Name
Affiliation
Papers
HIDEKI IMAI
national institute of advanced industrial science and technology
61
Collaborators
Citations 
PageRank 
86
564
48.82
Referers 
Referees 
References 
998
671
673
Search Limit
100998
Title
Citations
PageRank
Year
Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes00.342020
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.00.342017
How To Make Traitor Tracing Schemes Secure Against A Content Comparison Attack In Actual Services00.342017
Content and Key Management to Trace Traitors in Broadcasting Services10.352015
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE00.342014
A construction method of matroidal networks20.372012
A Numerical Evaluation Of Entanglement Sharing Protocols Using Quantum Ldpc Css Codes00.342012
Spatially coupled quasi-cyclic quantum LDPC codes271.162011
Round-optimal deniable ring authentication in the presence of big brother30.412010
On the security of the quantum key distribution using the Mean King Problem10.632010
Cca-Secure Public Key Encryption Without Group-Dependent Hash Functions00.342009
Generic Construction of Stateful Identity Based Encryption00.342009
Bounds on the Number of Users for Random 2-Secure Codes10.382009
An Efficient 2-Secure And Short Random Fingerprint Code And Its Security Evaluation60.532009
An improvement of discrete Tardos fingerprinting codes451.662009
An image sanitizing scheme using digital watermarking00.342009
Strong Anonymous Signature30.392009
A generic construction of useful client puzzles20.382009
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions00.342008
A Novel Probabilistic Passive Attack On The Protocols Hb And Hb+20.382008
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption10.352008
On the use of Bhattacharyya distance as a measure of the detectability of steganographic systems30.392008
Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service40.422007
Bounded CCA2-Secure Encryption301.332007
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs00.342007
Security evaluation of certain broadcast encryption schemes employing a generalized time-memory-data trade-off70.572007
Unconditionally Secure Chaffing-and-Winnowing for Multiple Use00.342007
Formal Security Treatments For Ibe-To-Signature Transformation: Relations Among Security Notions110.562007
Comparative studies in key disagreement correction process on wireless key agreement system20.442007
Wolf attack probability: a new security measure in biometric authentication systems90.972007
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services00.342007
An efficient aggregate shuffle argument scheme10.372007
Applying fujisaki-okamoto to identity-based encryption171.322006
Digitally signed document sanitizing scheme based on bilinear maps471.752006
Adaptively secure traitor tracing against key exposure and its application to anywhere TV service30.412006
Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions50.402006
Security Protocols Protection Based on Anomaly Detection10.372006
Parallel key-insulated public key encryption341.132006
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature110.822006
An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication10.362006
A Generic Construction of CCA-Secure Cryptosystems without NIZKP for a Bounded Number of Decryption Queries.00.342006
.Efficient Protocols Achieving The Commitment Capacity Of Noisy Correlations90.612006
A Provably Secure Refreshable Partially Anonymous Token and Its Applications10.372006
Trends and challenges for securer cryptography in practice00.342005
How to Protect Peer-to-Peer Online Games from Cheats00.342005
Identity-Based hierarchical strongly key-insulated encryption and its application351.312005
Graph-Decomposition-Based frameworks for subset-cover broadcast encryption and efficient instantiations100.642005
IDS false alarm reduction using continuous and discontinuous patterns211.092005
Digitally Signed Document Sanitizing Scheme With Disclosure Condition Control512.982005
A generic conversion with optimal redundancy40.422005
  • 1
  • 2