default search action
Masao Kasahara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2019
- [c9]Shigeichi Hirasawa, Hideki Yagi, Manabu Kobayashi, Masao Kasahara:
Exponential Error Bounds and Decoding Complexity for Block Codes Constructed by Unit Memory Trellis Codes of Branch Length Two. CISS 2019: 1-6 - 2015
- [c8]Yasuyuki Murakami, Masao Kasahara:
Hybrid inter-organization cryptosystem using ElGamal cryptosystem. ICCE-TW 2015: 378-379 - [i27]Masao Kasahara:
New classes of public key cryptosystem K(XVI)SE(1)PKC constructed based on Reed-Solomon code over extension field of m=8 and K(XVI)SE(2)PKC, based on binary cyclic code. IACR Cryptol. ePrint Arch. 2015: 714 (2015) - [i26]Masao Kasahara:
A Simple Scheme, for Strengthening Product-sum Type PKC. IACR Cryptol. ePrint Arch. 2015: 779 (2015) - 2014
- [c7]Ryuichi Sakai, Masao Kasahara:
New method for factoring two RSA moduli with implicit hint. ISITA 2014: 135-137 - [c6]Yasuyuki Murakami, Shinsuke Hamasho, Masao Kasahara:
A knapsack public-key cryptosystem using two random sequences. ISITA 2014: 497-501 - [i25]Masao Kasahara, Shigeichi Hirasawa:
Constructions of A Large Class of Optimum Constant Weight Codes over F_2. CoRR abs/1406.5797 (2014) - [i24]Masao Kasahara:
A new class of system oriented PKC, K(I)SOPKC. IACR Cryptol. ePrint Arch. 2014: 92 (2014) - [i23]Masao Kasahara:
New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC. IACR Cryptol. ePrint Arch. 2014: 568 (2014) - [i22]Masao Kasahara:
New Class of Multivariate Public Key Cryptosystem, K(XI)RSE(2)PKC, Constructed based on Reed-Solomon Code Along with K(X)RSE(2)PKC over 픽2. IACR Cryptol. ePrint Arch. 2014: 711 (2014) - 2013
- [i21]Masao Kasahara:
A New Class of Product-sum Type Public Key Cryptosystem, K(V)ΣΠPKC, Constructed Based on Maximum Length Code. IACR Cryptol. ePrint Arch. 2013: 180 (2013) - [i20]Masao Kasahara:
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SE(1)PKC.- Along with a presentation of K(XII)SE(1)PKC over the extension field extensively used for present day various storage and transmission systems -. IACR Cryptol. ePrint Arch. 2013: 363 (2013) - [i19]Masao Kasahara:
Presentation of a new class of public key cryptosystems K(XIII)SE(1)PKC along with Kp(XIII)SE(1)PKC that realizes the coding rate of exactly 1.0, constructed by modifying K(XII)SE(1)PKC. IACR Cryptol. ePrint Arch. 2013: 605 (2013) - 2012
- [c5]Ryuichi Sakai, Yasuyuki Murakami, Masao Kasahara:
Security analysis of shifted odd knapsack public key encryption scheme. ISITA 2012: 731-734 - [c4]Yasuyuki Murakami, Shinsuke Hamasho, Masao Kasahara:
A public-key cryptosystem based on decision version of subset sum problem. ISITA 2012: 735-739 - [i18]Masao Kasahara:
Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XV)SE(2)PKC, Realizing Coding Rate of Exactly 1.0. IACR Cryptol. ePrint Arch. 2012: 79 (2012) - [i17]Masao Kasahara:
Construction of New Classes of Knapsack Type Public Key Cryptosystem Using Uniform Secret Sequence, K(II)ΣΠPKC, Constructed Based on Maximum Length Code. IACR Cryptol. ePrint Arch. 2012: 344 (2012) - 2011
- [i16]Masao Kasahara:
A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I). IACR Cryptol. ePrint Arch. 2011: 124 (2011) - [i15]Masao Kasahara:
A Construction of A New Class of Knapsack-Type Public Key Cryptosystem, K(III)Sigma PKC. IACR Cryptol. ePrint Arch. 2011: 125 (2011) - [i14]Masao Kasahara:
Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(IX)SE(1)PKC, Realizing Coding Rate of Exactly 1.0. IACR Cryptol. ePrint Arch. 2011: 545 (2011) - [i13]Masao Kasahara:
A New Class of Multivariate Public Key Cryptosystems Constructed Based on Random Pseudo Cyclic Codes, K(XIII)SE(2)PKC, Realizing Coding Rate of Exactly 1.0. IACR Cryptol. ePrint Arch. 2011: 573 (2011) - [i12]Masao Kasahara:
A New Class of Multivariate Public Key Cryptosystem Constructed on the Basis of Message-Dependent Transformation. IACR Cryptol. ePrint Arch. 2011: 690 (2011) - 2010
- [j34]Yasuyuki Murakami, Masao Kasahara:
An ID-based key sharing scheme based on discrete logarithm problem over a product of three primes. JSIAM Lett. 2: 5-8 (2010) - [c3]Kunikatsu Kobayashi, Kohtaro Tadaki, Masao Kasahara, Shigeo Tsujii:
A knapsack cryptosystem based on multiple knapsacks. ISITA 2010: 428-432 - [i11]Masao Kasahara:
A New Class of Public Key Cryptosystems Constructed Based on Perfect Error-Correcting Codes Realizing Coding Rate of Exactly 1.0. IACR Cryptol. ePrint Arch. 2010: 139 (2010) - [i10]Masao Kasahara:
A New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme. IACR Cryptol. ePrint Arch. 2010: 341 (2010)
2000 – 2009
- 2009
- [i9]Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita, Masao Kasahara:
Proposal of PPS Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2009: 264 (2009) - [i8]Masao Kasahara:
Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes. IACR Cryptol. ePrint Arch. 2009: 375 (2009) - [i7]Masao Kasahara:
Construction of A New Class of Linear Multivariate Public Key Cryptosystem, K(I)SE(1)PKC. IACR Cryptol. ePrint Arch. 2009: 546 (2009) - 2008
- [j33]Takeshi Nasako, Yasuyuki Murakami, Masao Kasahara:
Security of a Class of Knapsack Public-Key Cryptosystems against Low-Density Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 2889-2892 (2008) - [c2]Seira Hidano, Tetsushi Ohki, Naohisa Komatsu, Masao Kasahara:
On biometric encryption using fingerprint and it's security evaluation. ICARCV 2008: 950-956 - 2007
- [i6]Masao Kasahara:
A generalization of Secret Sharing Scheme on the Basis of Recovering Algorithm, K-RA. IACR Cryptol. ePrint Arch. 2007: 106 (2007) - 2006
- [j32]Masao Kasahara:
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 47-54 (2006) - [c1]Tetsushi Ohki, Shiro Akatsuka, Naohisa Komatsu, Masao Kasahara:
Safety of templates in biometric person authentication using error-correcting code. Security, Steganography, and Watermarking of Multimedia Contents 2006: 60720K - 2005
- [j31]Masao Kasahara, Ryuichi Sakai:
A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 74-80 (2005) - [i5]Masao Kasahara:
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness. IACR Cryptol. ePrint Arch. 2005: 23 (2005) - [i4]Yasuyuki Murakami, Masao Kasahara:
Murakami-Kasahara ID-based Key Sharing Scheme Revisited - In Comparison with Maurer-Yacobi Schemes -. IACR Cryptol. ePrint Arch. 2005: 306 (2005) - [i3]Hiroyuki Okazaki, Ryuichi Sakai, Masao Kasahara:
Meta Ring Signature. IACR Cryptol. ePrint Arch. 2005: 310 (2005) - 2004
- [j30]Masao Kasahara, Ryuichi Sakai:
A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 102-109 (2004) - 2003
- [i2]Masao Kasahara, Ryuichi Sakai:
A Construction of 100 bit Public-Key Cryptosystem and Digital Signature Scheme. IACR Cryptol. ePrint Arch. 2003: 47 (2003) - [i1]Ryuichi Sakai, Masao Kasahara:
ID based Cryptosystems with Pairing on Elliptic Curve. IACR Cryptol. ePrint Arch. 2003: 54 (2003) - 2002
- [j29]Kiyoko Katayanagi, Yasuyuki Murakami, Masao Kasahara:
New Product-Sum Type Public-Key Cryptosystems with Selectable Encryption Key Based on Chinese Remainder Theorem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(2): 472-480 (2002) - [j28]Shigeo Mitsunari, Ryuichi Sakai, Masao Kasahara:
A New Traitor Tracing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(2): 481-484 (2002) - [j27]Noriaki Minami, Koichiro Wakasugi, Masao Kasahara, Saburo Tazaki:
A Construction Method for Picture Information Having a Recovery Function. Syst. Comput. Jpn. 33(1): 64-76 (2002) - 2001
- [j26]Tadashi Wadayama, Toru Hada, Koichiro Wakasugi, Masao Kasahara:
Upper and Lower Bounds on Maximum Nonlinearity of n-input m-output Boolean Function. Des. Codes Cryptogr. 23(1): 23-34 (2001)
1990 – 1999
- 1996
- [j25]Katsumi Sakakibara, Masao Kasahara:
On the minimum distance of a q-ary image of a qm-ary cyclic code. IEEE Trans. Inf. Theory 42(5): 1631-1635 (1996) - 1995
- [j24]Katsumi Sakakibara, Masao Kasahara:
A multicast hybrid ARQ scheme using MDS codes and GMD decoding. IEEE Trans. Commun. 43(12): 2933-2940 (1995) - 1992
- [j23]Masakatu Morii, Masao Kasahara:
Perfect Staircase Profile of Linear Complexity for Finite Sequences. Inf. Process. Lett. 44(2): 85-89 (1992) - [j22]Masakatu Morii, Masao Kasahara:
Generalized key-equation of remainder decoding algorithm for Reed-Solomon codes. IEEE Trans. Inf. Theory 38(6): 1801-1807 (1992)
1980 – 1989
- 1989
- [j21]Masakatu Morii, Masao Kasahara, Douglas L. Whiting:
Efficient bit-serial multiplication and the discrete-time Wiener-Hopf equation over finite fields. IEEE Trans. Inf. Theory 35(6): 1177-1183 (1989) - 1988
- [j20]Jun Du, Masao Kasahara, Toshihiko Namekawa:
Separate codes on type-II hybrid ARQ systems. IEEE Trans. Commun. 36(10): 1089-1097 (1988) - 1984
- [j19]Yoshio Yamada, Saburo Tazaki, Masao Kasahara, Toshihiko Namekawa:
Variance mismatch of vector quantizers. IEEE Trans. Inf. Theory 30(1): 104-107 (1984) - [j18]Shigeichi Hirasawa, Masao Kasahara, Yasuo Sugiyama, Toshihiko Namekawa:
Modified product codes. IEEE Trans. Inf. Theory 30(2): 299-305 (1984) - 1982
- [j17]Kinichiroh Tokiwa, Tatsuo Sugimura, Masao Kasahara, Toshihiko Namekawa:
New decoding algorithm for Reed-Muller codes. IEEE Trans. Inf. Theory 28(5): 779-787 (1982) - 1981
- [j16]Shigeichi Hirasawa, Masao Kasahara, Yasuo Sugiyama, Toshihiko Namekawa:
An improvement of error exponents at low rates for the generalized version of concatenated codes. IEEE Trans. Inf. Theory 27(3): 350-352 (1981) - 1980
- [j15]Ikuo Iizuka, Masao Kasahara, Toshihiko Namekawa:
Block codes capable of correcting both additive and timing errors. IEEE Trans. Inf. Theory 26(4): 393-400 (1980) - [j14]Shigeichi Hirasawa, Masao Kasahara, Yasuo Sugiyama, Toshihiko Namekawa:
Certain generalizations of concatenated codes-Exponential error bounds and decoding complexity. IEEE Trans. Inf. Theory 26(5): 527-534 (1980) - [j13]Yasuo Sugiyama, Masao Kasahara, Shigeichi Hirasawa, Toshihiko Namekawa:
Superimposed concatenated codes (Corresp.). IEEE Trans. Inf. Theory 26(6): 735-736 (1980)
1970 – 1979
- 1978
- [j12]Chikato Fujiwara, Masao Kasahara, Kazumi Yamashita, Toshihiko Namekawa:
Evaluations of Error Control Techniques in Both Independent-Error and Dependent-Error Channels. IEEE Trans. Commun. 26(6): 785-794 (1978) - [j11]Yasuo Sugiyama, Masao Kasahara, Shigeichi Hirasawa, Toshihiko Namekawa:
A new class of asymptotically good codes beyond the Zyablov bound. IEEE Trans. Inf. Theory 24(2): 198-204 (1978) - [j10]Makoto Tatebayashi, Masao Kasahara, Toshihiko Namekawa:
Error statistics and construction of error correcting codes for differentially encoded CPSK channels (Corresp.). IEEE Trans. Inf. Theory 24(6): 763-766 (1978) - 1977
- [j9]Makoto Tatebayashi, Masao Kasahara, Toshihiko Namekawa:
Analysis of the fundamental error statistics in DPSK systems using a Markov chain model (Corresp.). IEEE Trans. Inf. Theory 23(4): 522-525 (1977) - 1976
- [j8]Yasuo Sugiyama, Masao Kasahara, Shigeichi Hirasawa, Toshihiko Namekawa:
An erasures-and-errors decoding algorithm for Goppa codes (Corresp.). IEEE Trans. Inf. Theory 22(2): 238-241 (1976) - [j7]Masao Kasahara, Yasuo Sugiyama, Shigeichi Hirasawa, Toshihiko Namekawa:
New classes of binary codes constructed on the basis of concatenated codes and product codes. IEEE Trans. Inf. Theory 22(4): 462-468 (1976) - [j6]Yasuo Sugiyama, Masao Kasahara, Shigeichi Hirasawa, Toshihiko Namekawa:
Further results on Goppa codes and their applications to constructing efficient binary codes. IEEE Trans. Inf. Theory 22(5): 518-526 (1976) - [j5]Yasuo Sugiyama, Masao Kasahara, Shigeichi Hirasawa, Toshihiko Namekawa:
Correction to 'An Erasures-and-Errors Decoding Algorithm for Goppa Codes'. IEEE Trans. Inf. Theory 22(6): 765 (1976) - 1975
- [j4]Yasuo Sugiyama, Masao Kasahara, Shigeichi Hirasawa, Toshihiko Namekawa:
A Method for Solving Key Equation for Decoding Goppa Codes. Inf. Control. 27(1): 87-99 (1975) - [j3]Yasuo Sugiyama, Masao Kasahara, Shigeichi Hirasawa, Toshihiko Namekawa:
Some efficient binary codes constructed using Srivastava codes (Corresp.). IEEE Trans. Inf. Theory 21(5): 581-582 (1975) - [j2]Masao Kasahara, Yasuo Sugiyama, Shigeichi Hirasawa, Toshihiko Namekawa:
A new class of binary codes constructed on the basis of BCH codes (Corresp.). IEEE Trans. Inf. Theory 21(5): 582-585 (1975) - 1974
- [j1]Yasuo Sugiyama, Masao Kasahara, Shigeichi Hirasawa, Toshihiko Namekawa:
A Modification of the Constructive Asymptotically Good Codes of Justesen for Low Rates. Inf. Control. 25(4): 341-350 (1974)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint