Search results for: Koji Nuida
Designs, Codes and Cryptography > 2018 > 86 > 8 > 1623-1683
Journal of Combinatorial Theory, Series A > 2016 > 144 > C > 326-360
Lecture Notes in Computer Science > Information Theoretic Security > Fingerprint and Watermarking > 213-230
Lecture Notes in Computer Science > Information Theoretic Security > Fingerprint and Watermarking > 194-212
Lecture Notes in Computer Science > Information Theoretic Security > Connection to Computational Security > 56-73
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > Regular Contributions > 80-89
Lecture Notes in Computer Science > Advances in Information and Computer Security > Mathematical and Symmetric Cryptography > 144-160
Lecture Notes in Computer Science > Advances in Information and Computer Security > Contents Protection and Intrusion Detection > 140-157
BMC Bioinformatics > 2015 > 16 > 18 > 1-14
IEEE Transactions on Information Theory > 2013 > 59 > 1 > 635 - 652
Journal of Algebra > 2012 > 350 > 1 > 207-217
International Journal of Information Security > 2012 > 11 > 2 > 85-102
Reports on Mathematical Physics > 2010 > 66 > 2 > 175-206
Discrete Mathematics > 2010 > 310 > 4 > 819-831
Designs, Codes and Cryptography > 2009 > 52 > 3 > 339-362