Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Terada, Routo
add a person with the name Terada, Routo
 

Other publications of authors with the same name

Vulnerability - Information Leakage of Reused Secret Key in NewHope., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 105-A (6): 952-964 (2022)Faster Constant-Time Decoder for MDPC Codes and Applications to BIKE KEM., and . IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022 (4): 110-134 (2022)Multi-Resolution Classification Trees in OCR Design., , , , , and . SIBGRAPI, page 59-66. IEEE Computer Society, (2001)Nonlinear Parity Circuits and their Cryptographic Applications., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 582-600. Springer, (1990)An IBE Scheme to Exchange Authenticated Secret Keys., and . IACR Cryptology ePrint Archive, (2004)Factoring a Multiprime Modulus N with Random Bits., and . ISC, volume 7807 of Lecture Notes in Computer Science, page 185-196. Springer, (2013)Automatic Programming of MMach's for OCR., , , and . ISMM, volume 5 of Computational Imaging and Vision, page 385-392. Kluwer, (1996)Boosting OCR Classifier by Optimal Edge Noise Filtering., , , and . ISMM, volume 18 of Computational Imaging and Vision, page 371-380. Springer, (2000)Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds., and . ISC, volume 2200 of Lecture Notes in Computer Science, page 294-309. Springer, (2001)Robust Covert Channels Based on DRAM Power Consumption., , and . ISC, volume 11723 of Lecture Notes in Computer Science, page 319-338. Springer, (2019)