161 results on '"Yasunaga, Kenji"'
Search Results
2. Improved Bounds for Codes Correcting Insertions and Deletions
3. Rational Broadcast Protocols Against Timid Adversaries
4. Unified View for Notions of Bit Security
5. Perfectly Secure Message Transmission against Rational Adversaries
6. On the List Decodability of Insertions and Deletions
7. Bit Security as Computational Cost for Winning Games with High Probability
8. Error Correction by Structural Simplicity: Correcting Samplable Additive Errors
9. Perfectly Secure Message Transmission Against Independent Rational Adversaries
10. FOREWORD
11. Perfectly Secure Message Transmission Against Rational Timid Adversaries
12. Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes
13. Relations between the Local Weight Distributions of a Linear Block Code, Its Extended Code, and Its Even Weight Subcode
14. Pyrolysis of n-pentane, n-hexane and n-heptane in a single pulse shock tube
15. Error-Correcting Codes Against Chosen-Codeword Attacks
16. An experimental and kinetic modeling study of the pyrolysis and oxidation of n-C3[sbnd]C5 aldehydes in shock tubes
17. Speciation in Shock Tubes
18. Game-Theoretic Security for Bit Commitment
19. Public-Key Encryption with Lazy Parties
20. Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
21. A Game-Theoretic Perspective on Oblivious Transfer
22. Randomness Leakage in the KEM/DEM Framework
23. Weak Oblivious Transfer from Strong One-Way Functions
24. Perfectly Secure Message Transmission Against Rational Adversaries
25. Asymmetric aldol reaction using a very simple primary amine catalyst: divergent stereoselectivity by using 2,6-difluorophenyl moiety
26. Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes
27. A comprehensive experimental and detailed chemical kinetic modelling study of 2,5-dimethylfuran pyrolysis and oxidation
28. One-pot two-step synthesis of alkyl levulinates directly from furfural by combining Ni3Sn2 alloy nanoparticles and montmorillonite K10
29. On the Limitations of Computational Fuzzy Extractors
30. Autoignition behavior of unsaturated hydrocarbons in the low and high temperature regions
31. Shock tube and modeling study of isobutene pyrolysis and oxidation
32. Replacing Probability Distributions in Security Games via Hellinger Distance
33. Simultaneous Observation of Faradaic and Tunneling Current at a Flat Surface Using Tunneling-Current-Based Constant-Distance Scanning Electrochemical Microscopy with a Platinum Nanoelectrode
34. Kinetic and modeling studies on ETBE pyrolysis behind reflected shock waves
35. On correctable errors of binary linear codes
36. Speciation in Shock Tubes
37. Game-Theoretic Security for Bit Commitment
38. Shock-tube and modeling study of ethyl methyl ether pyrolysis and oxidation
39. Determination of the local weight distribution of binary linear block codes
40. Practical Card-Based Protocol for Three-Input Majority
41. On the List Decodability of Insertions and Deletions
42. A Game-Theoretic Perspective on Oblivious Transfer
43. Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
44. Randomness Leakage in the KEM/DEM Framework
45. Weak Oblivious Transfer from Strong One-Way Functions
46. General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction
47. Thermal Decomposition Pathways of Higher Hydrocarbons in the Gas Phase
48. リスク回避型敵対者に対する安全性:ゲーム理論的観点による安全な二者間プロトコル
49. Error Correction by Structural Simplicity: Correcting Samplable Additive Errors
50. Pyrolysis of n-Pentane, Hexane and Heptane at High Temperatures in a Single-Pulse Shock Tube
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.