Koga Hiroki

Researcher's full information

Articles
  • Construction of a Strongly Secure Ramp Secret Sharing Scheme Using the MRD Code and Analysis of its Security
    本庄 俊太郎; 古賀 弘樹; 坂下 光輝
    IEICE technical report. Information theory/113(483)/pp.201-207, 2014-03
  • Coding Theorems for Shannon's Cipher System under Two New Secrecy Criteria
    菊池 駿; 古賀 弘樹
    IEICE technical report. Information theory/113(483)/pp.261-268, 2014-03
  • On the relationship between the redundancy and the coding rate of FF codes
    有村 光晴; 古賀 弘樹; 岩田 賢一
    IEICE technical report. Information theory/112(58)/pp.7-12, 2012-05
  • A Secret Sharing Scheme Based on a Two-Dementional Code with Decodability by Mobile Phones
    本庄 俊太郎; 古賀 弘樹
    IEICE technical report. Information theory/112(58)/pp.35-40, 2012-05
  • A Tracing Algorithm for the Boneh-Shaw Code under a Probabilistic Attack Model
    金井 紘平; 古賀 弘樹
    IEICE technical report. Information theory/112(124)/pp.7-12, 2012-07
  • On Coding of a Binary Source Based on Source Polarization
    菊池 駿; 古賀 弘樹
    IEICE technical report. Information theory/112(124)/pp.103-108, 2012-07
  • Asymptotic Optimality of Modified Spherical Codes with Scalar Quantizer of Gain for Memoryless Gaussian Source
    Hiroki Koga; Suguru Arimoto
    IEICE Transactions on Fundamentals/E76-A(9)/p.1403-1410, 1993-09
  • On the Asynptotic Behaviors of the Recurcence Time Fidelity Criterian for Discrete Memoryless Sources and Memoryless Gaussian Sources
    Hiroki Koga; Suguru Arimoto
    IEICE Transactions on Fundamentels/E81-A(5)/p.981-986, 1998-06
  • Proposal of a Lattice-Based Visual Seuet Sharing Scheme for Color and Gray-Scale Images (共著)
    Hiroki Koga; Hirosuke Yamamoto
    IEICE Transactions on Fundamentals/E81-A(6)/p.1263-1269, 1998-06
  • Coding Theorem for Secret-Key Authentication Systems
    Hiroki Koga; Hirosuke Yamamoto
    IEICE Trans. on Fundamentals/E83-A(8)/p.1691--703, 2000-08
  • An Analytic Construction of the Visual Secret Sharing Scheme for Color Images
    Hiroki Koga; Mitsugu Iwamoto; Hirosuke Yamamoto
    IEICE Trans. on Fundamentals,/E84-A(1)/p.pp. 262--272, 2001-01
  • A Construction of a Visual Secret Sharing Scheme for Plural Secret Images and its Basic Properties
    Hiroki Koga; Masayuki Miyata
    Proceedings of 2008 International Symposium on Information Theory and its Applications/p.24-29, 2008-12
  • Basic Properties of the Complete Complementary Codes Using DTF Matrices and the Kronecker Products
    Jin Yi; Hiroki Koga
    Proceedings of 2008 International Symposium on Information Theory and its Applications/p.887-892, 2008-12
  • New Coding Theorems for Fixed-Length Source Coding and Shannons's Cipher System with a General Source
    Hiroki Koga
    Proceedings of 2008 International Symposium on Information Theory and its Applications/p.251-256, 2008-12
  • Coding Theorems on the Threshold Scheme for a General Source
    Hiroki Koga
    IEEE Transactions on Information Theory/54(6)/p.2658-2677, 2008-06
  • A Coding Theorem for Cheating-Detectable (2,2)-Threshold Blockwise Secret Sharing Schemes
    M. Iwamoto; H. Yamamoto; H. Koga
    Proc. 2009 IEEE International Symposium on Information Theory/p.1308--1312, 2009-06
  • Coding Theorems for a (2,2)-Threshold Scheme Secure against Impersonation by an Opponent
    H. Koga; M. Iwamoto; H. Yamamoto
    Proc. 2009 IEEE Information Theory Workshop/(1)/p.188--192, 2009-10
  • Two Generalizations of a Coding Theorem for a (2,2)-THreshold Scheme with a Cheater
    Hiroki Koga
    Proceedings of 2010 International Symposium on Information Theory and its Applications/p.678-683, 2010-10
  • A digital Fingerprinting Code Based on a Projective Plane and Its Identifiability of all Malicious Users
    Hiroki Koga; Yusuke Minami
    IEICE Trans. on Fundamentals/E94-A(1)/p.223-232, 2011-01
  • Coding Theorems on the Worst-Case Redundancy of Fixed-Length Coding for a General Source
    Hiroki Koga; Mitsuharu Arimura; Ken-ichi Iwata
    Proceedings of 2011 IEEE International Symposium on Information Theory/p.1434--1438, 2011-01
  • Toward Further Developments in Information Theory
    鎌部 浩; 古賀 弘樹
    IEICE technical report. Information theory/111(329)/pp.25-28, 2011-11
  • AS-2-6 On Construction and Optimality of a (k,n)-Threshold Scheme with Detectability of Impersonation Attacks
    古賀 弘樹
    Proceedings of the IEICE General Conference/2012(0)/pp.S-27-S-28, 2012-03
  • Coding Theorems for a (2,2)-Threshold Scheme With Detectability of Impersonation Attacks
    Iwamoto Mitsugu; Koga Hiroki; Yamamoto Hirosuke
    IEEE TRANSACTIONS ON INFORMATION THEORY/58(9)/pp.6194-6206, 2012-09
  • The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding
    古賀 弘樹; 有村 光晴; 岩田 賢一
    電子情報通信学会技術研究報告. IT, 情報理論/110(442)/pp.93-98, 2011-02
  • A (3, 3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks
    児矢野 和也; 古賀 弘樹
    電子情報通信学会技術研究報告. IT, 情報理論/110(442)/pp.311-318, 2011-02
  • more...