Yuichi Komano
Yuichi Komano
Chiba Institute of Technology
Verified email at - Homepage
Cited by
Cited by
Toward the fair anonymous signatures: Deniable ring signatures
Y Komano, K Ohta, A Shimbo, S Kawamura
Cryptographers’ Track at the RSA Conference, 174-191, 2006
Multisignature method, apparatus, program, and system
Y Komano, K Ohta, S Kawamura, A Shimbo
US Patent 7,496,759, 2009
Secure authenticated key exchange with revocation for smart grid
F Zhao, Y Hanatani, Y Komano, B Smyth, S Ito, T Kambayashi
2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 1-8, 2012
Efficient universal padding techniques for multiplicative trapdoor one-way permutation
Y Komano, K Ohta
Annual International Cryptology Conference, 366-382, 2003
BS-CPA: Built-in determined sub-key correlation power analysis
Y Komano, H Shimizu, S Kawamura
IEICE transactions on fundamentals of electronics, communications and …, 2010
Provably secure electronic cash based on blind multisignature schemes
Y Hanatani, Y Komano, K Ohta, N Kunihiro
Financial Cryptography and Data Security: 10th International Conference, FC …, 2006
Encryption apparatus and encryption method
Y Komano, H Shimizu, A Shimbo
US Patent App. 11/523,609, 2007
RNS montgomery reduction algorithms using quadratic residuosity
S Kawamura, Y Komano, H Shimizu, T Yonemura
Journal of Cryptographic Engineering 9, 313-331, 2019
Encryption key generating apparatus and computer program product
Y Komano, K Ohta, K Sakiyama
US Patent 9,537,653, 2017
Encryption/signature method, apparatus, and program
Y Komano, S Kawamura, A Shimbo
US Patent App. 10/902,815, 2005
The security problems of Rivest and Shamir's PayWord scheme
N Adachi, S Aoki, Y Komano, K Ohta
IEEE International Conference on E-Commerce, 2003. CEC 2003., 20-23, 2003
Analysis of information leakage due to operative errors in card-based protocols
T Mizuki, Y Komano
Combinatorial Algorithms: 29th International Workshop, IWOCA 2018, Singapore …, 2018
Update control device, terminal, and method of controlling
XIA Zhengfan, Y Komano, T Kawabata
US Patent App. 15/894,161, 2019
Formal security model of multisignatures
Y Komano, K Ohta, A Shimbo, S Kawamura
Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006
Apparatus and method for testing normality of shared data
Y Komano, T Kawabata
US Patent 10,255,428, 2019
Update control apparatus, software update system, and update control method
Y Komano, XIA Zhengfan, T Kawabata
US Patent 10,360,018, 2019
Symmetric encryption apparatus and storage medium, and symmetric decryption apparatus and storage medium
Y Komano, K Akiyama, Y Goto
US Patent 9,413,729, 2016
An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density
K Matsuda, S Tada, M Nagata, Y Komano, Y Li, T Sugawara, M Iwamoto, ...
Japanese Journal of Applied Physics 59 (SG), SGGL02, 2020
Information processing device, power consumption calculating system and program product
S Yamanaka, Y Komano, T Takahashi, S Ito
US Patent App. 13/356,774, 2012
Server, charging server, power consumption calculating system, and computer program product
K Umesawa, Y Komano, S Yamanaka, T Takahashi
US Patent App. 13/164,857, 2012
The system can't perform the operation now. Try again later.
Articles 1–20