Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA., , , , , , , and . IACR Cryptology ePrint Archive, (2020)Improvement of the Low Rank Attack.. ISITA, page 441-445. IEEE, (2010)Enhanced STS using Check Equation -Extended Version of the Signature scheme proposed in the PQCrypt2010-., and . IACR Cryptology ePrint Archive, (2010)Secure problems solving scheme., , and . ICSC, page 284-289. IEEE Computer Society, (2015)Hidden Pair of Bijection Signature Scheme., and . IACR Cryptology ePrint Archive, (2011)Proposal of a Signature Scheme Based on STS Trapdoor., , , and . PQCrypto, volume 6061 of Lecture Notes in Computer Science, page 201-217. Springer, (2010)Scheme overcoming incompatibility of privacy and utilization of personal data., , , , , , , and . ISITA, page 727-730. IEEE, (2012)Proposal of PPS Multivariate Public Key Cryptosystems., , , , and . IACR Cryptology ePrint Archive, (2009)Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization., , , and . IACR Cryptology ePrint Archive, (2012)Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1078-1085 (2010)