• Publications
  • Influence
An efficient key distribution scheme with self-healing property
TLDR
In this paper, we propose a new self-healing key distribution scheme, which is optimal in terms of user memory storage and more efficient in terms the communication complexity than the previous results. Expand
  • 71
  • 21
Security problem on arbitrated quantum signature schemes
Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantageExpand
  • 74
  • 5
  • PDF
Constructing PEKS schemes secure against keyword guessing attacks is possible?
TLDR
We show that constructing secure and consistent PEKS schemes against keyword guessing attacks is impossible, when the number of possible keywords is bounded by some polynomial. Expand
  • 99
  • 4
New efficient bit-parallel polynomial basis multiplier for special pentanomials
TLDR
We present a bit-parallel polynomial basis multiplier based on a new divide-and-conquer approach using squaring that has the lowest time complexity and about 25% reduced space complexity than the best known multipliers. Expand
  • 10
  • 4
Constant-Round Password-Based Group Key Generation for Multi-layer Ad-Hoc Networks
TLDR
In this paper, we consider a multi-layer mobile ad-hoc network (MANET) composed of several kinds of networking units (such as ground soldiers, tanks, and unmanned aerial vehicles) with heterogeneous resources to communicate and compute. Expand
  • 18
  • 3
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI
TLDR
We examine the security of block ciphers on the view point of pseudorandomness. Expand
  • 20
  • 3
The Related-Key Rectangle Attack - Application to SHACAL-1
TLDR
We combine the rectangle attack with the related-key attack to attack the SHACAL-1 cipher. Expand
  • 74
  • 2
Low complexity bit-parallel multiplier for GF(2/sup m/) defined by all-one polynomials using redundant representation
TLDR
This paper presents a new bit-parallel multiplier for the finite field GF(2/sup m/) defined by an irreducible all-one polynomial. Expand
  • 42
  • 2
Forensic Data Acquisition from Cell Phones using JTAG Interface
TLDR
A method of improving the freeze/thaw stability of an anionically stabilized silicone emulsion useful as a sealant, has been developed. Expand
  • 11
  • 2
A Concrete Security Analysis for 3GPP-MAC
TLDR
We prove that f9 is a secure pseudorandom function by giving a concrete bound on an adversary’s inability to forge a MAC value in terms of her inability to distinguish the underlying block cipher from a random permutation. Expand
  • 11
  • 2
  • PDF