Citation: H. Sakazaki et al., CONSTRUCTING IDENTITY-BASED KEY DISTRIBUTION-SYSTEMS OVER ELLIPTIC-CURVES, IEICE transactions on fundamentals of electronics, communications and computer science, E81A(10), 1998, pp. 2138-2143
Citation: K. Oishi et al., ANONYMOUS PUBLIC-KEY CERTIFICATES AND THEIR APPLICATIONS, IEICE transactions on fundamentals of electronics, communications and computer science, E81A(1), 1998, pp. 56-64
Citation: R. Peralta et al., FACTORING HARD INTEGERS ON A PARALLEL MACHINE, IEICE transactions on fundamentals of electronics, communications and computer science, E80A(4), 1997, pp. 658-662
Citation: M. Mambo et E. Okamoto, PROXY CRYPTOSYSTEMS - DELEGATION OF THE POWER TO DECRYPT CIPHERTEXTS, IEICE transactions on fundamentals of electronics, communications and computer science, E80A(1), 1997, pp. 54-63
Authors:
OKADA T
MAMBO M
FUKAMI T
NAGANO I
OKUMURA K
Citation: T. Okada et al., MULTIPLE THIN LAYERS OF ENHANCED IONIZATION IN THE IONOSPHERIC E-REGION DERIVED FROM VLF WAVE MEASUREMENTS, Journal of Geomagnetism and Geoelectricity, 49(1), 1997, pp. 69-76
Citation: M. Mambo et al., PROXY SIGNATURES - DELEGATION OF THE POWER TO SIGN MESSAGES, IEICE transactions on fundamentals of electronics, communications and computer science, E79A(9), 1996, pp. 1338-1354
Citation: K. Usuda et al., PROPOSAL OF AN AUTOMATIC SIGNATURE SCHEME USING A COMPILER, IEICE transactions on fundamentals of electronics, communications and computer science, E79A(1), 1996, pp. 94-101
Citation: E. Okamoto et al., PERMUTATION CIPHER SCHEME USING POLYNOMIALS OVER A FIELD, IEICE transactions on information and systems, E78D(2), 1995, pp. 138-142
Citation: M. Mambo et al., A SECURE BROADCAST COMMUNICATION METHOD WITH SHORT MESSAGES, IEICE transactions on fundamentals of electronics, communications and computer science, E77A(8), 1994, pp. 1319-1327