- [Home]
- [Research achievement]
- [Research achievement list]
search results for Information security
51 items matching your search terms
-
Yuji Iikubo、Shunsuke Horii、Toshiyasu Matsushima
The Optimal Key Estimation of Stream Ciphers and Its Approximation Algorithm Based on a Probabilistic Inference (2012)
-
Satoru ISHII、Takahiro YOSHIDA、Shunsuke HORII、Toshiyasu MATSUSHIMA
A study of statistical modeling of authentication using PUF (2011)
-
Yuji IIKUBO、Shunsuke HORII、Toshiyasu MATSUSHIMA
A Study on Key Estimation of Stream Cipher based on Probabilistic Inference Algorithm (2011)
-
Takahiro YOSHIDA、Hajime JINUSHI、Toshiyasu MATSUSHIMA
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers (2010)
-
Takahiro YOSHIDA、Hajime JINUSHI、Toshiyasu MATSUSHIMA
Lower bounds on the memory size of entities for a ramp key distribution scheme and an optimal construction (2010)
-
Takahiro YOSHIDA、Toshiyasu MATSUSHIMA、Hideki IMAI
Optimal Ramp Scheme for Key Predistribution System with Multiple Key Distribution Centers (2010)
-
ユディアスティチャ エティ、峯松一彦、松嶋敏泰
A Study on Key Estimation Attacks to Stream Cipher based on Statistical Decision Theory (2009)
-
Kazuhiko Minematsu、Toshiyasu Matsushima
Generalization and Extension of XEX* Mode (2008)
-
Takahiro YOSHIDA、Toshiyasu MATSUSHIMA、Hideki IMAI
A Ramp Scheme for Key Predistribution System Against Collusion of Users and Centers (2008)
-
Kazuhiko Minematsu、Toshiyasu Matsushima
Efficient Domain Extension Using Weak Pseudorandom Function (2007)
-
Kensuke Yasui、Tota Suko、Toshiyasu Matsushima
An Algorithm for Computing the Secrecy Capacity of Broadcast Channels with Confidential Messages (2007)
-
三上暢仁、齋藤友彦、松嶋敏泰
A Note on Construction of Pseudo-Random Number Generator for Stream Cipher (2007)
-
Kazuhiko Minematsu、Toshiyasu Matsushima
New Bounds for PMAC, TMAC, and XCBC (2007)
-
Kazuhiko Minematsu、Toshiyasu Matsushima
Tweakable Enciphering Schemes from Hash - Sum - Expansion (2007)
-
Kazuhiko Minematsu、Toshiyasu Matsushima
Improved MACs from Differentially - Uniform Permutations (2007)
-
Shunsuke Horii、Toshiyasu Matsushima、Shigeichi Hirasawa
A Note on Resilient network coding in the presence of eavesdropping byzantine adversaries (2007)
-
Satoshi Hosobuchi、Tomohiko Saito、Toshiyasu Matsushima
A Note on the Improvement of a Fast Correlation Attack on Stream Ciphers (2005)
-
安井謙介、須子統太、松嶋敏泰
An Algorithm for Computing the Secrecy Capacity of Broadcast Channels with Confidential Messages (2006)
-
宍戸大介
A Note on Robust Secret Sharing Scheme (2006)
-
安井謙介
An Algorithm for Computing Secrecy Capacity of Broadcast Channels with Confidential Messages (2006)