• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

HIROSE Shoichi  廣瀬 勝一

… Alternative Names

HIROSE Shouichi  廣瀬 勝一

広瀬 勝一  ヒロセ シヨウイチ

Less
Researcher Number 20228836
Other IDs
  • ORCIDhttps://orcid.org/0000-0001-6723-722X
External Links
Affiliation (Current) 2025: 福井大学, 学術研究院工学系部門, 教授
Affiliation (based on the past Project Information) *help 2016 – 2024: 福井大学, 学術研究院工学系部門, 教授
2015: 福井大学, 大学院工学研究科, 教授
2011 – 2015: 福井大学, 工学(系)研究科(研究院), 教授
2010 – 2011: University of Fukui, 大学院・工学研究科, 教授
2009 – 2011: University of Fukui, 工学研究科, 教授 … More
2007 – 2010: 福井大学, 工学研究科, 准教授
2005 – 2006: 福井大学, 工学部, 助教授
1998 – 2004: 京都大学, 情報学研究科, 講師
1999: 京都大学, 大学院・情報学研究科, 講師
1995: 京都大学, 工学研究科, 助手
1991 – 1994: 京都大学, 工学部, 助手 Less
Review Section/Research Field
Principal Investigator
Basic Section 60070:Information security-related / Information security / Fundamental theory of informatics / 計算機科学 / 情報通信工学
Except Principal Investigator
情報通信工学 / Basic Section 60010:Theory of informatics-related / Medium-sized Section 60:Information science, computer engineering, and related fields / Broad Section J / Communication/Network engineering … More / Intelligent informatics / Informatics / 情報工学 / Information security / Fundamental theory of informatics / Computer system/Network Less
Keywords
Principal Investigator
暗号 / 暗号応用 / 帰着可能性 / 暗号・認証等 / 認証暗号 / 軽量暗号 / 標準暗号 / セキュリティプロトコル / 認証 / 証明可能安全性 … More / セキュリティ / 暗号・認証 / セキュア・ネットワーク / 情報基礎 / 非線形ブール関数 / 乱数列生成 / メッセージ認証 / 暗号化関数 / 無衝突性 / second preimage resistance / 一方向ハッシュ関数 / 移動通信 / 秘密鍵暗号 / 鍵系列生成器 / ストリーム暗号 / 証明可能安全 / Diffie-Hellman方式 / 認証付鍵共有方式 … More
Except Principal Investigator
移動通信 / 周波数利用効率 / 倍ブロック長圧縮関数 / 量子複製不可能性定理 / MIMO / マルチホップ / 車車間通信 / アドホックネットワーク / 無線通信 / 干渉キャンセラ / CDMA / RSVP / ATM / IP / 暗号 / 量子暗号 / 量子メモリ / 量子アルゴリズム / 振幅符号化 / Grover探索アルゴルズム / 量子データ / 量子計算機 / 鍵の遠隔無効化 / 量子複製不可能定理 / 装置の不正複製防止 / Groverアルゴリズム / 対称暗号 / 集積回路学 / 集積回路工学 / ハードウェアセキュリティ / 情報理論 / 暗号理論 / 情報セキュリティ / Game Theory / Tornado-like Code / Spectral Efficiency / Mobile Communications / Wireless Communications / Autonomous Distributed Control / Multi-hop / Ad Hoc Networks / 協力中継ダイバーシチ / Trnade型符号 / 協調通信 / マルチポップ / ゲーム理論 / Tornado型符号 / 自律分散制御 / Maximum likelihood estimation / Multiuser detection / In-lab experiment / Interference canceller / Trellis coding / Spatial multiplexing / Space-time coding / 符号化 / 室内伝送実験 / BLAST / MIMOシステム / 無線信号処理 / 時間空間伝送 / MIMO-MLD / トレリス符号化時空間伝送 / 高速大容量移動通信 / 最尤推定 / マルチユーザ受信 / 伝送実験 / トレリス符号化 / 空間多重 / 時空符号化 / routing protocol / spectral efficiency / multi-hop network / autonomous distributed network / ad hoc network / wireless communication / パケット通信 / 自律分散ネットワーク / ルーティング / マルチホップネットワーク / 自律分散 / Security / Packet Transmission / Iterative Decoding / Adaptive Array Antenna / Interference Canceller / Mobile Communication / 反復信号 / ダイナミック資源割当て / 動的資源割当 / セキュリティ / パケット伝送 / 反復復号 / アダプティブアレーアンテナ / Layered Transmission / Layered Coding / QoS Routing / QoS / Multicast / 高速ネットワーク / マルチメディア / IP over ATM / インターネット / ATMネットワーク / Stream URL / PLASMA / サービス品質(QoS)保証 / フロアコントロール / 資源予約 / SRSVP / IPマルチキャスト / 階層伝送 / 階層符号化 / QoSルーティング / QoS保証 / マルチキャスト / Interface / Image Processing / Constraint Satisfaction / Top-down Information / ユーザインタフェース / 画像認識 / インタフェース / 画像処理 / 制約充足 / トップダウン情報 / Key Words / Character Recognition / Database / Document Image / Free Formatted Document / デ-タベ-ス / 検索索引 / 文字認識 / データベース / 文書画像 / 自由書式文書 / Multi-Dimensional Paral lel Processing / Constructive Inference / Symbolic Image Recognition / 多次元並列処理 / 構成的推論 / シンボル画像理解 / nearest-neighbor問題 / ハッシュ関数 / 復号問題 / 最短ベクトル問題 / 安全性 / 格子 / センサネットワーク / 暗号・承認等 / センサーネットワーク / 暗号・認証等 / 軍人将棋 / 秘密分散 / モデル化 / サーバレス / Shibbolleth / 認証連携 / マジックプロトコル / マルチパーティプロトコル / 不正防止 / peer-to-peer / ネットワークゲーム / 最適化 / 3Dモデル / 人体モデル / 物理的制約 / 布特性 / 布モデル / 着服シミュレーション / 仮想環境 Less
  • Research Projects

    (22 results)
  • Research Products

    (91 results)
  • Co-Researchers

    (31 People)
  •  Study on committing authenticated encryption and its applicationPrincipal Investigator

    • Principal Investigator
      廣瀬 勝一
    • Project Period (FY)
      2024 – 2026
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      University of Fukui
  •  量子力学的特性を利用したデータセキュリティ技術の創出

    • Principal Investigator
      桑門 秀典
    • Project Period (FY)
      2022 – 2024
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60010:Theory of informatics-related
    • Research Institution
      Kansai University
  •  Design and Evaluation of Cryptographic Schemes Considering Extension of ApplicationsPrincipal Investigator

    • Principal Investigator
      Hirose Shoichi
    • Project Period (FY)
      2021 – 2023
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      University of Fukui
  •  Management schemes for secret information using no-cloning property of quantum state

    • Principal Investigator
      Kuwakado Hidenori
    • Project Period (FY)
      2020 – 2021
    • Research Category
      Grant-in-Aid for Challenging Research (Exploratory)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Kansai University
  •  Resilience Enhancement of IoT Ecosystem by Cryptographic Technologies

    • Principal Investigator
      Sakiyama Kazuo
    • Project Period (FY)
      2018 – 2022
    • Research Category
      Grant-in-Aid for Scientific Research (S)
    • Review Section
      Broad Section J
    • Research Institution
      The University of Electro-Communications
  •  Security Analyses of Standardized Cryptographic Schemes and Their ApplicationsPrincipal Investigator

    • Principal Investigator
      Hirose Shoichi
    • Project Period (FY)
      2016 – 2018
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Information security
    • Research Institution
      University of Fukui
  •  Design and Analysis of Application-Oriented Security Protocols with Provable SecurityPrincipal Investigator

    • Principal Investigator
      Hirose Shoichi
    • Project Period (FY)
      2013 – 2015
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      University of Fukui
  •  Cryptographic primitive based on lattice problems

    • Principal Investigator
      Kuwakado Hidenori
    • Project Period (FY)
      2013 – 2015
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      Kansai University
  •  Study on secure and safety technology for sensor networks

    • Principal Investigator
      MIYAJI Atsuko
    • Project Period (FY)
      2009 – 2014
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Japan Advanced Institute of Science and Technology
  •  Study on techniques to keep confidentiality and integrity of a large amount of informationPrincipal Investigator

    • Principal Investigator
      HIROSE Shoichi
    • Project Period (FY)
      2008 – 2011
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      University of Fukui
  •  不正を許さないサーバレスネットワークゲーム

    • Principal Investigator
      OKABE Yasuo
    • Project Period (FY)
      2005 – 2007
    • Research Category
      Grant-in-Aid for Exploratory Research
    • Research Field
      Computer system/Network
    • Research Institution
      Kyoto University
  •  Research on Autonomous Distributed Wireless Ad Hoc Networks

    • Principal Investigator
      YOSHIDA Susumu
    • Project Period (FY)
      2004 – 2006
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Research Field
      Communication/Network engineering
    • Research Institution
      Kyoto University
  •  一方向ハッシュ関数の構成と応用に関する研究Principal Investigator

    • Principal Investigator
      廣瀬 勝一
    • Project Period (FY)
      2002 – 2003
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      計算機科学
    • Research Institution
      Kyoto University
  •  Study on Spectral Efficiency Improvement by Space Time Coding Technique for High-speed High-capacity Mobile Radio Communications

    • Principal Investigator
      YOSHIDA Susumu
    • Project Period (FY)
      2001 – 2002
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      情報通信工学
    • Research Institution
      KYOTO UNIVERSITY
  •  Simulation System for Performance Evaluation of Autonomous Distributed Wireless Ad Hoc Information Networks

    • Principal Investigator
      YOSHIDA Susumu
    • Project Period (FY)
      2000 – 2002
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      情報通信工学
    • Research Institution
      KYOTO UNIVERSITY
  •  移動通信に適した秘密鍵暗号と認証付鍵共有に関する研究Principal Investigator

    • Principal Investigator
      廣瀬 勝一
    • Project Period (FY)
      1998 – 1999
    • Research Category
      Grant-in-Aid for Encouragement of Young Scientists (A)
    • Research Field
      情報通信工学
    • Research Institution
      Kyoto University
  •  Study on Code-Division Multiple Access Scheme for Multimedia Mobile Communications

    • Principal Investigator
      YOSHIDA Susumu
    • Project Period (FY)
      1998 – 2000
    • Research Category
      Grant-in-Aid for Scientific Research (B).
    • Research Field
      情報通信工学
    • Research Institution
      KYOTO UNIVERSITY
  •  Multi-point/Multi-quality Simultaneous Transmission Method Based on Internet Technology over ATM Networks

    • Principal Investigator
      IKEDA Katsuo
    • Project Period (FY)
      1997 – 1999
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Research Field
      情報通信工学
    • Research Institution
      KYOTO UNIVERSITY
  •  仮想服飾環境における空間操作法

    • Principal Investigator
      MINOH Michihiko
    • Project Period (FY)
      1995 – 1997
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Research Institution
      Kyoto University
  •  Constraint Satisfying Image Processing Using Top-down Information

    • Principal Investigator
      MINOH Michihiko
    • Project Period (FY)
      1993 – 1994
    • Research Category
      Grant-in-Aid for General Scientific Research (C)
    • Research Field
      Intelligent informatics
    • Research Institution
      KYOTO UNIVERSITY
  •  Multi-Dimensional Parallel Processing of Symbolic Image Recognition based on Constructive Inference

    • Principal Investigator
      IKEDA Katsuo
    • Project Period (FY)
      1991 – 1993
    • Research Category
      Grant-in-Aid for General Scientific Research (A)
    • Research Field
      情報工学
    • Research Institution
      Kyoto University
  •  Construction of a free-formatted document image database system which adds

    • Principal Investigator
      IKEDA Katsuo
    • Project Period (FY)
      1991 – 1993
    • Research Category
      Grant-in-Aid for Developmental Scientific Research (B)
    • Research Field
      Informatics
    • Research Institution
      KYOTO UNIVERSITY

All 2024 2023 2022 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 Other

All Journal Article Presentation

  • [Journal Article] Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher2024

    • Author(s)
      Hirose Shoichi, Minematsu Kazuhiko
    • Journal Title

      Lecture Notes in Computer Science (Proc. SAC 2023)

      Volume: 14201 Pages: 233-252

    • DOI

      10.1007/978-3-031-53368-6_12

    • ISBN
      9783031533679, 9783031533686
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21K11885
  • [Journal Article] Quantum Collision Resistance of Double-Block-Length Hashing2024

    • Author(s)
      Shoichi Hirose and Hidenori Kuwakado
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: Vol.E107-A,No.9

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-22K11914
  • [Journal Article] Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher2023

    • Author(s)
      Shoichi Hirose
    • Journal Title

      Lecture Notes in Computer Science (Proc. WISA 2022)

      Volume: 13720 Pages: 3-15

    • DOI

      10.1007/978-3-031-25659-2_1

    • ISBN
      9783031256585, 9783031256592
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21K11885
  • [Journal Article] Update on Analysis of Lesamnta-LW and New PRF Mode LRF2021

    • Author(s)
      Shoichi Hirose, Yu Sasaki, and Hirotaka Yoshida
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E104.A Issue: 9 Pages: 1304-1320

    • DOI

      10.1587/transfun.2020EAP1109

    • NAID

      130008081823

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2021-09-01
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Journal Article] Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model2021

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado, and Hirotaka Yoshida
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: E104.D Issue: 11 Pages: 1894-1901

    • DOI

      10.1587/transinf.2021NGP0008

    • NAID

      130008110114

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2021-11-01
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Journal Article] A Note on Quantum Collision Resistance of Double-Block-Length Compression Functions2021

    • Author(s)
      Shoichi Hirose and Hidenori Kuwakado
    • Journal Title

      The 18th IMA International Conference on Cryptography and Coding, (IMACC 2021), Lecture Notes in Computer Science

      Volume: 13129 Pages: 161-175

    • DOI

      10.1007/978-3-030-92641-0_8

    • ISBN
      9783030926403, 9783030926410
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20K21798
  • [Journal Article] Algebraic Fault Analysis of SHA-256 Compression Function and Its Application2021

    • Author(s)
      Kazuki Nakamura, Koji Hori, and Shoichi Hirose
    • Journal Title

      Information

      Volume: 12 Issue: 10 Pages: 1-9

    • DOI

      10.3390/info12100433

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Journal Article] Another Algebraic Decomposition Method for Masked Implementation2021

    • Author(s)
      Shoichi Hirose
    • Journal Title

      Proc. of AC3 2021

      Volume: - Pages: 105-114

    • DOI

      10.1007/978-3-030-80851-8_8

    • ISBN
      9783030808501, 9783030808518
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Journal Article] White-Box Encryption Scheme Using a Quantum Memory2021

    • Author(s)
      Hidenori Kuwakado and Shoichi Hirose and Masahiro Mambo
    • Journal Title

      Cryptology ePrint Archive

      Volume: 589 Pages: 1-16

    • Open Access
    • Data Source
      KAKENHI-PROJECT-20K21798
  • [Journal Article] Authenticated Encryption Based on Lesamnta-LW Hashing Mode2020

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida
    • Journal Title

      Proc. International Conference on Information Security and Cryptology (ICISC 2019)

      Volume: LNCS11975 Pages: 52-69

    • DOI

      10.1007/978-3-030-40921-0_3

    • ISBN
      9783030409203, 9783030409210
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Journal Article] Compactly Committing Authenticated Encryption Using Tweakable Block Cipher2020

    • Author(s)
      Shoichi Hirose
    • Journal Title

      Proc. of NSS 2020

      Volume: LNCS12570 Pages: 187-206

    • DOI

      10.1007/978-3-030-65745-1_11

    • ISBN
      9783030657444, 9783030657451
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Journal Article] Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode2020

    • Author(s)
      Shoichi Hirose, Yu Sasaki, and Hirotaka Yoshida
    • Journal Title

      Proc. of ACNS 2020

      Volume: LNCS12146 Pages: 89-109

    • DOI

      10.1007/978-3-030-57808-4_5

    • ISBN
      9783030578077, 9783030578084
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Journal Article] Re-Keying Scheme Revisited: Security Model and Instantiations2019

    • Author(s)
      Yuichi Komano and Shoichi Hirose
    • Journal Title

      Applied Sciences

      Volume: 9(5), 1002 Issue: 5 Pages: 1-15

    • DOI

      10.3390/app9051002

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Journal Article] The PRF Security of Compression-Function-Based MAC Functions in the Multi-User Setting2019

    • Author(s)
      HIROSE Shoichi
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E102.A Issue: 1 Pages: 270-277

    • DOI

      10.1587/transfun.E102.A.270

    • NAID

      130007541787

    • ISSN
      0916-8508, 1745-1337
    • Year and Date
      2019-01-01
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Journal Article] Sequential Hashing with Minimum Padding2018

    • Author(s)
      Hirose Shoichi
    • Journal Title

      Cryptography

      Volume: 2 Issue: 2 Pages: 11-11

    • DOI

      10.3390/cryptography2020011

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Journal Article] A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications2018

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E101.A Issue: 1 Pages: 110-118

    • DOI

      10.1587/transfun.E101.A.110

    • NAID

      130006300810

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Journal Article] Message Preprocessing for MD Hash Functions2016

    • Author(s)
      Hidenori Kuwakado, Shoichi Hirose
    • Journal Title

      IEICE Technical Report

      Volume: 115 Pages: 89-93

    • Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-25330152
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-2562016

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E99.A Issue: 1 Pages: 14-21

    • DOI

      10.1587/transfun.E99.A.14

    • NAID

      130005115228

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189, KAKENHI-PROJECT-25330150
  • [Journal Article] May-Ozerov Algorithm for Nearest-Neighbor Problem over Fq and Its Application to Information Set Decoding2016

    • Author(s)
      Shoichi Hirose
    • Journal Title

      Cryptology ePrint Archive

      Volume: 2016/237 Pages: 1-13

    • Acknowledgement Compliant / Open Access
    • Data Source
      KAKENHI-PROJECT-25330152
  • [Journal Article] Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity2016

    • Author(s)
      Shoichi Hirose
    • Journal Title

      ICICS 2015, Lecture Notes in Computer Science

      Volume: 9543 Pages: 125-140

    • DOI

      10.1007/978-3-319-29814-6_11

    • ISBN
      9783319298139, 9783319298146
    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Journal Article] A Note on the May-Ozerov Algorithm for the Nearest Neighbor Problem over Any Finite Field2016

    • Author(s)
      Shoichi Hirose
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム

      Volume: 1D2-5 Pages: 1-7

    • Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-25330152
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-2562015

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      The 17th International Conference on Information and Security Cryptology, ICISC 2014, Lecture Notes in Computer Science, 8949(2015), Springer-Verlag

      Volume: 8949 Pages: 271-285

    • NAID

      110009778465

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 段数を削減したPRESENTを用いた倍ブロック長圧縮関数に対する衝突攻撃2013

    • Author(s)
      小林哲也, 廣瀬勝一
    • Journal Title

      電子情報通信学会論文誌A

      Volume: J96-A Pages: 541-550

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Collision Resistance of Hash Functions in a Weak Ideal Cipher Model2012

    • Author(s)
      S. Hirose
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: vol.E95-A Pages: 252-255

    • NAID

      10030534957

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Collision Resistance of Hash Functions in a Weak Ideal Cipher Model2012

    • Author(s)
      Shoichi Hirose
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E95-A Issue: 1 Pages: 252-255

    • DOI

      10.1587/transfun.E95.A.252

    • NAID

      10030534957

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Sequential Bitwise Sanitizable Signature Schemes2011

    • Author(s)
      Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E94-A Pages: 392-404

    • NAID

      10027987169

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Content Authentication for Range Queries in Peer-to-Peer Networks2011

    • Author(s)
      廣瀬勝一
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: vol.111 Pages: 177-180

    • NAID

      10031099532

    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] A Note on Practical Key Derivation Functions2011

    • Author(s)
      Shoichi Hirose
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E94-A Issue: 8 Pages: 1764-1767

    • DOI

      10.1587/transfun.E94.A.1764

    • NAID

      10030190662

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing2011

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida
    • Journal Title

      Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7259 Pages: 7259-7259

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 暗号における擬似乱数列とその生成法2010

    • Author(s)
      廣瀬勝一
    • Journal Title

      システム制御情報学会誌

      Volume: 54 Pages: 192-197

    • NAID

      110007610246

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function2009

    • Author(s)
      S.Hirose, H.Kuwakado
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: E92-A Pages: 2447-2453

    • NAID

      10026860049

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] ハッシュ関数の安全性に関する考察2009

    • Author(s)
      廣瀬勝一
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: vol.108 Pages: 267-271

    • NAID

      110007324400

    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] ハッジュ関数の安全性に関する考察2009

    • Author(s)
      廣瀬勝一
    • Journal Title

      電子情報通信学会技術研究報告 108

      Pages: 267-271

    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function2009

    • Author(s)
      S.Hirose, H.Kuwakado
    • Journal Title

      IEICE Transactions on Fundamentals 10

      Pages: 2447-2453

    • NAID

      10026860049

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function2009

    • Author(s)
      S.Hirose, H.Kuwakado
    • Journal Title

      IEICE Transactions on Fundamentals vol.E92-A

      Pages: 2447-2453

    • NAID

      10026860049

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack2008

    • Author(s)
      S. Hirose
    • Journal Title

      IEICE Transactions on Fundamentals vol.E91-A,no.1

      Pages: 74-82

    • NAID

      110004823747

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] A Domain-Extension Scheme for Random Oracles2007

    • Author(s)
      廣瀬勝一
    • Journal Title

      2007年暗号と情報セキュリティシンポジウム予稿集 2A3-1

    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] A Simple Variant of the Merkle-Damgaard Scheme with a Permutation2007

    • Author(s)
      S. Hirose, Je Hong Park and Aaram Yun
    • Journal Title

      Lecture Notes in Computer Science 4833

      Pages: 113-129

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] An Update on the Analysis and Design of NMAC and HMAC Functions2007

    • Author(s)
      Praveen Gauravaram, S. Hirose and Suganya Annadurai
    • Journal Title

      International Journal of Network Security vol.7,no.1

      Pages: 50-61

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] Some Constructions and a New Security Notion of Double-Block-Length Hash Functions2006

    • Author(s)
      廣瀬勝一
    • Journal Title

      2006年暗号と情報セキュリティシンポジウム予稿集 4E2-4

    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] A Security Analysis of Double-Block-Length Hash Functions with the Rate 12006

    • Author(s)
      S.Hirose
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E89-A, no.10

      Pages: 2575-2582

    • NAID

      110007537727

    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack2006

    • Author(s)
      廣瀬勝一
    • Journal Title

      電子情報通信学会技術研究報告 ISEC2006-78

      Pages: 45-52

    • NAID

      110004823747

    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] How to Construct Double-Block-Length Hash Functions2006

    • Author(s)
      S.Hirose
    • Journal Title

      Second Cryptographic Hash Workshop

    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] Some Plausible Constructions of Double-Block-Length Hash Functions2006

    • Author(s)
      S.Hirose
    • Journal Title

      the 13th annual Fast Software Encryption Workshop (発表予定)

    • NAID

      120000808506

    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] 素因数分解に基づく無衝突関数を用いたコミットメント方式2006

    • Author(s)
      和田純平, 廣瀬勝一, 吉田進
    • Journal Title

      2006年暗号と情報セキュリティシンポジウム予稿集 1A3-1

    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] A Note on Provably Secure Double-Block-Length Hash Functions in a Black-Box Model2005

    • Author(s)
      廣瀬勝一
    • Journal Title

      電子情報通信学会技術研究報告,ISEC2005-79 Vol.105, No.290

      Pages: 23-30

    • NAID

      110003298669

    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] Complexity of Differential Attacks on SHA-0 with Various Message Schedules2005

    • Author(s)
      Mitsuhiro Hattori, S.Hirose, Susumu Yoshida
    • Journal Title

      IEICE Transactions on Fundamentals vol.E88-A, no.12

      Pages: 3668-3671

    • NAID

      110004019479

    • Data Source
      KAKENHI-PROJECT-17650016
  • [Journal Article] 素因数分解に基づく無衝突関数を利用した暗号方式に関する検討2005

    • Author(s)
      和田純平, 神崎元, 廣瀬勝一, 吉田進
    • Journal Title

      電子情報通信学会技術研究報告,ISEC2005-62, Vol.105, No.194

      Pages: 137-142

    • NAID

      110003298635

    • Data Source
      KAKENHI-PROJECT-17650016
  • [Presentation] ハッシュ関数SHA-1, SHA-256に基づくMAC関数への偽造攻撃を目的とした代数的故障利用解析2023

    • Author(s)
      中村一貴, 飯沼浩仁, 廣瀬勝一
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Presentation] Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher2022

    • Author(s)
      Shoichi Hirose and Kazuhiko Minematsu
    • Organizer
      IACR Cryptology ePrint Archive
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-21K11885
  • [Presentation] Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher2022

    • Author(s)
      Shoichi Hirose and Kazuhiko Minematsu
    • Organizer
      IACR Cryptology ePrint Archive: Report 2022/1670
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Presentation] マスキングを行う実装のための代数的分解法について2021

    • Author(s)
      廣瀬勝一
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Presentation] SHA-256圧縮関数に対する代数的故障利用解析とその応用について2021

    • Author(s)
      堀弘二, 廣瀬勝一
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS)
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Presentation] Collision-Resistant and Pseudorandom Function Based on Merkle-Damgaard Hash Function2021

    • Author(s)
      Shoichi Hirose
    • Organizer
      The 24th International Conference on Information Security and Cryptology (ICISC 2021)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-21K11885
  • [Presentation] Re-keying方式の高次サイドチャネル攻撃への耐性に関する検討2020

    • Author(s)
      駒野雄一, 廣瀬勝一
    • Organizer
      暗号と情報セキュリティシンポジウム (SCIS) 2020
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Presentation] Evaluation of an Algebraic Fault Attack on the SHA-256 Compression Function2020

    • Author(s)
      Koji Hori and Shoichi Hirose
    • Organizer
      The 15th International Workshop on Security (IWSEC)
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Presentation] サイドチャネル攻撃への耐性を有する認証暗号方式について2019

    • Author(s)
      廣瀬勝一, 菅原健, 駒野雄一
    • Organizer
      電子情報通信学会 情報セキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-18H05289
  • [Presentation] IoT向け暗号における効率的な剰余計算方法の検討2019

    • Author(s)
      広瀬僚太, 西永俊文, 満保雅浩
    • Organizer
      2019年暗号と情報セキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] Parallelizable Message Preprocessing for Merkle-Damgaard Hash Functions2018

    • Author(s)
      Kuwakado Hidenori, Hirose Shoichi and Mambo Masahiro
    • Organizer
      2018 International Symposium on Information Theory and Its Applications
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] Rate-One AE with Security Under RUP2017

    • Author(s)
      Shoichi Hirose, Yu Sasaki and Kan Yasuda
    • Organizer
      The 20th Information Security Conference (ISC 2017)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field F_q2017

    • Author(s)
      Cheikh Thiecoumba Gueye, Jean Belo Klamti and Shoichi Hirose
    • Organizer
      The 2nd International Conference on Codes, Cryptology and Information Security (C2SI2017)
    • Place of Presentation
      Rabat (Morocco)
    • Year and Date
      2017-04-10
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] Compression-Function Modes of Operations for Symmetric Cryptography2017

    • Author(s)
      Shoichi Hirose
    • Organizer
      The 2017 International Symposium for Advanced Computing and Information Technology (ISACIT 2017)
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] 小規模マイクロコントローラ上での標準ハッシュ関数およびそれらに基づくメッセージ認証関数の実装について2017

    • Author(s)
      森田保成, 西本賢大, 廣瀬勝一
    • Organizer
      電子情報通信学会基礎・境界ソサイエティ大会
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] Security Analysis of a Design Variant of Randomized Hashing2017

    • Author(s)
      Praveen Gauravaram, Shoichi Hirose and Douglas Stebila
    • Organizer
      The 8th International Conference on Applications and Technologies in Information Security (ATIS 2017)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] Sequential Hashing with Minimum Padding2016

    • Author(s)
      Shoichi Hirose
    • Organizer
      The Sixth Asian Workshop on Symmetric Key Cryptography (ASK 2016)
    • Place of Presentation
      Nagoya (Japan)
    • Year and Date
      2016-09-28
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] A Tweak for a PRF Mode of a Compression Function and Its Applications2016

    • Author(s)
      Shoichi Hirose and Atsushi Yabumoto
    • Organizer
      The 9th International Conference on Security for Information Technology and Communications (SECITC 2016)
    • Place of Presentation
      Bucharest (Romania)
    • Year and Date
      2016-06-09
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Application2016

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida
    • Organizer
      NIST Lightweight Cryptography Workshop 2016
    • Place of Presentation
      Gaithersburg (USA)
    • Year and Date
      2016-10-17
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] Lightweight Hashing Using Lesamnta-LW Compression Function Mode and MDP Domain Extension2016

    • Author(s)
      Asraf Akhimullah and Shoichi Hirose
    • Organizer
      The 3rd International Workshop on Information and Communication Security (WICS '16)
    • Place of Presentation
      Hiroshima (Japan)
    • Year and Date
      2016-11-22
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] May-Ozerov Algorithm for Nearest Neighbor Problem over Fq and its Application to Information Set Decoding2016

    • Author(s)
      Shoichi Hirose
    • Organizer
      PQCrypto 2016, Hot Topic Session
    • Place of Presentation
      九州大学西新プラザ(福岡県,日本)
    • Year and Date
      2016-02-16
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-25330152
  • [Presentation] Sequential Hashing with Minimum Padding2016

    • Author(s)
      Shoichi Hirose
    • Organizer
      NIST Lightweight Cryptography Workshop 2016
    • Place of Presentation
      Gaithersburg (USA)
    • Year and Date
      2016-10-17
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] May-Ozerov Algorithm for Nearest-Neighbor Problem over F_q and Its Application to Information Set Decoding2016

    • Author(s)
      Shoichi Hirose
    • Organizer
      The 9th International Conference on Security for Information Technology and Communications (SECITC 2016)
    • Place of Presentation
      Bucharest (Romania)
    • Year and Date
      2016-06-09
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] A TESLA-Based Authentication Protocol for Multiple Senders2014

    • Author(s)
      Asraf Akhimullah, 廣瀬勝一
    • Organizer
      2014年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      鹿児島市
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Presentation] Hashing Mode Using a Lightweight Blockcipher2013

    • Author(s)
      Hidenori Kuwakado and Shoichi Hirose
    • Organizer
      The 14th IMA International Conference on Cryptography and Coding (IMACC 2013)
    • Place of Presentation
      Oxford
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Presentation] Redactable Signature Scheme for Tree-Structured Data Based on Merkle Tree2013

    • Author(s)
      Shoichi Hirose and Hidenori Kuwakado
    • Organizer
      The 10th International Conference on Security and Cryptography (SECRYPT 2013)
    • Place of Presentation
      Reykjavik
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Presentation] 木構造データに対するMerkle木に基づく編集可能署名2012

    • Author(s)
      廣瀬勝一,桑門秀典
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急
    • Year and Date
      2012-02-02
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] Model of Blockcipher-Based Hash Functions Suitable for Memory-Constrained Devices2011

    • Author(s)
      廣瀬勝一, 桑門秀典, 吉田博隆
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県)
    • Year and Date
      2011-01-28
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] AES-256を用いたDM型圧縮関数に対する衝突攻撃について2010

    • Author(s)
      小林哲也, 廣瀬勝一
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      信州大学
    • Year and Date
      2010-03-05
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] ブロック暗号に基づくハッシュ関数の構成法2010

    • Author(s)
      廣瀬勝一
    • Organizer
      電子情報通信学会2010年ソサイエティ大会
    • Place of Presentation
      大阪府立大学
    • Year and Date
      2010-09-17
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] A Note on Practical Key Derivation Functions2010

    • Author(s)
      廣瀬勝一
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      信州大学
    • Year and Date
      2010-03-05
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 共通鍵認証暗号における再暗号化について2010

    • Author(s)
      廣瀬勝一
    • Organizer
      コンピュータセキュリティシンポジウム2010
    • Place of Presentation
      岡山コンベンションセンター
    • Year and Date
      2010-10-19
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] Constructing a Hash Function from a Weak Block Cipher in an Ideal Model2009

    • Author(s)
      廣瀬勝一, 桑門秀典
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機会振興会館(東京)
    • Year and Date
      2009-09-18
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] Constructing a Hash Function from a Weak Block Cipher in an Ideal Model2009

    • Author(s)
      廣瀬勝一, 桑門秀典
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      東京
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] ハッシュ関数の安全性に関する考察2009

    • Author(s)
      廣瀬勝一
    • Organizer
      電子情報通信学会情報通信基礎サブソサイェティ合同研究会
    • Place of Presentation
      公立はこだて未来大学
    • Year and Date
      2009-03-10
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] Efficient PRF Modes of a Block-Cipher-Based Hash Function2009

    • Author(s)
      廣瀬勝一, 桑門秀典
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      大津プリンスホテル
    • Year and Date
      2009-01-21
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] Provable Security of a Hash Function Using an MMO Compression Function and Merkle-Damgaard Domain Extension with an Output Function2008

    • Author(s)
      廣瀬勝一, 桑門秀典
    • Organizer
      電子情報通信学会基礎・境界ソサイェティ大会
    • Place of Presentation
      明治大学
    • Year and Date
      2008-09-16
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] ハッジュ関数の標準化と最新動向2008

    • Author(s)
      廣瀬勝一
    • Organizer
      第5回ISSスクエア水平ワークショップ
    • Place of Presentation
      情報セキュリティ大学院大学
    • Year and Date
      2008-12-19
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado and Atsuko Miyaji
    • Organizer
      The 17th International Conference on Information Security and Cryptology (ICISC 2014)
    • Place of Presentation
      Seoul
    • Year and Date
      2014-12-03 – 2014-12-05
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Presentation] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256

    • Author(s)
      陳嘉耕, 廣瀬勝一, 桑門秀典, 宮地充子
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      札幌コンベンションセンター
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Forward-Secure Sequential Aggregate Message Authentication Revisited

    • Author(s)
      Shoichi Hirose and Hidenori Kuwakado
    • Organizer
      The 8th International Conference on Provable Security (ProvSec 2014)
    • Place of Presentation
      Hong Kong
    • Year and Date
      2014-10-09 – 2014-10-10
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Presentation] Forward-Secure Sequential Aggregate Message Authentication Revisited

    • Author(s)
      廣瀬勝一, 桑門秀典
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      函館市
    • Year and Date
      2014-07-03 – 2014-07-04
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Presentation] Application-Specific Cryptographic Schemes Based on Symmetric-Key Primitives

    • Author(s)
      Shoichi Hirose
    • Organizer
      The Fourth Asian Workshop on Symmetric Key Cryptography (ASK 2014)
    • Place of Presentation
      Chennai
    • Year and Date
      2014-12-19 – 2014-12-22
    • Invited
    • Data Source
      KAKENHI-PROJECT-25330150
  • 1.  KUWAKADO Hidenori (30283914)
    # of Collaborated Projects: 7 results
    # of Collaborated Products: 11 results
  • 2.  MINOH Michihiko (70166099)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 0 results
  • 3.  IKEDA Katsuo (30026009)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 0 results
  • 4.  YOSHIDA Susumu (50026324)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 0 results
  • 5.  満保 雅浩 (60251972)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 3 results
  • 6.  WATANABE Masako (70127158)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 7.  AMANO Akira (60252491)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 8.  MURATA Hidekazu (60252475)
    # of Collaborated Projects: 3 results
    # of Collaborated Products: 0 results
  • 9.  OKABE Yasuo (20204018)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 10.  MIYAJI Atsuko (10313701)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 3 results
  • 11.  SOSHI Masakazu (00293142)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 12.  OHTA Yuichi (50115804)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 13.  TANABE Hidehiko (80236661)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 14.  OKAZAKI Hiroyuki (50432167)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 15.  NAKAMURA Motonori (30268156)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 16.  FUJIKAWA KENJI (40293899)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 17.  MUKUNOKI Masayuki (20283640)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 18.  KAWAI Makoto (20314255)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 19.  YAMAMOTO Koji (30423015)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 20.  Sakiyama Kazuo (80508838)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 21.  宮崎 修一 (00303884)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 22.  李 陽 (20821812)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 23.  宮原 大輝 (20928288)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 24.  渡邉 洋平 (40792263)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 25.  岩本 貢 (50377016)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 26.  駒野 雄一 (50393856)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 3 results
  • 27.  菅原 健 (60785236)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 28.  三浦 典之 (70650555)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 29.  太田 和夫 (80333491)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results
  • 30.  坂口 嘉之
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 31.  西村 真一
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results

URL: 

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi