Browsing by Author Imai, Hideki
Showing results 42 to 61 of 65
< previous
next >
Author(s) | Title | Issue Date | Appears in | Rank |
---|---|---|---|---|
Mihaljević, Miodrag J. ; Imai, Hideki; David, Michael; Kobara, Kazukuni; Watanabe, Hajime | On advanced cryptographic techniques for information security of smart grid AMI | 1-Dec-2011 | ACM International Conference Proceeding Series; 7th Annual Cyber Security and Information Intelligence Research Workshop: Energy Infrastructure Cyber Protection, CSIIRW11; Oak Ridge, TN; United States; 12 October 2011 through 14 October 2011 | |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | On decoding techniques for cryptanalysis of certain encryption algorithms | 1-Jan-2001 | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences; E84-A(4); 919-930 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | On employment of different weight parity-checks for the fast correlation attack | 1-Jan-2001 | IEEE International Symposium on Information Theory - Proceedings; IEEE International Symposium on Information Theory (ISIT 2001); Washington, DC; United States; 24 June 2001 through 29 June 2001; 119 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | On Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem | 2011 | 2011 Symmetric Key Encryption Workshop - SKEW 2011, Copenhagen, Denmark; 1-17 | M30 |
Camion, Paul; Mihaljević, Miodrag J. ; Imai, Hideki | On employment of LFSRs over GF(q) in certain stream ciphers | 1-Jan-2002 | IEEE International Symposium on Information Theory - Proceedings; 210 | |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | One-way mapping of keys and the overheads trade-off in key management schemes for broadcast encryption | 2004 | Int. Symp. Inform. Theory and its Appl. - ISITA2004, Parma, Italy; 486-491 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | Privacy Preserving Light-Weight Authentication Based on a Variant of Niederreiter Public-Key Encryption | 2015 | The IPSI BgD Transactions on Advanced Research; 11(1); 6-12 | M53 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Reduced Complexity Iterative Decoding of Low Density Parity Check Codes Based on Belief Propagation | 1998 | ISITA '98 - 1998 IEEE Int. Symp. on Information Theory and Its Applications, Mexico, Mexico-City; 654-658 | M30 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Reduced complexity iterative decoding of low-density parity check codes based on belief propagation | 1-Jan-1999 | IEEE Transactions on Communications; 47(5); 673-680 | M21 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Secret-public storage trade-off for broadcast encryption key management | 1-Dec-2004 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3269; 375-387 | M23 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security Evaluation of Certain Broadcast Encryption Models Employing a Dedicated Time-Memory Trade-Off Approach | 2007 | HISC 2007 - Hawaii IEICE and SITA Joint Conference on Information Theory, Honolulu, US; 125-129 | M30 |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off | 1-Dec-2007 | IEEE Communications Letters; 11(12); 988-990 | M22 |
Mihaljević, Miodrag J. ; Imai, Hideki | A security evaluation of certain stream ciphers which involve randomness and coding | 1-Dec-2010 | ISITA/ISSSTA 2010 - 2010 International Symposium on Information Theory and Its Applications; 20th International Symposium on Information Theory and Its Applications, ISITA 2010 and the 2010 20th International Symposium on Spread Spectrum Techniques and Applications, ISSSTA 2010; Taichung; Taiwan; 17 October 2010 through 20 October 2010; 789-794 | |
Mihaljević, Miodrag J. ; Watanabe, Hajime; Imai, Hideki | Security evaluation of stream ciphers | 2002 | Computer Today; 107; 4-10 | M50 |
Mihaljević, Miodrag J. ; Imai, Hideki | Security Issues of Cloud Computing and an Encryption Approach | 2014 | Handbook of Research on High Performance and Cloud Computing in Scientific Research and Education; 388-408 | M14 |
Mihaljević, Miodrag J. ; Imai, Hideki | Security issues of cloud computing and an encryption approach | 31-Oct-2014 | Cloud Technology: Concepts, Methodologies, Tools, and Applications; 3; 1527-1547 | |
Mihaljević, Miodrag J. ; Fossorier, Marc P. C.; Imai, Hideki | Security weaknesses of certain broadcast encryption schemes | 1-Jan-2006 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 3919 LNCS; 228-245 | M23 |
Mihaljević, Miodrag J. ; Imai, Hideki | A stream cipher design based on embedding of random bits | 1-Dec-2008 | 2008 International Symposium on Information Theory and its Applications, ISITA2008; International Symposium on Information Theory and its Applications, ISITA2008; Auckland; New Zealand; 7 December 2008 through 10 December 2008; 4895641 | M30 |
Mihaljević, Miodrag J. ; Imai, Hideki | A Stream Ciphering Approach Based on the Wire-Tap Channel Coding | 2008 | 8th Central European Conference on Cryptography - CECC 2008, Graz, Austria; 16-18 | M30 |
Fossorier, Marc P. C.; Mihaljević, Miodrag J. ; Imai, Hideki | Time-Memory and Time-Memory-Data Trade-Off for Noisy Ciphertext | 2010 | ECRYPT Workshop on Tools for Cryptanalysis 2010; 27-36 | M30 |