Search results for: Hiroki Shizuya
Lecture Notes in Computer Science > Cryptology and Network Security > Algebraic and Number-Theoretic Schemes > 433-442
Lecture Notes in Computer Science > Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics > Dealing necessary and sufficient numbers of cards for sharing a one-bit secret key > 273-285
Lecture Notes in Computer Science > Information Hiding > 157-168
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT’ 92 > Complexity Theory and Cryptography II > 420-428
Lecture Notes in Computer Science > Computing and Combinatorics > Combinatorics and Cryptography > 349-360
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’95 > Complexity Aspects > 341-355
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2002 > Applications > 339-353
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’99 > Tools from Related areas > 389-401
International Journal of Information Security > 2014 > 13 > 1 > 15-23
International Journal of Information Security > 2009 > 8 > 5 > 347-355
Discrete Applied Mathematics > 2003 > 131 > 1 > 213-236
International Journal of Information Security > 2003 > 1 > 2 > 131-142