Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generic Fully Simulatable Adaptive Oblivious Transfer., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 232-245 (2015)Can We Securely Use CBC Mode in TLS1.0?, , and . ICT-EurAsia/CONFENIS, volume 9357 of Lecture Notes in Computer Science, page 151-160. Springer, (2015)Generic Fully Simulatable Adaptive Oblivious Transfer., , and . ACNS, volume 6715 of Lecture Notes in Computer Science, page 274-291. (2011)Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 189-194 (2005)Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (2): 568-574 (2005)UC-Secure Multi-Session OT Using Tamper-Proof Hardware., , and . IACR Cryptology ePrint Archive, (2013)New Leakage Resilient CCA-Secure Public Key Encryption., , and . IACR Cryptology ePrint Archive, (2012)Continuous Group Key Agreement with Flexible Authorization and Its Applications., , , , and . IACR Cryptol. ePrint Arch., (2022)Construction of a Support Tool for Japanese User Reading of Privacy Policies and Assessment of its User Impact., , , and . IEICE Trans. Inf. Syst., 106 (5): 856-867 (May 2023)A Storage Efficient Redactable Signature in the Standard Model., , , and . ISC, volume 5735 of Lecture Notes in Computer Science, page 326-337. Springer, (2009)