3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA. | 0 | 0.34 | 2020 |
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA. | 0 | 0.34 | 2020 |
Organizational Cryptography for Access Control. | 0 | 0.34 | 2018 |
Privacy Preserving Logic Formula Calculation in Cloud | 0 | 0.34 | 2016 |
Secure Semantic Computing | 0 | 0.34 | 2016 |
Proposal Of The Multivariate Public Key Cryptosystem Relying On The Difficulty Of Factoring A Product Of Two Large Prime Numbers | 0 | 0.34 | 2016 |
Privacy Preserving Data Processing | 1 | 0.40 | 2015 |
Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems. | 2 | 0.38 | 2013 |
Privacy Preserving Problem Solving Scheme | 0 | 0.34 | 2013 |
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization. | 2 | 0.38 | 2012 |
Hidden Pair of Bijection Signature Scheme. | 1 | 0.36 | 2011 |
Enhanced STS using Check Equation -Extended Version of the Signature scheme proposed in the PQCrypt2010-. | 2 | 0.38 | 2010 |
Proposal of a signature scheme based on STS trapdoor | 13 | 0.57 | 2010 |
Dually-Perturbed Matsumoto-Imai Signature (Dpms) Scheme | 1 | 0.35 | 2010 |
Clarifying the specification of linear Piece In Hand matrix method | 0 | 0.34 | 2010 |
A knapsack cryptosystem based on multiple knapsacks | 1 | 0.35 | 2010 |
Key-Generation Algorithms For Linear Piece In Hand Matrix Method | 1 | 0.37 | 2010 |
Two-sided multiplications are reduced to one-sided multiplication in linear piece in hand matrix methods | 0 | 0.34 | 2010 |
Proposal of PPS Multivariate Public Key Cryptosystems. | 0 | 0.34 | 2009 |
Security Enhancement Of Various Mpkcs By 2-Layer Nonlinear Piece In Hand Method | 6 | 0.46 | 2009 |
Robust Noise Suppression Algorithm with the Kalman Filter Theory for White and Colored Disturbance | 4 | 0.64 | 2008 |
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems | 5 | 0.43 | 2008 |
Fast Noise Suppression Algorithm with Kalman Filter Theory | 1 | 0.63 | 2008 |
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems. | 4 | 0.41 | 2008 |
Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems | 8 | 0.53 | 2007 |
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems | 1 | 0.35 | 2006 |
A Subspace Blind Identification Algorithm with Reduced Computational Complexity—Colored Noise Case— | 0 | 0.34 | 2005 |
An Extension of GHS Weil Descent Attack. | 0 | 0.34 | 2005 |
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures | 5 | 0.45 | 2005 |
An Extension of GHS Weil Descent Attack | 0 | 0.34 | 2005 |
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation. | 0 | 0.34 | 2005 |
Improvements Of Addition Algorithm On Genus 3 Hyperelliptic Curves And Their Implementation | 16 | 1.33 | 2005 |
Information security as interdisciplinary science based on ethics | 0 | 0.34 | 2005 |
Paradigm of Information Security as Interdisciplinary Comprehensive Science | 4 | 0.55 | 2004 |
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key. | 0 | 0.34 | 2004 |
Baby Step Giant Step Algorithms In Point Counting Of Hyperelliptic Curves | 3 | 0.46 | 2003 |
Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key. | 0 | 0.34 | 2003 |
Proposal on personal identifiers generated from the STR information of DNA | 6 | 0.73 | 2002 |
An Improved Baby Step Giant Step Algorithm for Point Counting of Hyperelliptic Curves over Finite Fields | 18 | 1.24 | 2002 |
A consideration on the blind estimation of single-input double-output system using orthogonal direct sum decomposition of received signal space. | 0 | 0.34 | 2001 |
Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties | 1 | 0.37 | 2000 |
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems | 2 | 0.50 | 2000 |
Simplification of stochastic fastest NLMS algorithm | 0 | 0.34 | 1999 |
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings | 7 | 2.65 | 1998 |
Revolution of civilisation and information security | 0 | 0.34 | 1998 |
Efficient construction of secure hyperelliptic discrete logarithm problems | 6 | 2.13 | 1997 |
Electronic Money and Key Management from Global and Regional Points of View | 0 | 0.34 | 1996 |
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. | 1 | 0.35 | 1996 |
Low exponent attack against elliptic curve RSA | 11 | 1.76 | 1995 |
Improvement In Stability And Convergence Speed On Normalized Lms Algorithm | 1 | 0.63 | 1995 |