Browsing by Author Imai, Hideki


Or, select a letter below to browse by last name
0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 50 to 65 of 65 < previous 
Author(s)TitleIssue DateAppears inRank
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiReduced complexity iterative decoding of low-density parity check codes based on belief propagation1-Jan-1999IEEE Transactions on Communications; 47(5); 673-680M21
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecret-public storage trade-off for broadcast encryption key management1-Dec-2004Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3269; 375-387M23
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach2007HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129M30
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off1-Dec-2007IEEE Communications Letters; 11(12); 988-990M22
Mihaljević, Miodrag J. ; Imai, HidekiA security evaluation of certain stream ciphers which involve randomness and coding1-Dec-2010ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, HidekiSecurity evaluation of stream ciphers2002Computer Today; 107; 4-10M50
Mihaljević, Miodrag J. ; Imai, HidekiSecurity Issues of Cloud Computing and an Encryption Approach2014Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education; 388-408M14
Mihaljević, Miodrag J. ; Imai, HidekiSecurity issues of cloud computing and an encryption approach31-Oct-2014Cloud Technology: Concepts, Methodologies, Tools, and Applications; 3; 1527-1547
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, HidekiSecurity weaknesses of certain broadcast encryption schemes1-Jan-2006Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3919 LNCS; 228-245M23
Mihaljević, Miodrag J. ; Imai, HidekiA stream cipher design based on embedding of random bits1-Dec-20082008 International Symposium on Information Theory and its Applications, ISITA2008; International Symposium on Information Theory and its Applications, ISITA2008; Auckland; New Zealand; 7 December 2008 through 10 December 2008; 4895641M30
Mihaljević, Miodrag J. ; Imai, HidekiA Stream Ciphering Approach Based on the Wire-Tap Channel Coding20088th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18M30
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiTime-Memory and Time-Memory-Data Trade-Off for Noisy Ciphertext2010ECRYPT Workshop on Tools for Cryptanalysis 2010; 27-36M30
Mihaljević, Miodrag J. ; Imai, HidekiTowards Lightweight Cryptographic Primitives Employing Coding Theory2013BalkanCrypt 2013
Camion, Paul; Mihaljević, Miodrag J. ; Imai, HidekiTwo alerts for design of certain stream ciphers: Trapped LFSR and weak resilient function over GF(q)1-Dec-2003Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 2595; 196-213M23
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, HidekiA unified analysis for the fast correlation attack1-Jan-2005IEEE International Symposium on Information Theory - Proceedings; 2005; 2012-2015
Camion, P.; Mihaljević, Miodrag J. ; Imai, HidekiVulnerability of certain keystream generators based on resilient functions2000ISITA2000, Hawaii, USA; 70-73M30