Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Tadaki, Kohtaro
add a person with the name Tadaki, Kohtaro
 

Other publications of authors with the same name

Phase Transition between Unidirectionality and Bidirectionality.. Computation, Physics and Beyond, volume 7160 of Lecture Notes in Computer Science, page 203-223. Springer, (2012)Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1078-1085 (2010)Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (10): 2438-2446 (2009)Proposal of PPS Multivariate Public Key Cryptosystems., , , , and . IACR Cryptology ePrint Archive, (2009)Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization., , , and . IACR Cryptology ePrint Archive, (2012)Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems., , and . IACR Cryptology ePrint Archive, (2008)Cryptography and Algorithmic Randomness, and . CoRR, (2013)The Tsallis entropy and the Shannon entropy of a universal probability. CoRR, (2008)A knapsack cryptosystem based on multiple knapsacks., , , and . ISITA, page 428-432. IEEE, (2010)A Computational Complexity-Theoretic Elaboration of Weak Truth-Table Reducibility. CoRR, (2011)