Type Characterization of Multiple Context-Free Languages. LATA 2010: 596-607
2000 – 2009
- 2009
- [c7]Yuichi Kaji:
On the number of minimum weight codewords of SFA-LDPC codes. ISIT 2009: 70-74 - 2008
- [j10]Hisashi Mohri, Ritsuko Matsumoto, Yuichi Kaji:
Key Predistribution Schemes for Sensor Networks Using Finite Plane Geometry. IEICE Trans. Inf. Syst. 91-D(5): 1416-1423 (2008) - [j9]Kenji Sugiyama, Yuichi Kaji:
On the Minimum Weight of Simple Full-Length Array LDPC Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(6): 1502-1508 (2008) - 2007
- [j8]Satoshi Arima, Takuji Tachibana, Yuichi Kaji, Shoji Kasahara:
FEC-Based Reliable Transmission for Multiple Bursts in OBS Networks. IEICE Trans. Commun. 90-B(12): 3541-3551 (2007) - [c6]Kenji Sugiyama, Yuichi Kaji:
On the minimum weight of simple full-length array LDPC codes. ISIT 2007: 746-750 - 2006
- [j7]Yuichi Kaji:
Encoding LDPC Codes Using the Triangular Factorization. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(10): 2510-2518 (2006) - 2005
- [j6]Ryo Nojima, Yuichi Kaji:
Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 189-194 (2005) - [j5]Ryo Nojima, Yuichi Kaji:
Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(2): 568-574 (2005) - 2003
- [j4]Daisuke Ikegami, Yuichi Kaji:
Maximum Likelihood Decoding for Linear Block Codes Using Grobner Bases. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(3): 643-651 (2003) - [j3]Toshiyuki Ishida, Yuichi Kaji:
A Call-by-Need Recursive Algorithm for the LogMAP Decoding of a Binary Linear Block Code. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(12): 3306-3309 (2003) - 2002
- [c5]Hiroyuki Seki, Toshinori Takai, Youhei Fujinaka, Yuichi Kaji:
Layered Transducing Term Rewriting System and Its Recognizability Preserving Property. RTA 2002: 98-113 - 2001
- [c4]Tadao Kasami, Hitoshi Tokushige, Yuichi Kaji:
Sufficient Conditions on Most Likely Local Sub-codewords in Recursive Maximum Likelihood Decoding Algorithms. AAECC 2001: 333-342 - 2000
- [c3]Toshinori Takai, Yuichi Kaji, Hiroyuki Seki:
Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability. RTA 2000: 246-260
1990 – 1999
- 1997
- [j2]Yuichi Kaji, Toru Fujiwara, Tadao Kasami:
Solving a Unification Problem under Constrained Substitutions Using Tree Automata. J. Symb. Comput. 23(1): 79-117 (1997) - 1994
- [j1]Yuichi Kaji, Ryuchi Nakanishi, Hiroyuki Seki, Tadao Kasami:
The Computational Complexity of the Universal Recognition Problem for Parallel Multiple Context-Free Grammars. Comput. Intell. 10: 440-452 (1994) - [c2]Yuichi Kaji, Toru Fujiwara, Tadao Kasami:
Solving a Unification Problem under Constrained Substitutions Using Tree Automata. FSTTCS 1994: 276-287 - 1993
- [c1]Hiroyuki Seki, Ryuichi Nakanishi, Yuichi Kaji, Sachiko Ando, Tadao Kasami:
Parallel Multiple Context-Free Grammars, Finite-State Translation Systems, and Polynomial-Time Recognizable Subclasses of Lexical-Functional Grammars. ACL 1993: 130-139
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-12 23:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint