Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ohta, Kazuo
add a person with the name Ohta, Kazuo
 

Other publications of authors with the same name

Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL., , , , , , and . SECRYPT, page 111-122. SciTePress, (2013)Proxiable Designated Verifier Signature., , , and . SECRYPT, page 344-353. SciTePress, (2010)Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest., , , , , , , , , and 9 other author(s). J. Cryptographic Engineering, 4 (4): 259-274 (2014)An Evaluation of the Sieving Device YASD for 1024-Bit Integers., , , and . NBiS, page 546-551. IEEE Computer Society, (2010)An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks., , , , , and . FDTC, page 95-102. IEEE Computer Society, (2012)Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication., , , and . IEICE Transactions, 92-A (1): 96-104 (2009)Taxonomical Security Consideration of OAEP Variants., and . IEICE Transactions, 89-A (5): 1233-1245 (2006)Forest Structure Dependency of the Relation Between L-Band Sigma 0 and Biophysical Parameters., , , , , , , , , and . IEEE Trans. Geoscience and Remote Sensing, 44 (11-1): 3154-3165 (2006)Security Notions for Information Theoretically Secure Encryptions, and . CoRR, (2011)Single-Round Pattern Matching Key Generation Using Physically Unclonable Function., , , , and . Security and Communication Networks, (2019)