Author of the publication

Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.

, , , , and . Theor. Comput. Sci., (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ohta, Kazuo
add a person with the name Ohta, Kazuo
 

Other publications of authors with the same name

An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks., , , , , and . FDTC, page 95-102. IEEE Computer Society, (2012)Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL., , , , , , and . SECRYPT, page 111-122. SciTePress, (2013)Proxiable Designated Verifier Signature., , , and . SECRYPT, page 344-353. SciTePress, (2010)Practical improvements of side-channel attacks on AES: feedback from the 2nd DPA contest., , , , , , , , , and 9 other author(s). J. Cryptographic Engineering, 4 (4): 259-274 (2014)An Evaluation of the Sieving Device YASD for 1024-Bit Integers., , , and . NBiS, page 546-551. IEEE Computer Society, (2010)Single-Round Pattern Matching Key Generation Using Physically Unclonable Function., , , , and . Security and Communication Networks, (2019)Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology., , , , , and . IACR Cryptology ePrint Archive, (2016)Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication., , , and . IEICE Transactions, 92-A (1): 96-104 (2009)Taxonomical Security Consideration of OAEP Variants., and . IEICE Transactions, 89-A (5): 1233-1245 (2006)Efficient Differential Fault Analysis for AES., , , , , , and . IACR Cryptology ePrint Archive, (2010)