• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

KUWAKADO HIDENORI  桑門 秀典

ORCIDConnect your ORCID iD *help
… Alternative Names

KUWAKADO Hidenori  桑門 秀典

Less
Researcher Number 30283914
Other IDs
External Links
Affiliation (Current) 2025: 関西大学, 総合情報学部, 教授
Affiliation (based on the past Project Information) *help 2013 – 2024: 関西大学, 総合情報学部, 教授
2012: 神戸大学, 工学(系)研究科(研究院), 准教授
2007 – 2012: Kobe University, 工学研究科, 准教授
2009: Kobe University, 大学院・工学研究科, 准教授
2001 – 2005: 神戸大学, 工学部, 助教授
2002: 神戸大学, 工学部, 教授
1998 – 2000: 神戸大学, 工学部, 助手
Review Section/Research Field
Principal Investigator
Communication/Network engineering / 情報通信工学 / Basic Section 60010:Theory of informatics-related / Medium-sized Section 60:Information science, computer engineering, and related fields / Basic Section 60070:Information security-related / Information security / 情報システム学(含情報図書館学)
Except Principal Investigator
Basic Section 60070:Information security-related / Information security / 情報通信工学 / Communication/Network engineering
Keywords
Principal Investigator
ハッシュ関数 / ディジタル署名 / 暗号 / 倍ブロック長圧縮関数 / 量子複製不可能性定理 / 量子アルゴリズム / 量子暗号 / 量子メモリ / 振幅符号化 / Grover探索アルゴルズム … More / 量子データ / 量子計算機 / 鍵の遠隔無効化 / 量子複製不可能定理 / 装置の不正複製防止 / Groverアルゴリズム / 対称暗号 / センサ / fuzzy extractor / 負性インピーダンス変換器 / センサ機器認証 / 地磁気センサー / NTRU暗号 / 高位合成 / PUF / プログラマブルアナログ回路 / Fuzzy Extractor / 物理的複製不可能関数 / nearest-neighbor問題 / 復号問題 / 最短ベクトル問題 / 安全性 / 格子 / Feistel暗号 / ライトウエイト暗号 / ブロック暗号 / 安全性解析 / セキュリティ / 受信者選択 / オーバーレイネットワーク / ビットスライス実装 / ネットワーク符号化 / 暗号・セキュリティ / 匿名 / 内部告発 / デイジタル署名 / 衝突制御型ハッシュ関数 / 情報公開用署名 / 有向木 / 偽造検出 / fail-stop署名 / 零知識対話型証明 / サブリミナルチャネル / 秘密分散 / 視覚復号型暗号 / 情報セキュリティ … More
Except Principal Investigator
暗号 / 暗号応用 / 帰着可能性 / 鍵管理システム / 鍵共有 / 離散対数問題 / ID情報 / 認証暗号 / 軽量暗号 / 標準暗号 / 暗号・認証等 / Key Escrow / Key Management / Distributed KGC / Clone Center / Key Sharing / Discrete Logarithm / Identity Information / 超大規模暗号通信ネットワーク / 鍵供託システム / 分散型鍵生成センタ / クローンセンタ / セキュリティプロトコル / 認証 / 証明可能安全性 / セキュリティ / 放送型暗号通信 / ID情報の木構造 / 素因数分解問題 Less
  • Research Projects

    (16 results)
  • Research Products

    (51 results)
  • Co-Researchers

    (6 People)
  •  Study on committing authenticated encryption and its application

    • Principal Investigator
      廣瀬 勝一
    • Project Period (FY)
      2024 – 2026
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      University of Fukui
  •  量子力学的特性を利用したデータセキュリティ技術の創出Principal Investigator

    • Principal Investigator
      桑門 秀典
    • Project Period (FY)
      2022 – 2024
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60010:Theory of informatics-related
    • Research Institution
      Kansai University
  •  Design and Evaluation of Cryptographic Schemes Considering Extension of Applications

    • Principal Investigator
      Hirose Shoichi
    • Project Period (FY)
      2021 – 2023
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      University of Fukui
  •  Management schemes for secret information using no-cloning property of quantum statePrincipal Investigator

    • Principal Investigator
      Kuwakado Hidenori
    • Project Period (FY)
      2020 – 2021
    • Research Category
      Grant-in-Aid for Challenging Research (Exploratory)
    • Review Section
      Medium-sized Section 60:Information science, computer engineering, and related fields
    • Research Institution
      Kansai University
  •  Research of authentication schemes available to low computational resource sensor devicesPrincipal Investigator

    • Principal Investigator
      KUWAKADO Hidenori
    • Project Period (FY)
      2018 – 2020
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Kansai University
  •  Security Analyses of Standardized Cryptographic Schemes and Their Applications

    • Principal Investigator
      Hirose Shoichi
    • Project Period (FY)
      2016 – 2018
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Information security
    • Research Institution
      University of Fukui
  •  Design and Analysis of Application-Oriented Security Protocols with Provable Security

    • Principal Investigator
      Hirose Shoichi
    • Project Period (FY)
      2013 – 2015
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      University of Fukui
  •  Cryptographic primitive based on lattice problemsPrincipal Investigator

    • Principal Investigator
      Kuwakado Hidenori
    • Project Period (FY)
      2013 – 2015
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      Kansai University
  •  Research on design and analysis of lightweight hash functionsPrincipal Investigator

    • Principal Investigator
      KUWAKADO Hidenori
    • Project Period (FY)
      2010 – 2012
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Communication/Network engineering
    • Research Institution
      Kobe University
  •  Research on overlay network codingPrincipal Investigator

    • Principal Investigator
      KUWAKADO Hidenori
    • Project Period (FY)
      2007 – 2009
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Communication/Network engineering
    • Research Institution
      Kobe University
  •  放送型暗号通信システムにおけるグループ鍵管理方式に関する研究

    • Principal Investigator
      TANAKA Hatsukazu
    • Project Period (FY)
      2004 – 2006
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Communication/Network engineering
    • Research Institution
      Kobe University
  •  内部告発を支援する情報セキュリティ技術に関する研究Principal Investigator

    • Principal Investigator
      桑門 秀典
    • Project Period (FY)
      2004 – 2005
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Communication/Network engineering
    • Research Institution
      Kobe University
  •  偽造が証明可能なディジタル署名方式に関する研究Principal Investigator

    • Principal Investigator
      桑門 秀典
    • Project Period (FY)
      2002 – 2003
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      情報通信工学
    • Research Institution
      Kobe University
  •  A New Key Maagement System for The Super-Large-Scale Communication Network

    • Principal Investigator
      TANAKA Hatsukazu
    • Project Period (FY)
      2002 – 2003
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      情報通信工学
    • Research Institution
      Kobe University
  •  サブリミナルチャネルの悪用防止技術に関する研究Principal Investigator

    • Principal Investigator
      桑門 秀典
    • Project Period (FY)
      2000 – 2001
    • Research Category
      Grant-in-Aid for Encouragement of Young Scientists (A)
    • Research Field
      情報通信工学
    • Research Institution
      Kobe University
  •  視覚特性を利用した画像情報の暗号化技術に関する研究Principal Investigator

    • Principal Investigator
      桑門 秀典
    • Project Period (FY)
      1998 – 1999
    • Research Category
      Grant-in-Aid for Encouragement of Young Scientists (A)
    • Research Field
      情報システム学(含情報図書館学)
    • Research Institution
      Kobe University

All 2024 2022 2021 2018 2016 2015 2013 2012 2011 2010 2008 2007 2005 2004 Other

All Journal Article Presentation

  • [Journal Article] Quantum Collision Resistance of Double-Block-Length Hashing2024

    • Author(s)
      Shoichi Hirose and Hidenori Kuwakado
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: Vol.E107-A,No.9

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-22K11914
  • [Journal Article] A Note on Quantum Collision Resistance of Double-Block-Length Compression Functions2021

    • Author(s)
      Shoichi Hirose and Hidenori Kuwakado
    • Journal Title

      The 18th IMA International Conference on Cryptography and Coding, (IMACC 2021), Lecture Notes in Computer Science

      Volume: 13129 Pages: 161-175

    • DOI

      10.1007/978-3-030-92641-0_8

    • ISBN
      9783030926403, 9783030926410
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20K21798
  • [Journal Article] White-Box Encryption Scheme Using a Quantum Memory2021

    • Author(s)
      Hidenori Kuwakado and Shoichi Hirose and Masahiro Mambo
    • Journal Title

      Cryptology ePrint Archive

      Volume: 589 Pages: 1-16

    • Open Access
    • Data Source
      KAKENHI-PROJECT-20K21798
  • [Journal Article] A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications2018

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E101.A Issue: 1 Pages: 110-118

    • DOI

      10.1587/transfun.E101.A.110

    • NAID

      130006300810

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Journal Article] Secret Sharing Schemes Using Modulo-2^{m} Arithmetic Operations2018

    • Author(s)
      Hidenori Kuwakado
    • Journal Title

      The 2018 IEEE Conference on Dependable and Secure Computing

      Volume: - Pages: 1-7

    • DOI

      10.1109/desec.2018.8625126

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H03241
  • [Journal Article] Message Preprocessing for MD Hash Functions2016

    • Author(s)
      Hidenori Kuwakado, Shoichi Hirose
    • Journal Title

      IEICE Technical Report

      Volume: 115 Pages: 89-93

    • Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-25330152
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-2562016

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E99.A Issue: 1 Pages: 14-21

    • DOI

      10.1587/transfun.E99.A.14

    • NAID

      130005115228

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189, KAKENHI-PROJECT-25330150
  • [Journal Article] Arithmetic in a Prime Field of SWIFFT/SWIFFTX2015

    • Author(s)
      Hidenori Kuwakado
    • Journal Title

      IEICE Technical Report

      Volume: 114 Pages: 149-152

    • NAID

      110010017752

    • Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-25330152
  • [Journal Article] Multilane Hashing Mode Suitable for Parallel Processing2013

    • Author(s)
      Hidenori Kuwakado
    • Journal Title

      Proceedings of 2013 Symposium on Cryptography and Information Security

      Volume: なし

    • NAID

      130003385293

    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Security on the Quantum-type Even-Mansour Cipher2012

    • Author(s)
      H.Kuwakadoand M.Morii
    • Journal Title

      Proc. of the 2012 International Symposium on Information Theory and its Applications

      Pages: 312-316

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing2012

    • Author(s)
      S.Hirose, H.Kuwakado, and H.Yoshida
    • Journal Title

      Information Security and Cryptology - ICISC 2011, Lecture Notes in Computer Science

      Volume: vol.7259 Pages: 346-364

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Security on the Quantum-type Even-Mansour Cipher2012

    • Author(s)
      Hidenori Kuwakado
    • Journal Title

      Proceedings of 2012 International Symposium on Information Theory and its Applications

      Volume: なし Pages: 312-316

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Sponge Construction Using Multiple Primitives2012

    • Author(s)
      H.Kuwakado and S.Hirose
    • Journal Title

      Proceedings of The 2012 Symposium on Cryptography and Information Security

      Volume: 1C1-5

    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] odel of Blockcipher-Based Hash Functions Suitable for Memory-Constrained Devices2011

    • Author(s)
      S.Hirose, H.Kuwakado, H.Yoshida
    • Journal Title

      roceedings of The 2011 Symposium on Cryptography and Information Security

      Volume: (Web)

    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Model of Blockcipher-Based Hash Functions Suitable for Memory-Constrained Devices2011

    • Author(s)
      S.Hirose, H.Kuwakado, and H.Yoshida
    • Journal Title

      Proceedings of The 2011 Symposium on Cryptography and Information Security

      Volume: 4B1-1

    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing2011

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida
    • Journal Title

      Preproceedings of the 14 the Annual Internationa 1 Conference on Information Security and Cryptography

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Related-Key Cube Attack on KATAN482011

    • Author(s)
      H.Kuwakadoand S.Hirose
    • Journal Title

      電子情報通信学会 2011 年ソサエティ大会講演論文集

    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Related-Key Cube Attack on KATAN482011

    • Author(s)
      Hidenori Kuwakado, Shoichi Hirose
    • Journal Title

      電子情報通信学会2011年ソサエティ大会講演論文集

      Pages: 167-167

    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] A Lightweight 256-bit Hash Function for Hardware and Low-end Devices: Lesamnta-LW2011

    • Author(s)
      S.Hirose, K.Ideguchi, H.Kuwakado, T.Owada, B.Preneel, and H.Yoshida
    • Journal Title

      Proceedings of the 13th Annual International Conference on Information Security and Cryptology, ICISC 2010, Lecture Notes in Computer Science

      Volume: vol.6584 Pages: 151-168

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Quantum Distinguisher Between the 3-Round Feistel Cipher and the Random Permutation2010

    • Author(s)
      H.Kuwakado, M.Morii
    • Journal Title

      Proceedings of the 2011 IEEE International Symposium on Information Theory

      Pages: 2682-2685

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Improved Bitslice Network for Computing the TIB3 S-Box2010

    • Author(s)
      桑門秀典, 森井昌克
    • Journal Title

      電子情報通信学会2010総合大会講演論文集

      Pages: 130-130

    • Data Source
      KAKENHI-PROJECT-19560384
  • [Journal Article] Distinguishing Attack and Key-Recovery Attack on the 3-Round Feistel Cipher2010

    • Author(s)
      H.Kuwakado, M.Morii
    • Journal Title

      Proceedings of the 2010 Symposium on Information Theory and its Applications

      Pages: 208-213

    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Quantum Key Search on the Even-Mansour Cipher2010

    • Author(s)
      H.Kuwakado, M.Morii
    • Journal Title

      Proceedings the 22th Quantum Information Technology Symposium

      Pages: 17-22

    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Quantum Key Search on the Even-Mansour Cipher2010

    • Author(s)
      H.Kuwakado and M.Morii
    • Journal Title

      Proceedings the 22th Quantum Information Technology Symposium

      Pages: 17-22

    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Distinguishing Attack and Key-Recovery Attack on the 3-Round Feistel Cipher2010

    • Author(s)
      H.Kuwakado and M.Morii
    • Journal Title

      Proceedings of the 2010 Symposium on Information Theory and its Applications

      Pages: 208-213

    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] S-Box Bitslice Networks as Network Computing2010

    • Author(s)
      桑門秀典, 森井昌克
    • Journal Title

      電子情報通信学会技術研究報告 vol.109

      Pages: 35-38

    • NAID

      110008000407

    • Data Source
      KAKENHI-PROJECT-19560384
  • [Journal Article] S-Box Bitslice Networks as Network Computing2010

    • Author(s)
      桑門秀典
    • Journal Title

      電子情報通信学会技術研究報告 IEICE-109

      Pages: 35-38

    • NAID

      110008000407

    • Data Source
      KAKENHI-PROJECT-19560384
  • [Journal Article] A Lightweight 256-bit Hash Function for Hardware and Low-end Devices : Lesamnta-LW2010

    • Author(s)
      S.Hirose, K.Ideguchi, H.Kuwakado, T.Owada, B.Preneel, H.Yoshida
    • Journal Title

      Proceedings of the 13th Annual International Conference on Information Security and Cryptology

      Volume: (Web)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Improved Bitslice Network for Computing the TIB3 S-Box2010

    • Author(s)
      桑門秀典
    • Journal Title

      電子情報通信学会2010総合大会講演論文集

      Pages: 130-130

    • Data Source
      KAKENHI-PROJECT-19560384
  • [Journal Article] Quantum Distinguisher Between the 3-Round Feistel Cipher and the Random Permutation2010

    • Author(s)
      H.Kuwakado and M.Morii
    • Journal Title

      Proceedings of the 2011 IEEE International Symposium on Information Theory

      Pages: 2682-2685

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-22560376
  • [Journal Article] Multi-Bit Revocable Network Coding Scheme For Butterfly-Like Network2008

    • Author(s)
      桑門秀典, 森井昌克
    • Journal Title

      2008 International Symposium on Information Theory and its Applications

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19560384
  • [Journal Article] Conditions for Achieving a Revocable Network Coding Scheme2008

    • Author(s)
      桑門秀典, 森井昌克
    • Journal Title

      電子情報通信学会技術研究報告 vol.107

      Pages: 55-58

    • NAID

      110006885172

    • Data Source
      KAKENHI-PROJECT-19560384
  • [Journal Article] Visual cryptographic protocols using the trusted initializer2005

    • Author(s)
      Hidenori Kuwakado
    • Journal Title

      Lecture Notes in Computer Science 3783巻

      Pages: 112-122

    • Data Source
      KAKENHI-PROJECT-16760300
  • [Journal Article] Visual oblivious transfer using the trusted initializer2005

    • Author(s)
      Hidenori Kuwakado
    • Journal Title

      Proceedings of the Computer Security Symposium 2005 2005巻

      Pages: 625-630

    • Data Source
      KAKENHI-PROJECT-16760300
  • [Journal Article] Invertibility of functions involving circular shift operations and the construction of hash functions2005

    • Author(s)
      Hidenori Kuwakado
    • Journal Title

      Proceedings of the 2004 Symposium on Information Theory and its Applications I巻

      Pages: 53-57

    • NAID

      10016853016

    • Data Source
      KAKENHI-PROJECT-16760300
  • [Journal Article] Size-Reduced Visual Secret Sharing Scheme Scheme and Its Application2004

    • Author(s)
      H.Kuwakado
    • Journal Title

      IEICE Transactions on Fundamentals E87-A,5

      Pages: 1193-1197

    • Data Source
      KAKENHI-PROJECT-16560338
  • [Journal Article] Fail-Stop Signature Scheme Based on the One-Way Permutation2004

    • Author(s)
      H.Kuwakado
    • Journal Title

      Proc. of the 27th Symposium on Information Theory and Its Applications vol.I

      Pages: 111-114

    • NAID

      10014280292

    • Data Source
      KAKENHI-PROJECT-16560338
  • [Journal Article] Signature Scheme Suitable for Related Files2004

    • Author(s)
      Hidenori Kuwakado
    • Journal Title

      Proceedings of the 2004 International Symposium on Information Theory and its Applications

      Pages: 134-139

    • Data Source
      KAKENHI-PROJECT-16760300
  • [Presentation] 同種写像鍵共有法SIDHのCGBNを用いたGPU上の実装2022

    • Author(s)
      李奕慷, 桑門秀典
    • Organizer
      2022年電子情報通信学会ソサイエティ大会
    • Data Source
      KAKENHI-PROJECT-21K11885
  • [Presentation] 同種写像鍵共有法CSIDHのCUDA用多倍長演算ライブラリCGBNを用いた実装2022

    • Author(s)
      李奕慷, 桑門秀典
    • Organizer
      第45回情報理論とその応用シンポジウム
    • Data Source
      KAKENHI-PROJECT-21K11885
  • [Presentation] Parallelizable Message Preprocessing for Merkle-Damgaard Hash Functions2018

    • Author(s)
      Kuwakado Hidenori, Hirose Shoichi and Mambo Masahiro
    • Organizer
      2018 International Symposium on Information Theory and Its Applications
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Application2016

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida
    • Organizer
      NIST Lightweight Cryptography Workshop 2016
    • Place of Presentation
      Gaithersburg (USA)
    • Year and Date
      2016-10-17
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02828
  • [Presentation] Redactable Signature Scheme for Tree-Structured Data Based on Merkle Tree2013

    • Author(s)
      Shoichi Hirose and Hidenori Kuwakado
    • Organizer
      The 10th International Conference on Security and Cryptography (SECRYPT 2013)
    • Place of Presentation
      Reykjavik
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Presentation] Hashing Mode Using a Lightweight Blockcipher2013

    • Author(s)
      Hidenori Kuwakado and Shoichi Hirose
    • Organizer
      The 14th IMA International Conference on Cryptography and Coding (IMACC 2013)
    • Place of Presentation
      Oxford
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Presentation] Conditions for Achieving a Revocable Network Coding Scheme2008

    • Author(s)
      桑門秀典
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      日本 東京都
    • Year and Date
      2008-02-28
    • Data Source
      KAKENHI-PROJECT-19560384
  • [Presentation] Multi-Bit Revocable Network Coding Scheme For Butterfly-Like Network2008

    • Author(s)
      桑門秀典, 森井昌克
    • Organizer
      2008 International Symposium on Information Theory and its Applications
    • Place of Presentation
      New Zealand, Auckland
    • Year and Date
      2008-12-08
    • Data Source
      KAKENHI-PROJECT-19560384
  • [Presentation] Indifferentiable Double-Block-Length Compression Function2007

    • Author(s)
      桑門秀典
    • Organizer
      2007 Hawaii and SITA Joint Conference on Information Theory
    • Place of Presentation
      アメリカ合衆国 ハワイ州
    • Year and Date
      2007-05-31
    • Data Source
      KAKENHI-PROJECT-19560384
  • [Presentation] Indifferentiable Double-Block-Length Compression Function2007

    • Author(s)
      桑門秀典
    • Organizer
      2007 Hawaii and SITA Joint Conference on Information Theory
    • Place of Presentation
      アメリカ合衆国ハワイ州
    • Year and Date
      2007-05-31
    • Data Source
      KAKENHI-PROJECT-19560384
  • [Presentation] Forward-Secure Sequential Aggregate Message Authentication Revisited

    • Author(s)
      廣瀬勝一, 桑門秀典
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      函館市
    • Year and Date
      2014-07-03 – 2014-07-04
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Presentation] Forward-Secure Sequential Aggregate Message Authentication Revisited

    • Author(s)
      Shoichi Hirose and Hidenori Kuwakado
    • Organizer
      The 8th International Conference on Provable Security (ProvSec 2014)
    • Place of Presentation
      Hong Kong
    • Year and Date
      2014-10-09 – 2014-10-10
    • Data Source
      KAKENHI-PROJECT-25330150
  • [Presentation] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado and Atsuko Miyaji
    • Organizer
      The 17th International Conference on Information Security and Cryptology (ICISC 2014)
    • Place of Presentation
      Seoul
    • Year and Date
      2014-12-03 – 2014-12-05
    • Data Source
      KAKENHI-PROJECT-25330150
  • 1.  Hirose Shoichi (20228836)
    # of Collaborated Projects: 7 results
    # of Collaborated Products: 11 results
  • 2.  満保 雅浩 (60251972)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 2 results
  • 3.  TANAKA Hatsukazu (80031144)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 4.  栗林 稔 (50346235)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 5.  堀井 康史 (00268335)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 6.  小林 孝史 (90268334)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results

URL: 

Are you sure that you want to link your ORCID iD to your KAKEN Researcher profile?
* This action can be performed only by the researcher himself/herself who is listed on the KAKEN Researcher’s page. Are you sure that this KAKEN Researcher’s page is your page?

この研究者とORCID iDの連携を行いますか?
※ この処理は、研究者本人だけが実行できます。

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi