Search Results1-20 of  51

  • 1 / 3
  • HANAOKA Goichiro ID: 9000403093532

    Articles in CiNii:1

    • Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack (2017)
  • HANAOKA Goichiro ID: 9000403093542

    Articles in CiNii:1

    • Card-Based Protocols Using Regular Polygon Cards (2017)
  • Goichiro Hanaoka ID: 9000004797014

    National Institute of Advanced Industrial Science and Technology (AIST) (2011 from CiNii)

    Articles in CiNii:36

    • Towards Removing Random Oracles from OAEP (2003)
    • Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions (2003)
    • On Evaluating the Entropy of Graphical Passwords (2003)
  • Goichiro Hanaoka ID: 9000346959140

    Articles in CiNii:1

    • Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions (2016)
  • Goichiro Hanaoka ID: 9000402232263

    Articles in CiNii:1

    • A limitation on security evaluation of cryptographic primitives with fixed keys (2016)
  • Goichiro Hanaoka ID: 9000403100205

    Articles in CiNii:1

    • Privacy-preserving search for chemical compound databases (2015)
  • HANAOKA Goichiro ID: 9000004829831

    Institute of Industrial Science, University of Tokyo (2004 from CiNii)

    Articles in CiNii:1

    • Traceability Schemes against Illegal Distribution of Signed Documents (2004)
  • HANAOKA Goichiro ID: 9000004831507

    Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science & Technology (AIST) (2009 from CiNii)

    Articles in CiNii:2

    • CCA-Secure Public Key Encryption without Group-Dependent Hash Functions (2009)
    • How to Break COT-Based Fingerprinting Schemes and Design New One (2005)
  • HANAOKA Goichiro ID: 9000004894696

    School of Engineering, The University of Tokyo (1997 from CiNii)

    Articles in CiNii:2

    • Facial Caricature by Computer Based on the Style of Individual Human Caricaturist (1997)
    • Facial Caricature by Computer with Preserving Touch of Individual Painter (1997)
  • HANAOKA Goichiro ID: 9000004956615

    the University of Tokyo, Institute of Industrial Science (2000 from CiNii)

    Articles in CiNii:1

    • On the Hierarchical Structure of Trusted Authority for Unconditionally Secure Cryptography (2000)
  • HANAOKA Goichiro ID: 9000014605323

    Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST) (2010 from CiNii)

    Articles in CiNii:6

    • Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero Knowledgeness (2009)
    • Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero Knowledgeness (2009)
    • Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero Knowledgeness (2009)
  • HANAOKA Goichiro ID: 9000017538111

    Research Institute for Secure Systems National Institute of Advanced Industrial Science and Technology (2013 from CiNii)

    Articles in CiNii:45

    • A Generic Construction of Key-Insulated Encryption (2003)
    • Forward Secure Encryption, Key-Insulated Encryption and Their Hybrid Schemes (2004)
    • Digital Signatures with Traceability (2001)
  • HANAOKA Goichiro ID: 9000017688152

    Research Center for Information Security, National Institute of Advanced Industrial Science and Technology (AIST) (2008 from CiNii)

    Articles in CiNii:1

    • Invisibly Sanitizable Digital Signature Scheme (2008)
  • HANAOKA Goichiro ID: 9000018592724

    National Institute of Advanced Industrial Science and Technology (AIST) (2010 from CiNii)

    Articles in CiNii:1

    • Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency (2010)
  • HANAOKA Goichiro ID: 9000018592726

    National Institute of Advanced Industrial Science and Technology (AIST) (2010 from CiNii)

    Articles in CiNii:1

    • Between Hashed DH and Computational DH : Compact Encryption from Weaker Assumption (2010)
  • HANAOKA Goichiro ID: 9000018592953

    Research Center for Information Security, National Institute of Advanced Industrial Science and Technology (2011 from CiNii)

    Articles in CiNii:1

    • An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness (2011)
  • HANAOKA Goichiro ID: 9000018593024

    Research Center for Information Security, National Institute of Advanced Industrial Science and Technology (2011 from CiNii)

    Articles in CiNii:1

    • Sequential Bitwise Sanitizable Signature Schemes (2011)
  • HANAOKA Goichiro ID: 9000018820966

    National Institute of Advanced Industrial Science and Technology (2011 from CiNii)

    Articles in CiNii:1

    • How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model (2011)
  • HANAOKA Goichiro ID: 9000242655265

    Research Institute for Secure Systems, National Institute of Advanced Industrial Science and Technology (2012 from CiNii)

    Articles in CiNii:1

    • [Invited Talk] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order (2012)
  • HANAOKA Goichiro ID: 9000242790175

    AIST (2013 from CiNii)

    Articles in CiNii:3

    • Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme (2013)
    • Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme (2013)
    • Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme (2013)
  • 1 / 3
Page Top