Author of the publication

Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.

, , , and . WISA, volume 3786 of Lecture Notes in Computer Science, page 232-242. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tight correlations between forest parameters and backscattering coefficient derived by the L-band airborne SAR (PiSAR)., , , , , , , and . IGARSS, page 2340-2343. IEEE, (2004)Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments., , , and . IWSEC (Short Papers), page 42-59. Information Processing Society of Japan (IPSJ), (2010)Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches., , , , , , and . CHES, volume 6917 of Lecture Notes in Computer Science, page 390-406. Springer, (2011)Efficient Private PEZ Protocols for Symmetric Functions., , and . TCC (1), volume 11891 of Lecture Notes in Computer Science, page 372-392. Springer, (2019)Privacy-preserving smart metering with verifiability for both billing and energy management., , , , and . AsiaPKC@AsiaCCS, page 23-32. ACM, (2014)Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function., , , and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 290-307. Springer, (2008)Confirmation that Some Hash Functions Are Not Collision Free., , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 326-343. Springer, (1990)On strict estimation method of provable security against differential and linear cryptanalysis., , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 258-268. Springer, (1997)How to Simultaneously Exchange Secrets by General Assumptions., and . ACM Conference on Computer and Communications Security, page 184-192. ACM, (1994)Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions., , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 235-252. Springer, (2014)