Search Results1-20 of  26

  • 1 / 2
  • Kazuhide Fukushima ID: 9000287150172

    Articles in CiNii:1

    • Challenges and design considerations for the authorizationanalysis of a software framework (2011)
  • Kazuhide Fukushima ID: 9000347528717

    Articles in CiNii:1

    • Optimization of Group Key Management Structure with a Client Join-Leave Mechanism (2008)
  • FUKUSHIMA Kazuhide ID: 9000397849563

    Articles in CiNii:1

    • Code-Based Signature Scheme without Trapdoors (情報セキュリティ) (2018)
  • FUKUSHIMA Kazuhide ID: 9000397850504

    Articles in CiNii:1

    • Code-Based Signature Scheme without Trapdoors (技術と社会・倫理) (2018)
  • FUKUSHIMA Kazuhide ID: 9000397851553

    Articles in CiNii:1

    • Code-Based Signature Scheme without Trapdoors (ハードウェアセキュリティ) (2018)
  • FUKUSHIMA Kazuhide ID: 9000399247603

    Articles in CiNii:1

    • Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme (情報セキュリティ) (2018)
  • FUKUSHIMA Kazuhide ID: 9000399248408

    Articles in CiNii:1

    • Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme (技術と社会・倫理) (2018)
  • FUKUSHIMA Kazuhide ID: 9000402384888

    Articles in CiNii:1

    • Secret Sharing on Evolving Multi-level Access Structure (情報理論) (2019)
  • FUKUSHIMA Kazuhide ID: 9000402437628

    Articles in CiNii:1

    • Secret Sharing on Evolving Multi-level Access Structure (情報セキュリティ) (2019)
  • FUKUSHIMA Kazuhide ID: 9000402438376

    Articles in CiNii:1

    • Secret Sharing on Evolving Multi-level Access Structure (ワイドバンドシステム) (2019)
  • Kazuhide Fukushima ID: 9000404293877

    Articles in CiNii:1

    • Memory-Constrained Implementation of Lattice-Based Encryption Scheme on Standard Java Card (2016)
  • Kazuhide Fukushima ID: 9000404294025

    Articles in CiNii:1

    • An Experimental Study of the BDD Approach for the Search LWE Problem (2016)
  • Kazuhide Fukushima ID: 9000404302157

    Articles in CiNii:1

    • Efficient Implementation of Discrete Gaussian Sampling for Lattice-Based Cryptography Using JavaScript (2017)
  • FUKUSHIMA Kazuhide ID: 9000019135098

    KDDI R&D Laboratories, Inc. (2012 from CiNii)

    Articles in CiNii:1

    • Software Protection Combined with Tamper-Proof Device (2012)
  • FUKUSHIMA Kazuhide ID: 9000107340119

    KDDI R&D Laboratories Inc. (2012 from CiNii)

    Articles in CiNii:1

    • Implementation of Pairing Based Cryptosystem on Mobile Phones (2012)
  • FUKUSHIMA Kazuhide ID: 9000242085467

    KDDI R&D Laboratories (2014 from CiNii)

    Articles in CiNii:1

    • Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure (2014)
  • FUKUSHIMA Kazuhide ID: 9000242085768

    KDDI R&D Laboratories (2014 from CiNii)

    Articles in CiNii:1

    • Fast Implementation of KCipher-2 for Software and Hardware (2014)
  • FUKUSHIMA Kazuhide ID: 9000347320021

    KDDI Research, Inc. (2017 from CiNii)

    Articles in CiNii:1

    • IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences: So far and from now on (2017)
  • Fukushima Kazuhide ID: 9000002316306

    Articles in CiNii:39

    • Obfuscation Scheme for Java focusing on Access Relation between Classes (2004)
    • Program Birthmark Scheme with Tolerance to Equivalent Conversion of Java Classfiles (2003)
    • A Software Fingerprinting Scheme for Java Using Class Structure Transformation (2005)
  • Fukushima Kazuhide ID: 9000019961886

    KDDI R&D Laboratories, Inc. (2008 from CiNii)

    Articles in CiNii:1

    • Optimization of Group Key Management Structure with a Client Join-Leave Mechanism (2008)
  • 1 / 2
Page Top