What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hideki Imai
Google Scholar
92
publications in security and cryptology related venues
Year
Venue
Title
2012
conf/icisc
Ciphertext Policy Multi-dimensional Range Encryption.
Kohei Kasamatsu
Takahiro Matsuda
Goichiro Hanaoka
Hideki Imai
2010
conf/fc
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results.
Jin Tamura
Kazukuni Kobara
Hanane Fathi
Hideki Imai
2010
conf/wisa
Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.
Rafael Dowsley
Goichiro Hanaoka
Hideki Imai
Anderson C. A. Nascimento
2009
conf/ccs
A generic construction of useful client puzzles.
Rui Zhang
Goichiro Hanaoka
Hideki Imai
2009
conf/acns
Dual-Policy Attribute Based Encryption.
Nuttapong Attrapadung
Hideki Imai
2009
conf/icics
An Image Sanitizing Scheme Using Digital Watermarking.
Masatoshi Noguchi
Manabu Inuma
Rie Shigetomi
Hideki Imai
2009
conf/ctrsa
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
Takahiro Matsuda
Goichiro Hanaoka
Kanta Matsuura
Hideki Imai
2008
conf/icisc
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.
Takahiro Matsuda
Goichiro Hanaoka
Kanta Matsuura
Hideki Imai
2008
conf/iwsec
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.
Goichiro Hanaoka
Hideki Imai
Kazuto Ogawa
Hajime Watanabe
2007
conf/fse
Algebraic Cryptanalysis of 58-Round SHA-1.
Makoto Sugita
Mitsuru Kawazoe
Ludovic Perret
Hideki Imai
2007
conf/fc
An Efficient Aggregate Shuffle Argument Scheme.
Jun Furukawa
Hideki Imai
2007
conf/ih
Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.
Koji Nuida
Manabu Hagiwara
Hajime Watanabe
Hideki Imai
2007
conf/provsec
Formal Security Treatments for Signatures from Identity-Based Encryption.
Yang Cui
Eiichiro Fujisaki
Goichiro Hanaoka
Hideki Imai
Rui Zhang
2007
conf/provsec
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Takahiro Matsuda
Nuttapong Attrapadung
Goichiro Hanaoka
Kanta Matsuura
Hideki Imai
2007
conf/wisa
Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.
Toru Hashimoto
Takashi Itoh
Masazumi Ueba
Hisato Iwai
Hideichi Sasaoka
Kazukuni Kobara
Hideki Imai
2007
conf/iwsec
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.
SeongHan Shin
Kazukuni Kobara
Hideki Imai
2007
conf/asiacrypt
Bounded CCA2-Secure Encryption.
Ronald Cramer
Goichiro Hanaoka
Dennis Hofheinz
Hideki Imai
Eike Kiltz
Rafael Pass
Abhi Shelat
Vinod Vaikuntanathan
2007
conf/cans
Generic Combination of Public Key Encryption with Keyword Search and Public Key Encryption.
Rui Zhang
Hideki Imai
2006
conf/ccs
Digitally signed document sanitizing scheme based on bilinear maps.
Kunihiko Miyazaki
Goichiro Hanaoka
Hideki Imai
2006
conf/acisp
Tag-KEM from Set Partial Domain One-Way Permutations.
Masayuki Abe
Yang Cui
Hideki Imai
Kaoru Kurosawa
2006
conf/acisp
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.
Kazuto Ogawa
Goichiro Hanaoka
Hideki Imai
2006
conf/acisp
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Takashi Kitagawa
Peng Yang
Goichiro Hanaoka
Rui Zhang
Hajime Watanabe
Kanta Matsuura
Hideki Imai
2006
conf/pkc
Parallel Key-Insulated Public Key Encryption.
Goichiro Hanaoka
Yumiko Hanaoka
Hideki Imai
2006
conf/icics
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size.
Tatsuyuki Matsushita
Hideki Imai
2006
conf/asiacrypt
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.
Nuttapong Attrapadung
Jun Furukawa
Hideki Imai
2006
conf/cans
Efficient Identity-Based Encryption with Tight Security Reduction.
Nuttapong Attrapadung
Jun Furukawa
Takeshi Gomi
Goichiro Hanaoka
Hideki Imai
Rui Zhang
2005
conf/acisp
An Efficient Group Signature Scheme from Bilinear Maps.
Jun Furukawa
Hideki Imai
2005
conf/acns
Short Signature and Universal Designated Verifier Signature Without Random Oracles.
Rui Zhang
Jun Furukawa
Hideki Imai
2005
conf/acns
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA.
SeongHan Shin
Kazukuni Kobara
Hideki Imai
2005
conf/acns
IDS False Alarm Reduction Using Continuous and Discontinuous Patterns.
Abdulrahman Alharby
Hideki Imai
2005
conf/iciss
Key Management for Multicast Fingerprinting.
Jian Wang
Lein Harn
Hideki Imai
2005
conf/ctrsa
A Generic Conversion with Optimal Redundancy.
Yang Cui
Kazukuni Kobara
Hideki Imai
2005
conf/asiacrypt
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
Yumiko Hanaoka
Goichiro Hanaoka
Junji Shikata
Hideki Imai
2005
conf/asiacrypt
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations.
Nuttapong Attrapadung
Hideki Imai
2004
conf/acisp
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Goichiro Hanaoka
Hideki Imai
Jörn Müller-Quade
Anderson C. A. Nascimento
Akira Otsuka
Andreas J. Winter
2004
conf/acns
On the Security of Cryptosystems with All-or-Nothing Transform.
Rui Zhang
Goichiro Hanaoka
Hideki Imai
2004
conf/acns
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Anderson C. A. Nascimento
Jörn Müller-Quade
Akira Otsuka
Goichiro Hanaoka
Hideki Imai
2004
conf/wisa
Dynamic Fingerprinting over Broadcast Using Revocation Scheme.
Mira Kim
Kazukuni Kobara
Hideki Imai
2004
conf/pkc
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Rui Zhang
Goichiro Hanaoka
Junji Shikata
Hideki Imai
2004
conf/icics
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management.
Miodrag J. Mihaljevic
Marc P. C. Fossorier
Hideki Imai
2004
conf/ctrsa
Bit String Commitment Reductions with a Non-zero Rate.
Anderson C. A. Nascimento
Jörn Müller-Quade
Hideki Imai
2004
conf/asiacrypt
Comparison Between XL and Gröbner Basis Algorithms.
Gwénolé Ars
Jean-Charles Faugère
Hideki Imai
Mitsuru Kawazoe
Makoto Sugita
2004
conf/asiacrypt
A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.
Tatsuyuki Matsushita
Hideki Imai
2003
conf/acisp
Flaws in Some Robust Optimistic Mix-Nets.
Masayuki Abe
Hideki Imai
2003
conf/acisp
Separating Encryption and Key Issuance in Digital Rights Management Systems.
Goichiro Hanaoka
Kazuto Ogawa
Itsuro Murota
Go Ohtake
Keigo Majima
Kimiyuki Oyamada
Seiichi Gohshi
Seiichi Namba
Hideki Imai
2003
conf/acns
Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem.
Rui Zhang
Hideki Imai
2003
conf/pkc
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks.
Yodai Watanabe
Junji Shikata
Hideki Imai
2003
conf/icics
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.
Yang Cui
Kazukuni Kobara
Hideki Imai
2003
conf/asiacrypt
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
Nuttapong Attrapadung
Kazukuni Kobara
Hideki Imai
2003
conf/asiacrypt
Leakage-Resilient Authenticated Key Establishment Protocols.
SeongHan Shin
Kazukuni Kobara
Hideki Imai
2002
conf/pkc
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Goichiro Hanaoka
Junji Shikata
Yuliang Zheng
Hideki Imai
2002
conf/pkc
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000.
Kazukuni Kobara
Hideki Imai
2002
conf/icics
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Yumiko Hanaoka
Goichiro Hanaoka
Junji Shikata
Hideki Imai
2002
conf/eurocrypt
Security Notions for Unconditionally Secure Signature Schemes.
Junji Shikata
Goichiro Hanaoka
Yuliang Zheng
Hideki Imai
2002
conf/asiacrypt
Unconditionally Secure Anonymous Encryption and Group Authentication.
Goichiro Hanaoka
Junji Shikata
Yumiko Hanaoka
Hideki Imai
2002
conf/sacrypt
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).
Paul Camion
Miodrag J. Mihaljevic
Hideki Imai
2001
conf/fse
Fast Correlation Attack Algorithm with List Decoding and an Application.
Miodrag J. Mihaljevic
Marc P. C. Fossorier
Hideki Imai
2001
conf/pkc
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC.
Kazukuni Kobara
Hideki Imai
2001
conf/pkc
Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.
Hirotaka Komaki
Yuji Watanabe
Goichiro Hanaoka
Hideki Imai
2001
conf/ctrsa
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents.
Yuji Watanabe
Goichiro Hanaoka
Hideki Imai
2001
conf/asiacrypt
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.
Makoto Sugita
Kazukuni Kobara
Hideki Imai
2000
conf/fse
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack.
Miodrag J. Mihaljevic
Marc P. C. Fossorier
Hideki Imai
2000
conf/ccs
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP.
Yuji Watanabe
Hideki Imai
2000
conf/asiacrypt
Unconditionally Secure Digital Signature Schemes Admitting Transferability.
Goichiro Hanaoka
Junji Shikata
Yuliang Zheng
Hideki Imai
2000
conf/asiacrypt
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government.
Hideki Imai
Atsuhiro Yamagishi
1999
conf/fc
On Channel Capacity and Modulation of Watermarks in Digital Still Images.
Markus Breitbach
Hideki Imai
1999
conf/pkc
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret.
Yuji Watanabe
Hideki Imai
1999
conf/icics
Optimal Construction of Unconditionally Secure ID-Based Key Sharing Scheme for Large-Scale Networks.
Goichiro Hanaoka
Tsuyoshi Nishioka
Yuliang Zheng
Hideki Imai
1999
conf/icics
On the Channel Capacity of Narrow-Band Subliminal Channels.
Kazukuni Kobara
Hideki Imai
1999
conf/eurocrypt
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography.
Ryuichi Harasawa
Junji Shikata
Joe Suzuki
Hideki Imai
1999
conf/asiacrypt
An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks.
Goichiro Hanaoka
Tsuyoshi Nishioka
Yuliang Zheng
Hideki Imai
1999
conf/asiacrypt
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
Junji Shikata
Yuliang Zheng
Joe Suzuki
Hideki Imai
1998
conf/acisp
LITESET: A Light-Weight Secure Electronic Transaction Protocol.
Goichiro Hanaoka
Yuliang Zheng
Hideki Imai
1998
conf/icisc
A successive carrier-transmission model for narrow-band subliminal channels.
Kazukuni Kobara
Hideki Imai
1998
conf/pkc
A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation.
Miodrag J. Mihaljevic
Yuliang Zheng
Hideki Imai
1997
conf/icics
Self-synchronized message randomization methods for subliminal channels.
Kazukuni Kobara
Hideki Imai
1997
conf/icics
Duality of Boolean functions and its cryptographic significance.
Xian-Mo Zhang
Yuliang Zheng
Hideki Imai
1996
conf/asiacrypt
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification.
Kazukuni Kobara
Hideki Imai
1994
conf/asiacrypt
Information Security Aspects of Spread Spectrum Systems.
Hideki Imai
1992
conf/eurocrypt
High-Speed Implementation Methods for RSA Scheme.
Keiichi Iwamura
Tsutomu Matsumoto
Hideki Imai
1992
conf/eurocrypt
Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract).
Keiichi Iwamura
Tsutomu Matsumoto
Hideki Imai
1992
conf/asiacrypt
Non-Interactive Generation of Shared Pseudorandom Sequences.
Manuel Cerecedo
Tsutomu Matsumoto
Hideki Imai
1992
conf/asiacrypt
On Verifiable Implicit Asking Protocols for RSA Computation.
Tsutomu Matsumoto
Hideki Imai
Chi-Sung Laih
Sung-Ming Yen
1991
conf/eurocrypt
Human Identification Through Insecure Channel.
Tsutomu Matsumoto
Hideki Imai
1991
conf/asiacrypt
A Multi-Purpose Proof System - for Identity and Membership Proofs.
Chaosheng Shu
Tsutomu Matsumoto
Hideki Imai
1990
conf/crypto
Structural Properties of One-way Hash Functions.
Yuliang Zheng
Tsutomu Matsumoto
Hideki Imai
1990
conf/crypto
A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion.
Kwangjo Kim
Tsutomu Matsumoto
Hideki Imai
1989
conf/crypto
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.
Yuliang Zheng
Tsutomu Matsumoto
Hideki Imai
1989
conf/eurocrypt
Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract).
Yuliang Zheng
Tsutomu Matsumoto
Hideki Imai
1988
conf/crypto
Speeding Up Secret Computations with Insecure Auxiliary Devices.
Tsutomu Matsumoto
Koki Kato
Hideki Imai
1988
conf/eurocrypt
Public Quadratic Polynominal-Tuples for Efficient Signature-Verification and Message-Encryption.
Tsutomu Matsumoto
Hideki Imai
1987
conf/crypto
On the Key Predistribution System: A Practical Solution to the Key Distribution Problem.
Tsutomu Matsumoto
Hideki Imai
Coauthors
Abdulrahman Alharby
(1)
Abhi Shelat
(1)
Akira Otsuka
(2)
Anderson C. A. Nascimento
(4)
Andreas J. Winter
(1)
Atsuhiro Yamagishi
(1)
Chaosheng Shu
(1)
Chi-Sung Laih
(1)
Dennis Hofheinz
(1)
Eiichiro Fujisaki
(1)
Eike Kiltz
(1)
Go Ohtake
(1)
Goichiro Hanaoka
(30)
Gwénolé Ars
(1)
Hajime Watanabe
(3)
Hanane Fathi
(1)
Hideichi Sasaoka
(1)
Hideki Imai
(92)
Hirotaka Komaki
(1)
Hisato Iwai
(1)
Itsuro Murota
(1)
Jean-Charles Faugère
(1)
Jian Wang
(1)
Jin Tamura
(1)
Joe Suzuki
(2)
Jörn Müller-Quade
(3)
Jun Furukawa
(5)
Junji Shikata
(10)
Kanta Matsuura
(4)
Kaoru Kurosawa
(1)
Kazukuni Kobara
(16)
Kazuto Ogawa
(3)
Keigo Majima
(1)
Keiichi Iwamura
(2)
Kimiyuki Oyamada
(1)
Kohei Kasamatsu
(1)
Koji Nuida
(1)
Koki Kato
(1)
Kunihiko Miyazaki
(1)
Kwangjo Kim
(1)
Lein Harn
(1)
Ludovic Perret
(1)
Makoto Sugita
(3)
Manabu Hagiwara
(1)
Manabu Inuma
(1)
Manuel Cerecedo
(1)
Marc P. C. Fossorier
(3)
Markus Breitbach
(1)
Masatoshi Noguchi
(1)
Masayuki Abe
(2)
Masazumi Ueba
(1)
Miodrag J. Mihaljevic
(5)
Mira Kim
(1)
Mitsuru Kawazoe
(2)
Nuttapong Attrapadung
(6)
Paul Camion
(1)
Peng Yang
(1)
Rafael Dowsley
(1)
Rafael Pass
(1)
Rie Shigetomi
(1)
Ronald Cramer
(1)
Rui Zhang
(9)
Ryuichi Harasawa
(1)
Seiichi Gohshi
(1)
Seiichi Namba
(1)
SeongHan Shin
(3)
Sung-Ming Yen
(1)
Takahiro Matsuda
(4)
Takashi Itoh
(1)
Takashi Kitagawa
(1)
Takeshi Gomi
(1)
Tatsuyuki Matsushita
(2)
Toru Hashimoto
(1)
Tsutomu Matsumoto
(13)
Tsuyoshi Nishioka
(2)
Vinod Vaikuntanathan
(1)
Xian-Mo Zhang
(1)
Yang Cui
(4)
Yodai Watanabe
(1)
Yuji Watanabe
(4)
Yuliang Zheng
(12)
Yumiko Hanaoka
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to