Author of the publication

Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption.

, and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (2): 568-574 (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains., , and . ICETE (2), page 463-470. SciTePress, (2018)Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability., , and . RTA, volume 1833 of Lecture Notes in Computer Science, page 246-260. Springer, (2000)Sufficient Conditions on Most Likely Local Sub-codewords in Recursive Maximum Likelihood Decoding Algorithms., , and . AAECC, volume 2227 of Lecture Notes in Computer Science, page 333-342. Springer, (2001)Bounds on the entropy of multinomial distribution.. ISIT, page 1362-1366. IEEE, (2015)Constant-sum fingerprinting for Winternitz one-time signature., , and . ISITA, page 703-707. IEEE, (2016)RBAC-SC: Role-Based Access Control Using Smart Contract., , and . IEEE Access, (2018)A Call-by-Need Recursive Algorithm for the LogMAP Decoding of a Binary Linear Block Code., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (12): 3306-3309 (2003)Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience., , and . IACR Cryptology ePrint Archive, (2020)On the Computational Complexity of the Linear Solvability of Information Flow Problems with Hierarchy Constraint., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (12): 2211-2217 (2016)Information leakage through passive timing attacks on RSA decryption system., and . ISITA, page 392-396. IEEE, (2020)