Search results for: Kazukuni Kobara
IEEE Transactions on Dependable and Secure Computing > 2017 > 14 > 5 > 573 - 576
Lecture Notes in Computer Science > Mathematical Methods in Computer Science > Cryptography II > 142-156
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Key Management and Protocols > 155-172
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 173-182
Lecture Notes in Computer Science > Information Security Applications > Digital Rights Management > 251-263
Lecture Notes in Computer Science > Information and Communication Security > Complexity and Security Functions > 309-323
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Cryptography > 149-158
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Cryptography > 159-168
Lecture Notes in Computer Science > Information Security Applications > Wireless and Mobile Security > 173-187
Lecture Notes in Computer Science > Computational Intelligence and Security > Systems and Security > 767-777
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Regular Contributions > 168-177
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2005 > Public-Key Encryption > 104-117
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2001 > Block Ciphers > 193-207