ติดตาม
Yuichi Komano
Yuichi Komano
Chiba Institute of Technology
ยืนยันอีเมลแล้วที่ ruri.waseda.jp - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Toward the fair anonymous signatures: Deniable ring signatures
Y Komano, K Ohta, A Shimbo, S Kawamura
Cryptographers’ Track at the RSA Conference, 174-191, 2006
78*2006
Multisignature method, apparatus, program, and system
Y Komano, K Ohta, S Kawamura, A Shimbo
US Patent 7,496,759, 2009
412009
Secure authenticated key exchange with revocation for smart grid
F Zhao, Y Hanatani, Y Komano, B Smyth, S Ito, T Kambayashi
2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 1-8, 2012
362012
BS-CPA: Built-in determined sub-key correlation power analysis
Y Komano, H Shimizu, S Kawamura
IEICE transactions on fundamentals of electronics, communications and …, 2010
342010
Efficient universal padding techniques for multiplicative trapdoor one-way permutation
Y Komano, K Ohta
Annual International Cryptology Conference, 366-382, 2003
342003
Provably secure electronic cash based on blind multisignature schemes
Y Hanatani, Y Komano, K Ohta, N Kunihiro
Financial Cryptography and Data Security: 10th International Conference, FC …, 2006
322006
Encryption apparatus and encryption method
Y Komano, H Shimizu, A Shimbo
US Patent App. 11/523,609, 2007
292007
RNS montgomery reduction algorithms using quadratic residuosity
S Kawamura, Y Komano, H Shimizu, T Yonemura
Journal of Cryptographic Engineering 9, 313-331, 2019
272019
Encryption key generating apparatus and computer program product
Y Komano, K Ohta, K Sakiyama
US Patent 9,537,653, 2017
252017
Update control device, terminal, and method of controlling
XIA Zhengfan, Y Komano, T Kawabata
US Patent App. 15/894,161, 2019
242019
Encryption/signature method, apparatus, and program
Y Komano, S Kawamura, A Shimbo
US Patent App. 10/902,815, 2005
212005
Analysis of information leakage due to operative errors in card-based protocols
T Mizuki, Y Komano
Combinatorial Algorithms: 29th International Workshop, IWOCA 2018, Singapore …, 2018
202018
The security problems of Rivest and Shamir's PayWord scheme
N Adachi, S Aoki, Y Komano, K Ohta
IEEE International Conference on E-Commerce, 2003. CEC 2003., 20-23, 2003
202003
Molecular Devices: An Introduction to Technomimetics and Its Biological Applications
AA Gakh
John Wiley & Sons, 2018
182018
Apparatus and method for testing normality of shared data
Y Komano, T Kawabata
US Patent 10,255,428, 2019
172019
An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density
K Matsuda, S Tada, M Nagata, Y Komano, Y Li, T Sugawara, M Iwamoto, ...
Japanese Journal of Applied Physics 59 (SG), SGGL02, 2020
162020
Formal security model of multisignatures
Y Komano, K Ohta, A Shimbo, S Kawamura
Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006
162006
Symmetric encryption apparatus and storage medium, and symmetric decryption apparatus and storage medium
Y Komano, K Akiyama, Y Goto
US Patent 9,413,729, 2016
152016
Non-linear data converter, encoder and decoder
Y Komano, H Shimizu, K Fujisaki, H Miyake, A Shimbo
US Patent 8,401,180, 2013
152013
Update control apparatus, software update system, and update control method
Y Komano, XIA Zhengfan, T Kawabata
US Patent 10,360,018, 2019
142019
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20