Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the Length-Decreasing Self-Reducibility and the Many-One-Like Reducibilities for Partial Multivalued Functions., , , and . IEICE Trans. Inf. Syst., 96-D (3): 465-471 (2013)Making Cryptographic Primitives Harder., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (1): 330-337 (2008)A Strengthened Security Notion for Password-Protected Secret Sharing Schemes., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 203-212 (2015)A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability., , , , , and . CANDAR, page 439-444. IEEE Computer Society, (2017)Password-protected secret-sharing schemes without random oracles., , , , and . ISITA, page 566-570. IEEE, (2014)Autoreducibility and Completeness for Partial Multivalued Functions., and . IEICE Trans. Inf. Syst., 100-D (3): 422-427 (2017)On the Complexity of Computing Discrete Logarithms over Algebraic Tori., , , and . IEICE Trans. Inf. Syst., 97-D (3): 442-447 (2014)On a Relation between Knowledge-of-Exponent Assumptions and the DLog vs. CDH Question., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (1): 20-24 (2021)On the Complexity of Computing Discrete Logarithms over Algebraic Tori., , , and . CANS, volume 5888 of Lecture Notes in Computer Science, page 433-442. Springer, (2009)Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption., , , , and . ACISP, volume 7959 of Lecture Notes in Computer Science, page 72-87. Springer, (2013)