Search Results1-20 of  69

  • 1 / 4
  • Goichiro Hanaoka ID: 9000346959140

    Articles in CiNii:1

    • Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions (2016)
  • HANAOKA Goichiro ID: 9000403923839

    Articles in CiNii:1

    • Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack (2017)
  • HANAOKA Goichiro ID: 9000403923849

    Articles in CiNii:1

    • Card-Based Protocols Using Regular Polygon Cards (2017)
  • Goichiro Hanaoka ID: 9000004797014

    National Institute of Advanced Industrial Science and Technology (AIST) (2011 from CiNii)

    Articles in CiNii:36

    • Towards Removing Random Oracles from OAEP (2003)
    • Information Theoretical Secure Oblivious Polynomial Evaluation : Model, Bounds and Constructions (2003)
    • On Evaluating the Entropy of Graphical Passwords (2003)
  • Goichiro Hanaoka ID: 9000402232263

    Articles in CiNii:1

    • A limitation on security evaluation of cryptographic primitives with fixed keys (2016)
  • Goichiro Hanaoka ID: 9000403952845

    Articles in CiNii:1

    • Privacy-preserving search for chemical compound databases (2015)
  • Goichiro Hanaoka ID: 9000406177533

    AIST (2018 from CiNii)

    Articles in CiNii:1

    • A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening (2018)
  • Goichiro Hanaoka ID: 9000406177537

    National Institute of Advanced Industrial Science and Technology (2018 from CiNii)

    Articles in CiNii:1

    • Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption (2018)
  • Goichiro Hanaoka ID: 9000406177540

    AIST (2018 from CiNii)

    Articles in CiNii:1

    • Embedding Lemmas for Functional Encryption (2018)
  • Goichiro Hanaoka ID: 9000406177590

    National Institute of Advanced Industrial Science and Technology (2018 from CiNii)

    Articles in CiNii:1

    • A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO (2018)
  • Goichiro Hanaoka ID: 9000406178090

    AIST (2018 from CiNii)

    Articles in CiNii:1

    • Tree-based Secure Comparison of Secret Shared Data (2018)
  • Goichiro Hanaoka ID: 9000406178097

    AIST (2018 from CiNii)

    Articles in CiNii:1

    • Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests (2018)
  • Goichiro Hanaoka ID: 9000406178101

    AIST (2018 from CiNii)

    Articles in CiNii:1

    • Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol (2018)
  • Goichiro Hanaoka ID: 9000406381812

    Articles in CiNii:1

    • Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions (2019)
  • HANAOKA Goichiro ID: 9000004829831

    Institute of Industrial Science, University of Tokyo (2004 from CiNii)

    Articles in CiNii:1

    • Traceability Schemes against Illegal Distribution of Signed Documents (2004)
  • HANAOKA Goichiro ID: 9000004831507

    Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science & Technology (AIST) (2009 from CiNii)

    Articles in CiNii:2

    • CCA-Secure Public Key Encryption without Group-Dependent Hash Functions (2009)
    • How to Break COT-Based Fingerprinting Schemes and Design New One (2005)
  • HANAOKA Goichiro ID: 9000004894696

    School of Engineering, The University of Tokyo (1997 from CiNii)

    Articles in CiNii:2

    • Facial Caricature by Computer Based on the Style of Individual Human Caricaturist (1997)
    • Facial Caricature by Computer with Preserving Touch of Individual Painter (1997)
  • HANAOKA Goichiro ID: 9000004956615

    the University of Tokyo, Institute of Industrial Science (2000 from CiNii)

    Articles in CiNii:1

    • On the Hierarchical Structure of Trusted Authority for Unconditionally Secure Cryptography (2000)
  • HANAOKA Goichiro ID: 9000014605323

    Research Center for Information Security (RCIS), National Institute of Advanced Industrial Science and Technology (AIST) (2010 from CiNii)

    Articles in CiNii:6

    • Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero Knowledgeness (2009)
    • Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero Knowledgeness (2009)
    • Improving Efficiency of an 'On the Fly' Identification Scheme by Perfecting Zero Knowledgeness (2009)
  • HANAOKA Goichiro ID: 9000017538111

    Research Institute for Secure Systems National Institute of Advanced Industrial Science and Technology (2013 from CiNii)

    Articles in CiNii:45

    • A Generic Construction of Key-Insulated Encryption (2003)
    • Forward Secure Encryption, Key-Insulated Encryption and Their Hybrid Schemes (2004)
    • Digital Signatures with Traceability (2001)
  • 1 / 4
Page Top