Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced STS using Check Equation -Extended Version of the Signature scheme proposed in the PQCrypt2010-., and . IACR Cryptology ePrint Archive, (2010)A multidimensional isomorphic operator and its properties-a proposal of finite-extent multidimensional cepstrum., , and . IEEE Trans. Signal Process., 42 (7): 1766-1785 (1994)Robust Noise Suppression Algorithm with the Kalman Filter Theory for White and Colored Disturbance., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (3): 818-829 (2008)A Subspace Blind Identification Algorithm with Reduced Computational Complexity - Colored Noise Case - ., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (7): 2015-2018 (2005)Low Exponent Attack against Elliptic Curve RSA., , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 376-383. Springer, (1994)On Key Distribution and Authentication in Mobile Radio Networks., , , and . EUROCRYPT, volume 765 of Lecture Notes in Computer Science, page 461-465. Springer, (1993)Provably Secure Key-Updating Schemes in Identity-Based Systems., , , and . J. Circuits Syst. Comput., 1 (3): 257-272 (1991)Secure problems solving scheme., , and . ICSC, page 284-289. IEEE Computer Society, (2015)A stable and distortion-free echo and howling canceller telephone networks., and . ICASSP, page 1620-1623. IEEE, (1988)A new IIR type adaptive algorithm of parallel type structure., and . ICASSP, page 2091-2094. IEEE, (1986)