Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI., , , and . ACISP, volume 2119 of Lecture Notes in Computer Science, page 60-73. Springer, (2001)Probabilistic Analysis for the Relationship Between Min-Entropy and Guessing Attack., , and . CSA/CUTE, volume 421 of Lecture Notes in Electrical Engineering, page 567-572. Springer, (2016)A Note on Parameters of Random Substitutions by gamma-Diagonal Matrices.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1052-1057 (2010)An efficient key distribution scheme with self-healing property., and . IEEE Communications Letters, 9 (8): 759-761 (2005)New Variant of the Self-Shrinking Generator and Its Cryptographic Properties., , , , and . ICISC, volume 4296 of Lecture Notes in Computer Science, page 41-50. Springer, (2006)New Public-Key Cryptosystem Using Braid Groups., , , , , and . CRYPTO, volume 1880 of Lecture Notes in Computer Science, page 166-183. Springer, (2000)On Fast Private Scalar Product Protocols., and . FGIT-SecTech, volume 259 of Communications in Computer and Information Science, page 1-10. Springer, (2011)A note on the weak invariance principle for local times, and . Statistics & Probability Letters, 32 (2): 147--159 (Mar 1, 1997)A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations., and . J. Inf. Process. Syst., 3 (1): 21-25 (2007)Practical Entropy Accumulation for Random Number Generators with Image Sensor-Based Quantum Noise Sources., , and . Entropy, 25 (7): 1056 (July 2023)