Author of the publication

Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext.

, , and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 369-382. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A construction of codes with exponential error bounds on arbitrary discrete memoryless channels., and . IEEE Trans. Inf. Theory, 43 (3): 992-996 (1997)On the Wyner-Ziv Source Coding Problem with Unknown Delay., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (12): 2288-2299 (2014)Multiterminal source coding with complementary delivery, and . CoRR, (2008)Universal Coding for Lossless and Lossy Complementary Delivery Problems, , and . CoRR, (2008)Universal source coding over generalized complementary delivery networks, , , and . CoRR, (2007)Strongly Secure Privacy Amplification Cannot Be Obtained by Encoder of Slepian-Wolf Code., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (9): 1650-1659 (2010)Achievable Rate Regions for Source Coding with Delayed Partial Side Information., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (12): 1631-1641 (2019)Noise tolerance of the BB84 protocol with random privacy amplification., , and . ISIT, page 1013-1017. IEEE, (2005)Universal coding for lossy complementary delivery problem., , and . ISIT, page 2177-2181. IEEE, (2008)Revisiting the Slepian-Wolf coding problem for general sources: A direct approach., and . ISIT, page 1336-1340. IEEE, (2014)