Browsing by Author Imai, Hideki


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 1 to 20 of 62  next >
Author(s)TitleIssue DateAppears inRank
Mihaljević, Miodrag J. ; Zheng, Yuliang; Imai, HidekiA Fast Cryptographic Hash Function Based on Cellular Automata over GF(q)1998Global IT Security, IFIP (14th IFIP Int. Conf. on Information Security at 15th World Comput. Congress - IFIP/SEC '98, Vienna - Budapest); 96-107M30
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA Low Complexity Authentication Technique Based on Binary Channel with Deletion, Insertion and Complementing2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 95-100M30
Mihaljević, Miodrag J. ; Imai, HidekiA message authentication approach for for information systems1999Info-Science; 7(1); 4-7M50
Mihaljević, Miodrag J. ; Imai, HidekiA method for data access control in certain storage area networks20047th Int. Symp. on Wireless Personal Multimedia Comm. - WPMC2004, Albano Terme, Italy; 3; 488-491M30
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys2005HISC 2005 - Hawaii, IEICE and SITA Joint Conference on Information Theory, Hawaii, USA; 183-188M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA novel fast correlation attack suitable for simple hardware implementation2000Technical report of IEICE. ISEC; JW-ISC'2000, Okinawa, Japan; 99(584); 1-8M30
Mihaljević, Miodrag J. ; Imai, HidekiA Stream Ciphering Approach Based on the Wire-Tap Channel Coding20088th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiA time-memory trade-off for the fast correlation attack2000ISITA2000, Hawaii, USA; 55-58M30
Mihaljević, Miodrag J. ; Fossorier, Marc P.C.; Imai, HidekiAn algorithm for cryptanalysis of certain keystream generators suitable for high-speed software and hardware implementations1-Jan-2001IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E84-A(1); 311-318M23
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki; Cui, Yang; Matsuura, KantaAn algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 4329 LNCS; 48-62M23
Mihaljević, Miodrag J. ; Imai, HidekiAn Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Mode20114th Western European Workshop on Research in Cryptology - WEWoRC 2011, Weimar, Germany; 21-25M30
Imai, Hideki; Mihaljević, Miodrag J. ; Isaka, M.; Fossorier, Marc P. C.Applications of iterative decoding techniques to cryptography20002nd Int. Symp. on Turbo Codes & Related Topics, Brest, France; 227-234M30
Mihaljević, Miodrag J. ; Imai, HidekiAn approach for stream ciphers design based on joint computing over random and secret data1-Jun-2009Computing; 85(1-2); 153-168M22
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiBirthday paradox based security analysis of certain broadcast encryption schemes1-Jan-2007IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E90-A(6); 1248-1251M23
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiA cellular automata based HB#-like low complexity authentication technique1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008, 7-10 Dec. 2008
Mihaljević, Miodrag J. ; Imai, HidekiConstruction of Fast MAC Based on Linear Cellular Automata over GF(q)1998ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 40-43M30
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiCritical noise for convergence of iterative probabilistic decoding with belief propagation in cryptographic applications1-Jan-1999Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 1719; 282-293M21
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiCryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks1-Jan-2005Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3797 LNCS; 155-168M23
Mihaljević, Miodrag J. ; Imai, HidekiCryptanalysis of TOYOCRYPT-HS1 stream cipher1-Jan-2002IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E85-A(1); 66-73M23
Mihaljević, Miodrag J. ; Imai, HidekiThe decimated sample based improved algebraic attacks on the nonlinear filters1-Jan-2005Lecture Notes in Computer Science; 3352; 310-323M23