Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Atsushi
    Last name: Fujioka
    DBLP: 77/4040
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 41  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta.
    A Practical Secret Voting Scheme for Large Scale Elections.
    Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings 1993 (0) 1992
    Journal article
    Shigeo Tsujii, Toshiya Itoh, Atsushi Fujioka, Kaoru Kurosawa, Tsutomu Matsumoto.
    A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations.
    Systems and Computers in Japan 1988, Volume 19 (0) 1988
    Conference paper
    Atsushi Fujioka.
    Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators.
    Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Tatsuaki Okamoto, Atsushi Fujioka, Eiichiro Fujisaki.
    An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Z
    Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings 1993 (0) 1992
    Conference paper
    Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto.
    An Improvement on a Practical Secret Voting Scheme.
    Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings 1999 (0) 1999
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification.
    Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka.
    Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka.
    Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.
    Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki.
    Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys.
    Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu.
    Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys.
    Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings 2010 (0) 2010
    Show item 1 to 10 of 41  

    Your query returned 41 matches in the database.