Browsing by Author Imai, Hideki


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 39 to 58 of 65 < previous   next >
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA novel broadcast encryption based on time-bound cryptographic keys1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); International Conference on Digital Rights Management, DRMTICS 2005 : Digital Rights Management. Technologies, Issues, Challenges and Systems; Sydney, Australia; October 31 - November 2, 2005; 3919 LNCS; 258-276M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiNovel fast correlation attacks via iterative decoding of punctured simplex codes1-Jan-2000IEEE International Symposium on Information Theory - Proceedings; 214M33
Mihaljević, Miodrag J. ; Imai, HidekiNovel method for implementation of certain key management schemes to minimize secret storage1-Jan-20052005 2nd IEEE Consumer Communications and Networking Conference, CCNC2005; 2005; 54-59
Mihaljević, Miodrag J. ; Imai, Hideki; David, Michael; Kobara, Kazukuni; Watanabe, HajimeOn advanced cryptographic techniques for information security of smart grid AMI1-Dec-2011ACM International Conference Proceeding Series; 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11; Oak Ridge, TN; United States; 12 October 2011 through 14 October 2011
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiOn decoding techniques for cryptanalysis of certain encryption algorithms1-Jan-2001IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E84-A(4); 919-930M23
Mihaljević, Miodrag J. ; Imai, HidekiOn employment of different weight parity-checks for the fast correlation attack1-Jan-2001IEEE International Symposium on Information Theory - Proceedings; IEEE International Symposium on Information Theory (ISIT 2001); Washington, DC; United States; 24 June 2001 through 29 June 2001; 119M23
Mihaljević, Miodrag J. ; Imai, HidekiOn Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem20112011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark; 1-17M30
Camion, Paul; Mihaljević, Miodrag J. ; Imai, HidekiOn employment of LFSRs over GF(q) in certain stream ciphers1-Jan-2002IEEE International Symposium on Information Theory - Proceedings; 210
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiOne-way mapping of keys and the overheads trade-off in key management schemes for broadcast encryption2004Int. Symp. Inform. Theory and its Appl. - ISITA2004, Parma, Italy; 486-491M30
Mihaljević, Miodrag J. ; Imai, HidekiPrivacy Preserving Light-Weight Authentication Based on a Variant of Niederreiter Public-Key Encryption2015The IPSI BgD Transactions on Advanced Research; 11(1); 6-12M53
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiReduced Complexity Iterative Decoding of Low Density Parity Check Codes Based on Belief Propagation1998ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 654-658M30
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiReduced complexity iterative decoding of low-density parity check codes based on belief propagation1-Jan-1999IEEE Transactions on Communications; 47(5); 673-680M21
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecret-public storage trade-off for broadcast encryption key management1-Dec-2004Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3269; 375-387M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off1-Dec-2007IEEE Communications Letters; 11(12); 988-990M22
Mihaljević, Miodrag J. ; Imai, HidekiA security evaluation of certain stream ciphers which involve randomness and coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiSecurity evaluation of stream ciphers2002Computer Today; 107; 4-10M50
Mihaljević, Miodrag J. ; Imai, HidekiSecurity Issues of Cloud Computing and an Encryption Approach2014Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education; 388-408M14
Mihaljević, Miodrag J. ; Imai, HidekiSecurity issues of cloud computing and an encryption approach31-Oct-2014Cloud Technology: Concepts, Methodologies, Tools, and Applications; 3; 1527-1547
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity weaknesses of certain broadcast encryption schemes1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3919 LNCS; 228-245M23