Author of the publication

Cryptographic Approch for Workflow Systems.

, , and . II3E, volume 286 of IFIP Advances in Information and Communication Technology, page 75-86. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptographic Approch for Workflow Systems., , and . II3E, volume 286 of IFIP Advances in Information and Communication Technology, page 75-86. Springer, (2008)An Optimized Algebraic Method for Higher Order Differential Attack., , and . AAECC, volume 2643 of Lecture Notes in Computer Science, page 61-70. Springer, (2003)A Study on Multi-Resipient Encryptions for Selective Disclosure., , and . Security and Management, page 570-575. CSREA Press, (2009)Higher Order Differential Attack on Step-Reduced Variants of Luffa v1., , , and . FSE, volume 6147 of Lecture Notes in Computer Science, page 270-285. Springer, (2010)A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 88-A (1): 16-24 (2005)Efficient signature schemes supporting redaction, pseudonymization, and data deidentification., , , , , , , and . AsiaCCS, page 353-362. ACM, (2008)Higher Order Differential Attack of Camellia (II)., , and . Selected Areas in Cryptography, volume 2595 of Lecture Notes in Computer Science, page 129-146. Springer, (2002)Security Analysis of MISTY1., , , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 215-226. Springer, (2007)A Study on Read-Write Protection of a Digital Document by Cryptographic Techniques., , and . MASS, page 714-721. IEEE Computer Society, (2009)