Cryptographers' World
 

Hideki Imai


Author's Web Page Link

63 papers in database with 1492 citations StarStar

Editor of 4 conference proceedings books

H-number: 21

Conference Proceedings

 
1. Hideki ImaiYuliang Zheng, editors, Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings. Springer, 2000. ISBN 3-540-66967-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. Hideki ImaiYuliang Zheng, editors, Public Key Cryptography, Second International Workshop on Practice and Theory in Public Key Cryptography, PKC '99, Kamakura, Japan, March 1-3, 1999, Proceedings. Springer, 1999. ISBN 3-540-65644-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. Hideki ImaiYuliang Zheng, editors, Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings. Springer, 1998. ISBN 3-540-64693-0.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

4. Hideki ImaiRonald L. RivestTsutomu Matsumoto, editors, Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings. Springer, 1993. ISBN 3-540-57332-1.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Ryo Nojima,  Hideki Imai,  Kazukuni Kobara,  Kirill Morozov,  Semantic security for the McEliece cryptosystem without random oracles, Designs, Codes and Cryptography, Volume 49(1), pp. 289 - 305, Springer, 2008.

[Electronic Edition][Cited 5 times ]

2. Xian-Mo Zhang,  Yuliang Zheng,  Hideki Imai,  Relating Differential Distribution Tables to Other Properties of of Substitution Boxes, Designs, Codes and Cryptography, Volume 19(1), pp. 45 - 63, Springer, 2000.

[Electronic Edition][Cited 11 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Nuttapong Attrapadung,  Hideki Imai,  Dual-Policy Attribute Based Encryption, pp. 168 - 185, ACNS 2009.

[Electronic Edition][Cited 3 times ]

2. Kazuto Ogawa,  Go Ohtake,  Goichiro Hanaoka,  Hideki Imai,  Trade-Off Traitor Tracing, pp. 331 - 340, INDOCRYPT 2007.

[Electronic Edition][Cited 1 times ]

3. Makoto Sugita,  Mitsuru Kawazoe,  Ludovic Perret,  Hideki Imai,  Algebraic Cryptanalysis of 58-Round SHA-1, pp. 349 - 365, FSE 2007.

[Electronic Edition][Cited 14 times ]

4. Jun Furukawa,  Hideki Imai,  An Efficient Aggregate Shuffle Argument Scheme, pp. 260 - 274, FC 2007.

[Electronic Edition][Cited 1 times ]

5. Ronald Cramer,  Goichiro Hanaoka,  Dennis Hofheinz,  Hideki Imai,  Eike Kiltz,  Rafael Pass,  Abhi Shelat,  Vinod Vaikuntanathan,  Bounded CCA2-Secure Encryption, pp. 502 - 518, ASIACRYPT 2007.

[Electronic Edition][Cited 16 times ]

6. Marc P. C. Fossorier,  Miodrag J. Mihaljevic,  Hideki Imai,  Yang Cui,  Kanta Matsuura,  An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication, pp. 48 - 62, INDOCRYPT 2006.

[Electronic Edition][Cited 37 times ]

7. Ryo Nojima,  Kazukuni Kobara,  Hideki Imai,  Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function, pp. 303 - 316, INDOCRYPT 2006.

[Electronic Edition][No citation]

8. Thi Lan Anh Phan,  Yumiko Hanaoka,  Goichiro Hanaoka,  Kanta Matsuura,  Hideki Imai,  Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption, pp. 366 - 384, VIETCRYPT 2006.

[Electronic Edition][Cited 5 times ]

9. Goichiro Hanaoka,  Yumiko Hanaoka,  Hideki Imai,  Parallel Key-Insulated Public Key Encryption, pp. 105 - 122, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 24 times ]

10. Nuttapong Attrapadung,  Jun Furukawa,  Hideki Imai,  Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys, pp. 161 - 177, ASIACRYPT 2006.

[Electronic Edition][Cited 7 times ]

11. Yumiko Hanaoka,  Goichiro Hanaoka,  Junji Shikata,  Hideki Imai,  Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application, pp. 495 - 514, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 25 times ]

12. Nuttapong Attrapadung,  Hideki Imai,  Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations, pp. 100 - 120, ASIACRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 13 times ]

13. Miodrag J. Mihaljevic,  Marc P. C. Fossorier,  Hideki Imai,  Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks, pp. 155 - 168, INDOCRYPT 2005.

[Electronic Edition][Cited 7 times ]

14. Hideki Imai,  Trends and Challenges for Securer Cryptography in Practice, pp. 1 - 1, MYCRYPT 2005.

[Electronic Edition][No citation]

15. Abdulrahman Alharby,  Hideki Imai,  IDS False Alarm Reduction Using Continuous and Discontinuous Patterns, pp. 192 - 205, ACNS 2005.

[Electronic Edition][Cited 14 times ]

16. SeongHan Shin,  Kazukuni Kobara,  Hideki Imai,  Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA, pp. 269 - 284, ACNS 2005.

[Electronic Edition][Cited 16 times ]

17. Rui Zhang,  Jun Furukawa,  Hideki Imai,  Short Signature and Universal Designated Verifier Signature Without Random Oracles, pp. 483 - 498, ACNS 2005.

[Electronic Edition][Cited 42 times ]

18. Yang Cui,  Kazukuni Kobara,  Hideki Imai,  A Generic Conversion with Optimal Redundancy, pp. 104 - 117, CT-RSA 2005.

[Electronic Edition][Cited 6 times ]

19. Gwénolé Ars,  Jean-Charles Faugère,  Hideki Imai,  Mitsuru Kawazoe,  Makoto Sugita,  Comparison Between XL and Gröbner Basis Algorithms, pp. 338 - 353, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 73 times Red Star]

20. Tatsuyuki Matsushita,  Hideki Imai,  A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates, pp. 260 - 275, ASIACRYPT 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 13 times ]

21. Anderson C. A. Nascimento,  Jörn Müller-Quade,  Akira Otsuka,  Goichiro Hanaoka,  Hideki Imai,  Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model, pp. 355 - 368, ACNS 2004.

[Electronic Edition][Cited 3 times ]

22. Rui Zhang,  Goichiro Hanaoka,  Hideki Imai,  On the Security of Cryptosystems with All-or-Nothing Transform, pp. 76 - 90, ACNS 2004.

[Electronic Edition][Cited 5 times ]

23. Rui Zhang,  Goichiro Hanaoka,  Junji Shikata,  Hideki Imai,  On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?, pp. 360 - 374, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 18 times ]

24. Anderson C. A. Nascimento,  Jörn Müller-Quade,  Hideki Imai,  Bit String Commitment Reductions with a Non-zero Rate, pp. 179 - 193, CT-RSA 2004.

[Electronic Edition][Cited 1 times ]

25. SeongHan Shin,  Kazukuni Kobara,  Hideki Imai,  Leakage-Resilient Authenticated Key Establishment Protocols, pp. 155 - 172, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 22 times ]

26. Nuttapong Attrapadung,  Kazukuni Kobara,  Hideki Imai,  Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes, pp. 374 - 391, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 26 times ]

27. Rui Zhang,  Hideki Imai,  Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem, pp. 96 - 110, ACNS 2003.

[Electronic Edition][Cited 8 times ]

28. Yodai Watanabe,  Junji Shikata,  Hideki Imai,  Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks, pp. 71 - 84, PKC 2003.

[Electronic Edition][Cited 29 times ]

29. Goichiro Hanaoka,  Junji Shikata,  Yumiko Hanaoka,  Hideki Imai,  Unconditionally Secure Anonymous Encryption and Group Authentication, pp. 81 - 99, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

30. Paul Camion,  Miodrag J. Mihaljevic,  Hideki Imai,  Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q), pp. 196 - 213, SAC 2002.

[Electronic Edition][Cited 9 times ]

31. Junji Shikata,  Goichiro Hanaoka,  Yuliang Zheng,  Hideki Imai,  Security Notions for Unconditionally Secure Signature Schemes, pp. 434 - 449, EUROCRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 21 times ]

32. Goichiro Hanaoka,  Junji Shikata,  Yuliang Zheng,  Hideki Imai,  Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code, pp. 64 - 79, PKC 2002.

[Electronic Edition][Cited 6 times ]

33. Kazukuni Kobara,  Hideki Imai,  New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000, pp. 237 - 251, PKC 2002.

[Electronic Edition][Cited 1 times ]

34. Makoto Sugita,  Kazukuni Kobara,  Hideki Imai,  Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis, pp. 193 - 207, ASIACRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 31 times ]

35. Miodrag J. Mihaljevic,  Marc P. C. Fossorier,  Hideki Imai,  Fast Correlation Attack Algorithm with List Decoding and an Application, pp. 196 - 210, FSE 2001.

[Electronic Edition][Cited 54 times Red Star]

36. Yuji Watanabe,  Goichiro Hanaoka,  Hideki Imai,  Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents, pp. 392 - 407, CT-RSA 2001.

[Electronic Edition][Cited 34 times ]

37. Kazukuni Kobara,  Hideki Imai,  Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC, pp. 19 - 35, PKC 2001.

[Electronic Edition][Cited 48 times ]

38. Hirotaka Komaki,  Yuji Watanabe,  Goichiro Hanaoka,  Hideki Imai,  Efficient Asymmetric Self-Enforcement Scheme with Public Traceability, pp. 225 - 239, PKC 2001.

[Electronic Edition][Cited 18 times ]

39. Goichiro Hanaoka,  Junji Shikata,  Yuliang Zheng,  Hideki Imai,  Unconditionally Secure Digital Signature Schemes Admitting Transferability, pp. 130 - 142, ASIACRYPT 2000.

[Electronic Edition][Cited 25 times ]

40. Hideki Imai,  Atsuhiro Yamagishi,  CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government, pp. 399 - 400, ASIACRYPT 2000.

[Electronic Edition][Cited 5 times ]

41. Miodrag J. Mihaljevic,  Marc P. C. Fossorier,  Hideki Imai,  A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack, pp. 196 - 212, FSE 2000.

[Electronic Edition][Cited 60 times Red Star]

42. Goichiro Hanaoka,  Tsuyoshi Nishioka,  Yuliang Zheng,  Hideki Imai,  An Efficient Hierarchical Identity-Based Key-Sharing Method Resistant against Collusion-Attacks, pp. 348 - 362, ASIACRYPT 1999.

[Electronic Edition][Cited 25 times ]

43. Junji Shikata,  Yuliang Zheng,  Joe Suzuki,  Hideki Imai,  Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves, pp. 86 - 102, ASIACRYPT 1999.

[Electronic Edition][Cited 5 times ]

44. Ryuichi Harasawa,  Junji Shikata,  Joe Suzuki,  Hideki Imai,  Comparing the MOV and FR Reductions in Elliptic Curve Cryptography, pp. 190 - 205, EUROCRYPT 1999.

[Electronic Edition][Cited 19 times ]

45. Yuji Watanabe,  Hideki Imai,  Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret, pp. 290 - 305, PKC 1999.

[Electronic Edition][No citation]

46. Markus Breitbach,  Hideki Imai,  On Channel Capacity and Modulation of Watermarks in Digital Still Images, pp. 125 - 139, FC 1999.

[Electronic Edition][No citation]

47. Miodrag J. Mihaljevic,  Yuliang Zheng,  Hideki Imai,  A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation, pp. 217 - 233, PKC 1998.

[Electronic Edition][Cited 15 times ]

48. Kazukuni Kobara,  Hideki Imai,  Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification, pp. 185 - 195, ASIACRYPT 1996.

[Electronic Edition][Cited 19 times ]

49. Hideki Imai,  Information Security Aspects of Spread Spectrum Systems, pp. 193 - 208, ASIACRYPT 1994.

[Electronic Edition][Cited 6 times ]

50. Tsutomu Matsumoto,  Hideki Imai,  Chi-Sung Laih,  Sung-Ming Yen,  On Verifiable Implicit Asking Protocols for RSA Computation, pp. 296 - 307, ASIACRYPT 1992.

[Electronic Edition][Cited 28 times ]

51. Manuel Cerecedo,  Tsutomu Matsumoto,  Hideki Imai,  Non-Interactive Generation of Shared Pseudorandom Sequences, pp. 385 - 396, ASIACRYPT 1992.

[Electronic Edition][Cited 1 times ]

52. Keiichi Iwamura,  Tsutomu Matsumoto,  Hideki Imai,  High-Speed Implementation Methods for RSA Scheme, pp. 221 - 238, EUROCRYPT 1992.

[Electronic Edition][Cited 12 times ]

53. Keiichi Iwamura,  Tsutomu Matsumoto,  Hideki Imai,  Systolic-Arrays for Modular Exponentiation Using Montgomery Method (Extended Abstract), pp. 477 - 481, EUROCRYPT 1992.

[Electronic Edition][Cited 17 times ]

54. Chaosheng Shu,  Tsutomu Matsumoto,  Hideki Imai,  A Multi-Purpose Proof System - for Identity and Membership Proofs, pp. 397 - 411, ASIACRYPT 1991.

[Electronic Edition][No citation]

55. Kwangjo Kim,  Tsutomu Matsumoto,  Hideki Imai,  A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion, pp. 564 - 574, CRYPTO 1990.

[Electronic Edition][Cited 10 times ]

56. Yuliang Zheng,  Tsutomu Matsumoto,  Hideki Imai,  Structural Properties of One-way Hash Functions, pp. 285 - 302, CRYPTO 1990.

[Electronic Edition][Cited 30 times ]

57. Yuliang Zheng,  Tsutomu Matsumoto,  Hideki Imai,  On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses, pp. 461 - 480, CRYPTO 1989.

[Electronic Edition][Cited 57 times Red Star]

58. Yuliang Zheng,  Tsutomu Matsumoto,  Hideki Imai,  Impossibility and Optimality Results on Constructing Pseudorandom Permutations (Extended Abstract), pp. 412 - 422, EUROCRYPT 1989.

[Electronic Edition][Cited 1 times ]

59. Tsutomu Matsumoto,  Koki Kato,  Hideki Imai,  Speeding Up Secret Computations with Insecure Auxiliary Devices, pp. 497 - 506, CRYPTO 1988.

[Electronic Edition][Cited 110 times Red StarRed Star]

60. Tsutomu Matsumoto,  Hideki Imai,  Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, pp. 419 - 453, EUROCRYPT 1988.

[Electronic Edition][Cited 231 times Red StarRed Star]

61. Tsutomu Matsumoto,  Hideki Imai,  On the Key Predistribution System: A Practical Solution to the Key Distribution Problem, pp. 185 - 193, CRYPTO 1987.

[Electronic Edition][Cited 138 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...