Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Class of Biometrics on the Basis of Forgotten Secret Recovering Scheme, KSS(I).. IACR Cryptology ePrint Archive, (2011)New Classes of Public Key Cryptosystems over F28 Constructed Based on Reed-Solomon Codes, K(XVII)SE(1)PKC and K(XVII)ΣΠPKC.. IACR Cryptology ePrint Archive, (2014)A New Class of Product-sum Type Public Key Cryptosystem, K(V)ΣΠPKC, Constructed Based on Maximum Length Code.. IACR Cryptology ePrint Archive, (2013)Constructions of A Large Class of Optimum Constant Weight Codes over F_2., and . CoRR, (2014)Exponential Error Bounds and Decoding Complexity for Block Codes Constructed by Unit Memory Trellis Codes of Branch Length Two., , , and . CISS, page 1-6. IEEE, (2019)Modified product codes., , , and . IEEE Trans. Inf. Theory, 30 (2): 299-305 (1984)A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 87-A (1): 102-109 (2004)Security of a Class of Knapsack Public-Key Cryptosystems against Low-Density Attack., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (10): 2889-2892 (2008)A New Traitor Tracing., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (2): 481-484 (2002)A Modification of the Constructive Asymptotically Good Codes of Justesen for Low Rates, , , and . Inf. Control., 25 (4): 341-350 (August 1974)