Yuichi Komano
Yuichi Komano
Toshiba corporation
Verified email at ruri.waseda.jp - Homepage
Title
Cited by
Cited by
Year
Toward the fair anonymous signatures: Deniable ring signatures
Y Komano, K Ohta, A Shimbo, S Kawamura
Cryptographers’ Track at the RSA Conference, 174-191, 2006
612006
Secure authenticated key exchange with revocation for smart grid
F Zhao, Y Hanatani, Y Komano, B Smyth, S Ito, T Kambayashi
2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 1-8, 2012
382012
Multisignature method, apparatus, program, and system
Y Komano, K Ohta, S Kawamura, A Shimbo
US Patent 7,496,759, 2009
352009
Efficient universal padding techniques for multiplicative trapdoor one-way permutation
Y Komano, K Ohta
Annual International Cryptology Conference, 366-382, 2003
342003
BS-CPA: Built-in determined sub-key correlation power analysis
Y Komano, H Shimizu, S Kawamura
IEICE transactions on fundamentals of electronics, communications and …, 2010
312010
Provably secure electronic cash based on blind multisignature schemes
Y Hanatani, Y Komano, K Ohta, N Kunihiro
International Conference on Financial Cryptography and Data Security, 236-250, 2006
252006
Formal security model of multisignatures
Y Komano, K Ohta, A Shimbo, S Kawamura
International Conference on Information Security, 146-160, 2006
242006
Encryption apparatus and encryption method
Y Komano, H Shimizu, A Shimbo
US Patent App. 11/523,609, 2007
212007
The security problems of Rivest and Shamir's PayWord scheme
N Adachi, S Aoki, Y Komano, K Ohta
IEEE International Conference on E-Commerce, 2003. CEC 2003., 20-23, 2003
212003
RNS Montgomery reduction algorithms using quadratic residuosity
S Kawamura, Y Komano, H Shimizu, T Yonemura
Journal of Cryptographic Engineering 9 (4), 313-331, 2019
172019
Encryption/signature method, apparatus, and program
Y Komano, S Kawamura, A Shimbo
US Patent App. 10/902,815, 2005
172005
Encryption key generating apparatus and computer program product
Y Komano, K Ohta, K Sakiyama
US Patent 9,537,653, 2017
132017
Information processing device, power consumption calculating system and program product
S Yamanaka, Y Komano, T Takahashi, S Ito
US Patent App. 13/356,774, 2012
122012
Analysis of information leakage due to operative errors in card-based protocols
T Mizuki, Y Komano
International Workshop on Combinatorial Algorithms, 250-262, 2018
112018
Symmetric encryption apparatus and storage medium, and symmetric decryption apparatus and storage medium
Y Komano, K Akiyama, Y Goto
US Patent 9,413,729, 2016
112016
On the security of probabilistic multisignature schemes and their optimality
Y Komano, K Ohta, A Shimbo, S Kawamura
International Conference on Cryptology in Malaysia, 132-150, 2005
102005
Encryption device
E Tsukasa, Y Komano, K Fujisaki, H Shimizu, H Ikeda, A Shimbo
US Patent 9,288,040, 2016
92016
Server, charging server, power consumption calculating system, and computer program product
K Umesawa, Y Komano, S Yamanaka, T Takahashi
US Patent App. 13/164,857, 2012
92012
Provably secure multisignatures in formal security model and their optimality
Y Komano, K Ohta, A Shimbo, S Kawamura
IEICE transactions on fundamentals of electronics, communications and …, 2008
92008
Solutions to security problems of Rivest and Shamir's PayWord scheme
N Adachi, S Aoki, Y Komano, K Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2005
92005
The system can't perform the operation now. Try again later.
Articles 1–20