BibTeX records: Yuichi Kaji

download as .bib file

@article{DBLP:journals/ieiceta/Kaji24,
  author       = {Yuichi Kaji},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {107},
  number       = {3},
  pages        = {359},
  year         = {2024},
  url          = {https://doi.org/10.1587/transfun.2023taf0001},
  doi          = {10.1587/TRANSFUN.2023TAF0001},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/Kaji24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/HirataK23,
  author       = {Tomonori Hirata and
                  Yuichi Kaji},
  title        = {Information Leakage Through Passive Timing Attacks on {RSA} Decryption
                  System},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {3},
  pages        = {406--413},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022tap0006},
  doi          = {10.1587/TRANSFUN.2022TAP0006},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/HirataK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/HondaK23,
  author       = {Motonari Honda and
                  Yuichi Kaji},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Improvement of Winternitz {OTS} with a Novel Fingerprinting Function},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {303--311},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012049100003555},
  doi          = {10.5220/0012049100003555},
  timestamp    = {Mon, 31 Jul 2023 15:34:21 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/HondaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/HirataK20,
  author       = {Tomonori Hirata and
                  Yuichi Kaji},
  title        = {Information leakage through passive timing attacks on {RSA} decryption
                  system},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020},
  pages        = {392--396},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/9366110},
  timestamp    = {Mon, 22 Mar 2021 15:48:59 +0100},
  biburl       = {https://dblp.org/rec/conf/isita/HirataK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MomoseCK20,
  author       = {Atsuki Momose and
                  Jason Paul Cruz and
                  Yuichi Kaji},
  title        = {Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal
                  Latency or Resilience},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MomoseCK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/CruzKY18,
  author       = {Jason Paul Cruz and
                  Yuichi Kaji and
                  Naoto Yanai},
  title        = {{RBAC-SC:} Role-Based Access Control Using Smart Contract},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {12240--12251},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2812844},
  doi          = {10.1109/ACCESS.2018.2812844},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/CruzKY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jssc/TakahashiKTFHYW18,
  author       = {Tomohiro Takahashi and
                  Yuichi Kaji and
                  Yasunori Tsukuda and
                  Shinichiro Futami and
                  Katsuhiko Hanzawa and
                  Takahito Yamauchi and
                  Ping Wah Wong and
                  Frederick T. Brady and
                  Phil Holden and
                  Thomas Ayers and
                  Kyohei Mizuta and
                  Susumu Ohki and
                  Keiji Tatani and
                  Hayato Wakabayashi and
                  Yoshikazu Nitta},
  title        = {A Stacked {CMOS} Image Sensor With Array-Parallel {ADC} Architecture},
  journal      = {{IEEE} J. Solid State Circuits},
  volume       = {53},
  number       = {4},
  pages        = {1061--1070},
  year         = {2018},
  url          = {https://doi.org/10.1109/JSSC.2017.2784759},
  doi          = {10.1109/JSSC.2017.2784759},
  timestamp    = {Sun, 30 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jssc/TakahashiKTFHYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KajiCY18,
  author       = {Yuichi Kaji and
                  Jason Paul Cruz and
                  Yoshio Yatani},
  editor       = {Pierangela Samarati and
                  Mohammad S. Obaidat},
  title        = {Hash-Based Signature with Constant-Sum Fingerprinting and Partial
                  Construction of Hash Chains},
  booktitle    = {Proceedings of the 15th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2018 - Volume 2: SECRYPT, Porto, Portugal,
                  July 26-28, 2018},
  pages        = {463--470},
  publisher    = {SciTePress},
  year         = {2018},
  url          = {https://doi.org/10.5220/0006828204630470},
  doi          = {10.5220/0006828204630470},
  timestamp    = {Wed, 29 Aug 2018 15:17:20 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KajiCY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakedaKI16,
  author       = {Yuki Takeda and
                  Yuichi Kaji and
                  Minoru Ito},
  title        = {On the Computational Complexity of the Linear Solvability of Information
                  Flow Problems with Hierarchy Constraint},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {12},
  pages        = {2211--2217},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.2211},
  doi          = {10.1587/TRANSFUN.E99.A.2211},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TakedaKI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/Kaji16,
  author       = {Yuichi Kaji},
  title        = {Converging bounds of the entropy of multinomial distributions},
  booktitle    = {2016 International Symposium on Information Theory and Its Applications,
                  {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  pages        = {433--437},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7840461/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/Kaji16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/CruzYK16,
  author       = {Jason Paul Cruz and
                  Yoshio Yatani and
                  Yuichi Kaji},
  title        = {Constant-sum fingerprinting for Winternitz one-time signature},
  booktitle    = {2016 International Symposium on Information Theory and Its Applications,
                  {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  pages        = {703--707},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7840516/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/CruzYK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imt/Kaji15,
  author       = {Yuichi Kaji},
  title        = {Performance Evaluation of Index-less Indexed Flash Codes for Non-uniform
                  Write Operations},
  journal      = {Inf. Media Technol.},
  volume       = {10},
  number       = {2},
  pages        = {204--209},
  year         = {2015},
  url          = {https://doi.org/10.11185/imt.10.204},
  doi          = {10.11185/IMT.10.204},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imt/Kaji15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/allerton/TakedaKI15,
  author       = {Yuki Takeda and
                  Yuichi Kaji and
                  Minoru Ito},
  title        = {On the computational complexity of the solvability of information
                  flow problem with hierarchy constraint},
  booktitle    = {53rd Annual Allerton Conference on Communication, Control, and Computing,
                  Allerton 2015, Allerton Park {\&} Retreat Center, Monticello,
                  IL, USA, September 29 - October 2, 2015},
  pages        = {1205--1210},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ALLERTON.2015.7447145},
  doi          = {10.1109/ALLERTON.2015.7447145},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/allerton/TakedaKI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Kaji15,
  author       = {Yuichi Kaji},
  title        = {Bounds on the entropy of multinomial distribution},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2015,
                  Hong Kong, China, June 14-19, 2015},
  pages        = {1362--1366},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ISIT.2015.7282678},
  doi          = {10.1109/ISIT.2015.7282678},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/Kaji15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/KobayashiKS14,
  author       = {Yasuyuki Kobayashi and
                  Yuichi Kaji and
                  Hiroyuki Seki},
  title        = {Information theoretical evaluation of the bucketing technique to mitigate
                  timing attacks},
  booktitle    = {International Symposium on Information Theory and its Applications,
                  {ISITA} 2014, Melbourne, Australia, October 26-29, 2014},
  pages        = {561--565},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/6979906/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/KobayashiKS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/KumagaiK14,
  author       = {Kazuki Kumagai and
                  Yuichi Kaji},
  title        = {A flash code utilizing dynamic segment allocation},
  booktitle    = {International Symposium on Information Theory and its Applications,
                  {ISITA} 2014, Melbourne, Australia, October 26-29, 2014},
  pages        = {605--609},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/6979915/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/KumagaiK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TanK13,
  author       = {Michael Joseph Tan and
                  Yuichi Kaji},
  title        = {Flash Code Utilizing Binary-Indexed Slice Encoding and Resizable-Clusters},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {12},
  pages        = {2360--2367},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.2360},
  doi          = {10.1587/TRANSFUN.E96.A.2360},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TanK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eit/TanK13,
  author       = {Michael Joseph Tan and
                  Yuichi Kaji},
  title        = {Flash code utilizing resizable-clusters},
  booktitle    = {{IEEE} International Conference on Electro-Information Technology
                  , {EIT} 2013, Rapid City, SD, USA, May 9-11, 2013},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/EIT.2013.6632646},
  doi          = {10.1109/EIT.2013.6632646},
  timestamp    = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl       = {https://dblp.org/rec/conf/eit/TanK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Kaji12,
  author       = {Yuichi Kaji},
  title        = {The Expected Write Deficiency of Index-Less Indexed Flash Codes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {12},
  pages        = {2130--2138},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.2130},
  doi          = {10.1587/TRANSFUN.E95.A.2130},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Kaji12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imt/MejiaKS12,
  author       = {Ramon Francisco Pacquiao Mejia and
                  Yuichi Kaji and
                  Hiroyuki Seki},
  title        = {Error Control for High-density Monochrome Two-dimensional Barcodes},
  journal      = {Inf. Media Technol.},
  volume       = {7},
  number       = {3},
  pages        = {1136--1144},
  year         = {2012},
  url          = {https://doi.org/10.11185/imt.7.1136},
  doi          = {10.11185/IMT.7.1136},
  timestamp    = {Sat, 31 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imt/MejiaKS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/NagaharaK12,
  author       = {Hiroyuki Nagahara and
                  Yuichi Kaji},
  title        = {Index-less flash codes with arbitrary small slices},
  booktitle    = {Proceedings of the International Symposium on Information Theory and
                  its Applications, {ISITA} 2012, Honolulu, HI, USA, October 28-31,
                  2012},
  pages        = {106--110},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6400895/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/NagaharaK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MejiaKS11,
  author       = {Ramon Francisco Pacquiao Mejia and
                  Yuichi Kaji and
                  Hiroyuki Seki},
  editor       = {Yan Chen and
                  George Danezis and
                  Vitaly Shmatikov},
  title        = {Poster: trans-organizational role-based access control},
  booktitle    = {Proceedings of the 18th {ACM} Conference on Computer and Communications
                  Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages        = {817--820},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://dl.acm.org/citation.cfm?id=2093501},
  timestamp    = {Tue, 10 Nov 2020 19:56:39 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MejiaKS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/Kaji11,
  author       = {Yuichi Kaji},
  title        = {The expected write deficiency of index-less flash codes and their
                  improvement},
  booktitle    = {2011 {IEEE} Information Theory Workshop, {ITW} 2011, Paraty, Brazil,
                  October 16-20, 2011},
  pages        = {35--39},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ITW.2011.6089479},
  doi          = {10.1109/ITW.2011.6089479},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/Kaji11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Kaji10,
  author       = {Yuichi Kaji},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {2},
  pages        = {207},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.207},
  doi          = {10.1587/TRANSINF.E93.D.207},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Kaji10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/ZhaoK10,
  author       = {Kai Zhao and
                  Yuichi Kaji},
  title        = {Anti-phishing mutual authentication using the visual secret sharing
                  scheme},
  booktitle    = {Proceedings of the International Symposium on Information Theory and
                  its Applications, {ISITA} 2010, 17-20 October 2010, Taichung, Taiwan},
  pages        = {560--565},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISITA.2010.5649733},
  doi          = {10.1109/ISITA.2010.5649733},
  timestamp    = {Wed, 11 Aug 2021 11:51:25 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/ZhaoK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lata/YoshinakaKS10,
  author       = {Ryo Yoshinaka and
                  Yuichi Kaji and
                  Hiroyuki Seki},
  editor       = {Adrian{-}Horia Dediu and
                  Henning Fernau and
                  Carlos Mart{\'{\i}}n{-}Vide},
  title        = {Chomsky-Sch{\"{u}}tzenberger-Type Characterization of Multiple
                  Context-Free Languages},
  booktitle    = {Language and Automata Theory and Applications, 4th International Conference,
                  {LATA} 2010, Trier, Germany, May 24-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6031},
  pages        = {596--607},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13089-2\_50},
  doi          = {10.1007/978-3-642-13089-2\_50},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/lata/YoshinakaKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/Kaji09,
  author       = {Yuichi Kaji},
  title        = {On the number of minimum weight codewords of {SFA-LDPC} codes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2009,
                  June 28 - July 3, 2009, Seoul, Korea, Proceedings},
  pages        = {70--74},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISIT.2009.5205673},
  doi          = {10.1109/ISIT.2009.5205673},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/Kaji09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MohriMK08,
  author       = {Hisashi Mohri and
                  Ritsuko Matsumoto and
                  Yuichi Kaji},
  title        = {Key Predistribution Schemes for Sensor Networks Using Finite Plane
                  Geometry},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {91-D},
  number       = {5},
  pages        = {1416--1423},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietisy/e91-d.5.1416},
  doi          = {10.1093/IETISY/E91-D.5.1416},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MohriMK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SugiyamaK08,
  author       = {Kenji Sugiyama and
                  Yuichi Kaji},
  title        = {On the Minimum Weight of Simple Full-Length Array {LDPC} Codes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {6},
  pages        = {1502--1508},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.6.1502},
  doi          = {10.1093/IETFEC/E91-A.6.1502},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SugiyamaK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ArimaTKK07,
  author       = {Satoshi Arima and
                  Takuji Tachibana and
                  Yuichi Kaji and
                  Shoji Kasahara},
  title        = {FEC-Based Reliable Transmission for Multiple Bursts in {OBS} Networks},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {90-B},
  number       = {12},
  pages        = {3541--3551},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietcom/e90-b.12.3541},
  doi          = {10.1093/IETCOM/E90-B.12.3541},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ArimaTKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/SugiyamaK07,
  author       = {Kenji Sugiyama and
                  Yuichi Kaji},
  title        = {On the minimum weight of simple full-length array {LDPC} codes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2007,
                  Nice, France, June 24-29, 2007},
  pages        = {746--750},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/ISIT.2007.4557314},
  doi          = {10.1109/ISIT.2007.4557314},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/SugiyamaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Kaji06,
  author       = {Yuichi Kaji},
  title        = {Encoding {LDPC} Codes Using the Triangular Factorization},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {10},
  pages        = {2510--2518},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.10.2510},
  doi          = {10.1093/IETFEC/E89-A.10.2510},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Kaji06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NojimaK05,
  author       = {Ryo Nojima and
                  Yuichi Kaji},
  title        = {Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree
                  Method},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {189--194},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_189\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NojimaK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NojimaK05a,
  author       = {Ryo Nojima and
                  Yuichi Kaji},
  title        = {Using Trapdoor Permutations in a Complete Subtree Method for Broadcast
                  Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {2},
  pages        = {568--574},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_2\_568\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NojimaK05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/IkegamiK03,
  author       = {Daisuke Ikegami and
                  Yuichi Kaji},
  title        = {Maximum Likelihood Decoding for Linear Block Codes Using Grobner Bases},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {86-A},
  number       = {3},
  pages        = {643--651},
  year         = {2003},
  url          = {http://search.ieice.org/bin/summary.php?id=e86-a\_3\_643},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/IkegamiK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/IshidaK03,
  author       = {Toshiyuki Ishida and
                  Yuichi Kaji},
  title        = {A Call-by-Need Recursive Algorithm for the LogMAP Decoding of a Binary
                  Linear Block Code},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {86-A},
  number       = {12},
  pages        = {3306--3309},
  year         = {2003},
  url          = {http://search.ieice.org/bin/summary.php?id=e86-a\_12\_3306},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/IshidaK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/SekiTFK02,
  author       = {Hiroyuki Seki and
                  Toshinori Takai and
                  Youhei Fujinaka and
                  Yuichi Kaji},
  editor       = {Sophie Tison},
  title        = {Layered Transducing Term Rewriting System and Its Recognizability
                  Preserving Property},
  booktitle    = {Rewriting Techniques and Applications, 13th International Conference,
                  {RTA} 2002, Copenhagen, Denmark, July 22-24, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2378},
  pages        = {98--113},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45610-4\_8},
  doi          = {10.1007/3-540-45610-4\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/SekiTFK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/KasamiTK01,
  author       = {Tadao Kasami and
                  Hitoshi Tokushige and
                  Yuichi Kaji},
  editor       = {Serdar Boztas and
                  Igor E. Shparlinski},
  title        = {Sufficient Conditions on Most Likely Local Sub-codewords in Recursive
                  Maximum Likelihood Decoding Algorithms},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  14th International Symposium, AAECC-14, Melbourne, Australia November
                  26-30, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2227},
  pages        = {333--342},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45624-4\_35},
  doi          = {10.1007/3-540-45624-4\_35},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/KasamiTK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rta/TakaiKS00,
  author       = {Toshinori Takai and
                  Yuichi Kaji and
                  Hiroyuki Seki},
  editor       = {Leo Bachmair},
  title        = {Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively
                  Preserve Recognizability},
  booktitle    = {Rewriting Techniques and Applications, 11th International Conference,
                  {RTA} 2000, Norwich, UK, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1833},
  pages        = {246--260},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10721975\_17},
  doi          = {10.1007/10721975\_17},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/rta/TakaiKS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsc/KajiFK97,
  author       = {Yuichi Kaji and
                  Toru Fujiwara and
                  Tadao Kasami},
  title        = {Solving a Unification Problem under Constrained Substitutions Using
                  Tree Automata},
  journal      = {J. Symb. Comput.},
  volume       = {23},
  number       = {1},
  pages        = {79--117},
  year         = {1997},
  url          = {https://doi.org/10.1006/jsco.1996.0077},
  doi          = {10.1006/JSCO.1996.0077},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsc/KajiFK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/KajiNSK94,
  author       = {Yuichi Kaji and
                  Ryuchi Nakanishi and
                  Hiroyuki Seki and
                  Tadao Kasami},
  title        = {The Computational Complexity of the Universal Recognition Problem
                  for Parallel Multiple Context-Free Grammars},
  journal      = {Comput. Intell.},
  volume       = {10},
  pages        = {440--452},
  year         = {1994},
  url          = {https://doi.org/10.1111/j.1467-8640.1994.tb00008.x},
  doi          = {10.1111/J.1467-8640.1994.TB00008.X},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ci/KajiNSK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fsttcs/KajiFK94,
  author       = {Yuichi Kaji and
                  Toru Fujiwara and
                  Tadao Kasami},
  editor       = {P. S. Thiagarajan},
  title        = {Solving a Unification Problem under Constrained Substitutions Using
                  Tree Automata},
  booktitle    = {Foundations of Software Technology and Theoretical Computer Science,
                  14th Conference, Madras, India, December 15-17, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {880},
  pages        = {276--287},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-58715-2\_131},
  doi          = {10.1007/3-540-58715-2\_131},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/fsttcs/KajiFK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/SekiNKAK93,
  author       = {Hiroyuki Seki and
                  Ryuichi Nakanishi and
                  Yuichi Kaji and
                  Sachiko Ando and
                  Tadao Kasami},
  editor       = {Lenhart K. Schubert},
  title        = {Parallel Multiple Context-Free Grammars, Finite-State Translation
                  Systems, and Polynomial-Time Recognizable Subclasses of Lexical-Functional
                  Grammars},
  booktitle    = {31st Annual Meeting of the Association for Computational Linguistics,
                  22-26 June 1993, Ohio State University, Columbus, Ohio, USA, Proceedings},
  pages        = {130--139},
  publisher    = {{ACL}},
  year         = {1993},
  url          = {https://aclanthology.org/P93-1018/},
  doi          = {10.3115/981574.981592},
  timestamp    = {Fri, 06 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/SekiNKAK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}