Books, Original Papers & Review Papers- HASEGAWA Shingo -
number of results to view: what to display: sort:
[B]:Books [O]:Original Papers [R]:Review Papers
total:34
[2014]
21.[O] On the Security Notions of Signcryption.[2014 International Symposium on Information Theory and Its Applications (ISITA 2014),(2014),231-235]Shingo Hasegawa, Shuji Isobe
22.[O] Lossy Identification Schemes from Decisional RSA.[2014 International Symposium on Information Theory and Its Applications (ISITA 2014),(2014),143-147]Shingo Hasegawa, Shuji Isobe
23.[O] On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption.[ACISP 2014, LNCS,8544,(2014),290-305]Fukumitsu Masayuki, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
10.1007/978-3-319-08344-5_19
24.[O] A Lossy Identification Scheme using the Subgroup Decision Assumption.[IEICE Trans. Fundamentals, Special Section on Discrete Mathematics and Its Applications,E97-A(6),(2014),1296-1306]Shingo Hasegawa, Shuji Isobe
10.1587/transfun.E97.A.1296
25.[O] The RSA Group Is Adaptive Pseudo-Free under the RSA Assumption.[IEICE Trans. Fundamentals, Special Section on Cryptography and Information Security,E97-A(1),(2014),200-214]Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya,
10.1587/transfun.E97.A.200
[2013]
26.[O] Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption.[ACISP 2013, LNCS,7959,(2013),72-87]Fukumitsu Masayuki, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya
10.1007/978-3-642-39059-3_6
27.[O] NP-Complete Sets for Computing Discrete Logarithms and Integer Factorization.[Interdisciplinary Information Sciences,19(2),(2013),129-134]Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
10.4036/iis.2013.129
[2012]
28.[B] 東北大生のための教育系情報システム活用ガイド2012.[共立出版,(2012)]Digital Campus Project
[2011]
29.[B] 東北大生のための教育系情報システム活用ガイド2011.[共立出版,(2011)]Digital Campus Project
[2010]
30.[B] Digital Campus 2010.[共立出版,(2010)]Digital Campus 編集委員会
[2009]
31.[O] On the Pseudo-Freeness and the CDH Assumption.[International Journal of Information Security,8(5),(2009),347-355]Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya, Katsuhiro Tashiro
10.1007/s10207-009-0087-0
[2008]
32.[O] NPMV-Complete Functions That Compute Discrete Logarithms and Integer Factorization.[IEICE Trans. Fundamentals, Special Section on Cryptography and Information Security,E91(A),(2008),342-344]Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya,
33.[O] Making Cryptographic Primitives Harder.[IEICE Trans. Fundamentals, Special Section on Cryptography and Information Security,E91-A(1),(2008),330-337]Shingo Hasegawa, Hiroyuki Hatanaka, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya,
10.1093/ietfec/e91-a.1.330
[2007]
34.[O] A Countermeasure for Protecting NTRUSign against the Transcript Attack.[Interdisciplinary Information Sciences,13(2),(2007),181-188]Shingo Hasegawa, Shuji Isobe, Masahiro Mambo, Hiroki Shizuya, Yuichi Futa, Motoji Ohmori
10.4036/iis.2007.181
Page: [prev] [1] [2]
BackTop
copyright(c)2005 Tohoku University