Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Tidjani Négadi
P. L. Srikanth
Branson W. Murrill
Melike Sirlanci
Jhonathan Pinzon
Liangliang Shang
Giovanni Venturelli
Chen Ma
Jing-Sheng Wong
Radu Timofte
Home
/
Author
/
YUICHI KOMANO
Author Info
Open Visualization
Name
Affiliation
Papers
YUICHI KOMANO
TOSHIBA Corporation, Kawasaki-shi, Kanagawa, Japan
26
Collaborators
Citations
PageRank
33
58
10.91
Referers
Referees
References
145
197
135
Search Limit
100
197
Publications (26 rows)
Collaborators (33 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags
0
0.34
2021
Efficient Algorithms For Sign Detection In Rns Using Approximate Reciprocals
1
0.35
2021
RNS Montgomery reduction algorithms using quadratic residuosity
3
0.40
2019
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function
2
0.37
2019
Multi-party Computation Based on Physical Coins.
0
0.34
2018
Efficient And Secure Firmware Update/Rollback Method For Vehicular Devices
0
0.34
2018
Integrative Acceleration of First-Order Boolean Masking for Embedded IoT Devices.
0
0.34
2018
A new model of Client-Server Communications under information theoretic security
0
0.34
2014
Secure authenticated key exchange with revocation for smart grid
10
0.89
2012
Bs-Cpa: Built-In Determined Sub-Key Correlation Power Analysis
8
0.69
2010
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN
2
0.39
2009
Security evaluation of a DPA-Resistant s-box based on the fourier transform
4
0.42
2009
Built-in Determined Sub-key Correlation Power Analysis.
2
0.44
2009
Provably Secure Multisignatures in Formal Security Model and Their Optimality
1
0.37
2008
Toward the Fair Anonymous Signatures: Deniable Ring Signatures*The proceedings version of this paper [12] appeared in the cryptographers' track at the RSA Conference 2006 (CT-RSA 2006).
1
0.35
2007
Fair Exchange of Signatures with Multiple Signers
0
0.34
2007
Provably Secure Untraceable Electronic Cash against Insider Attacks
3
0.39
2007
Formal security model of multisignatures
3
0.40
2006
Provably secure electronic cash based on blind multisignature schemes
3
0.40
2006
Taxonomical Security Consideration of OAEP Variants*The proceedings version of this paper [11] appeared in Sixth International Conference on Information and Communications Security (ICICS'04).
2
0.38
2006
Taxonomical Security Consideration Of Oaep Variants
1
0.37
2006
On the security of probabilistic multisignature schemes and their optimality
5
0.47
2005
Solutions To Security Problems Of Rivest And Shamir'S Payword Scheme
2
0.39
2005
Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation
2
0.40
2004
Oaep-Es - Methodology Of Universal Padding Technique
0
0.34
2004
The Security Problems Of Rivest And Shamir'S Payword Scheme
3
0.69
2003
1