Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On a Relation between Knowledge-of-Exponent Assumptions and the DLog vs. CDH Question., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (1): 20-24 (2021)A Polynomial-Time Algorithm for Finding Total Colorings of Partial k-Trees., , and . Int. J. Found. Comput. Sci., 10 (2): 171-194 (1999)On the Complexity of Computing Discrete Logarithms over Algebraic Tori., , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 433-442. Springer, (2009)On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption., , , and . ACISP, volume 8544 of Lecture Notes in Computer Science, page 290-305. Springer, (2014)On the Polynomial Time Computability of Abstract Ray-Tracing Problems., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (5): 1209-1213 (2005)NPMV-Complete Functions That Compute Discrete Logarithms and Integer Factorization., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (1): 342-344 (2008)A Lossy Identification Scheme Using the Subgroup Decision Assumption., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 97-A (6): 1296-1306 (2014)A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability., , , , , and . CANDAR, page 439-444. IEEE Computer Society, (2017)Lossy identification schemes from decisional RSA., and . ISITA, page 143-147. IEEE, (2014)Password-protected secret-sharing schemes without random oracles., , , , and . ISITA, page 566-570. IEEE, (2014)