Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII., , , , and . IACR Cryptology ePrint Archive, (2010)Classification of Hash Functions Suitable for Real-Life Systems., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (1): 64-73 (2008)Electronic Ticket Scheme for ITS., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (1): 142-150 (2003)Panel Discussion: Mobile Device Trust - How Do We Link Social Needs, Technical Requirements, Techniques and Standards?. INTRUST, volume 7711 of Lecture Notes in Computer Science, page 63-64. Springer, (2012)Reputation as Contextual Knowledge: Incentives and External Value in Truthful Blockchain Oracles., , , and . ICBC, page 1-9. IEEE, (2023)Distributed Random Number Generation Method on Smart Contracts., , and . BIOTC, page 1-10. ACM, (2022)How formal analysis and verification add security to blockchain-based systems.. FMCAD, page 1-4. IEEE, (2017)Toward Practical Searchable Symmetric Encryption., , , and . IWSEC, volume 8231 of Lecture Notes in Computer Science, page 151-167. Springer, (2013)How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC., , , and . Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, page 182-194. Springer, (2010)A non-repudiable negotiation protocol for security service level agreements., , , , , , and . Int. J. Commun. Syst., 28 (15): 2067-2081 (2015)