Books, Original Papers & Review Papers- ISOBE Shuji -
number of results to view: what to display: sort:
[B]:Books [O]:Original Papers [R]:Review Papers
total:39
[2018]
1.[O] A Construction of Cramer-Shoup Like Encryption Based on the Anshel-Anshel-Goldfeld Key Exchange Protocol.[Proc. of Sixth International Symposium on Computing and Networking Workshops,(2018)]S. Isobe, J. Iwazaki, E. Koizumi, A. Suda
10.1109/CANDARW.2018.00082
[2017]
2.[O] A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability.[Proceedings of CANDAR 2017,(2017),231-235]Masayuki FUKUMITSU, Shingo HASEGAWA, Shuji ISOBE, Jun-Ya IWAZAKI, Eisuke KOIZUMI and Masao SAKAI
3.[O] Autoreducibility and Completeness for Partial Multivalued Functions.[IEICE Transactions,D100(3),(2017),422-427]Shuji ISOBE, Eisuke Koizumi
[2016]
4.[B] Computational Thinking.[KYORITSU SHUPPAN CO.,LTD,(2016)]Shuji ISOBE, Eisuke KOIZUMI, Hiroki SHIZUYA, Yoshinori HAYAKAWA
ISBN978-4-320-12398-4
5.[O] A Rigorous Security Proof for the Enhanced Version of Password-Protected Secret Sharing Scheme.[Interdisciplinary Information Sciences,(2016)]Shingo HASEGAWA, Shuji ISOBE, Jun-ya IWAZAKI, Eisuke Koizumi, Hiroki SHIZUYA
10.4036/iis.2015.R.04
6.[O] Autoreducibility and Completeness for Partial Multivalued Functions.[IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Foundations of Computer Science,(2016)]Shuji ISOBE, Eisuke Koizumi
7.[O] A Construction of Attribute-based Aggregate Signatures.[Proc. of International Symposium on Information Theory and Its Applications 2016,(2016),76-80]Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya, Ryo Takahashi
[2015]
8.[O] A Strengthened Security Notion for Password-Protected Secret Sharing Schemes.[IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security,E98-A(1),(2015),203-212]Shingo HASEGAWA, Shuji ISOVBE, Jun-ya IWAZAKI, Eisuke KOIZUMI and Hiroki SHIZUYA
10.1587/transfun.E98.A.203
9.[O] A Strengthened Security Notion for Password-Protected Secret Sharing Schemes.[IEICE Transactions on Fundamentals,98(A),(2015),203-212]Shingo HASEGAWA, Shuji ISOBE, Jun-ya IWAZAKI, Eisuke Koizumi, Hiroki SHIZUYA
[2014]
10.[O] On the Security Notions of Signcryption.[Information Theory and its Applications 2014, International Symposium on Information Theory and its Applications,(2014),231-235]Shingo HASEGAWA and Shuji ISOBE
11.[O] Lossy identification schemes from decisional RSA.[Information Theory and its Applications 2014, International Symposium on Information Theory and its Applications,(2014),143-147]Shingo HASEGAWA and Shuji ISOBE
12.[O] Password-protected Secret-sharing Schemes without Random Oracles.[Information Theory and its Applications, 2014 International Symposium on Information Theory and its Applications,(2014),566-570]Shingo HASEGAWA, Shuji ISOBE, Jun-ya IWAZAKI, Eisuke KOIZUMI and Hiroki SHIZUYA
13.[O] A Lossy Identification Scheme Using the Subgroup Decision Assumption.[IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences,E97-A(6),(2014),1296-1306]Shingo HASEGAWA and Shuji ISOBE
10.1587/transfun.E97.A.1296
14.[O] The RSA Group Is Adaptive Pseudo-Free under the RSA Assumption.[IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences,E97-A(1),(2014),200-214]Masayuki FUKUMITSU, Shingo HASEGAWA, Shuji ISOBE and Hiroki SHIZUYA
10.1587/transfun.E97.A.200
15.[O] On the Complexity of Computing Discrete Logarithms over Algebraic Tori.[IEICE TRANSACTIONS on Information and Systems,E97-D(3),(2014),442-447]Shuji ISOBE, Eisuke KOIZUMI, Yuji NISHIGAKI and Hiroki SHIZUYA
10.1587/transinf.E97.D.442
16.[B] Computational Thinking.[KYORITSU SHUPPAN CO.,LTD,(2014)]Shuji ISOBE, Eisuke KOIZUMI and Hiroki SHIZUYA
17.[O] On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption.[Proc. ACISP 2014,LNCS 8544,(2014),290-305]Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
10.1007/978-3-319-08344-5_19
[2013]
18.[O] NP-Complete Sets for Computing Discrete Logarithms and Integer Factorization.[Interdisciplinary Information Sciences,19(2),(2013),1-6]Shingo HASEGAWA, Shuji ISOBE, Hiroki SHIZUYA
19.[O] Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption.[Proc. ACISP 2013,LNCS 7959,(2013),72-87]Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi,Hiroki Shizuya
20.[O] On the Length-decreasing Self-reducibility and the Many-one-like Reducibilities for Partial Multivalued Functions.[IEICE Trans. Special Section on Foundations of Computer Science,E96-D(3),(2013),465-471]Ji-Won HUH, Shuji ISOBE, Eisuke KOIZUMI, Hiroki SHIZUYA
Page: [1] [2] [next]
BackTop
copyright(c)2005 Tohoku University