KOGA Hiroki
- Articles
- A Coding Theorem for Cheating-Detectable (2,2)-Threshold Schemes
古賀 弘樹; 岩本 貢; 山本 博資
IEICE technical report. Information theory/108(472)/pp.143-150, 2009-03 - A Coding Theorem for Cheating-Detectable (2,2)-Threshold Schemes
古賀 弘樹; 岩本 貢; 山本 博資
Technical report of IEICE. ISEC/108(473)/pp.143-150, 2009-03 - Developments of Information-Spectrum Methods and Their Applications to a Secret Sharing Scheme
古賀 弘樹
IEICE technical report. Information theory/109(314)/pp.1-8, 2009-11 - On the Capacity of the AND Anti-Collusion Fingerprinting Codes
古賀 弘樹
IEICE technical report. WBS, Wideband System/109(446)/pp.439-444, 2010-02 - On the Capacity of the AND Anti-Collusion Fingerprinting Codes
古賀 弘樹
IEICE technical report. Information theory/109(444)/pp.439-444, 2010-02 - On the Capacity of the AND Anti-Collusion Fingerprinting Codes
古賀 弘樹
Technical report of IEICE. ISEC/109(445)/pp.439-444, 2010-02 - Source coding using families of universal hash functions
Koga Hiroki
IEEE TRANSACTIONS ON INFORMATION THEORY/53(9)/pp.3226-3233, 2007-09 - Coding theorems on the threshold scheme for a general source
Koga Hiroki
IEEE TRANSACTIONS ON INFORMATION THEORY/54(6)/pp.2658-2677, 2008-06 - Asymptotic properties on codeword lengths of an optimal FV code for general sources
Koga H; Yamamoto H
IEEE TRANSACTIONS ON INFORMATION THEORY/51(4)/pp.1546-1555, 2005-04 - Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels
Koga H; Ueda E
DESIGNS CODES AND CRYPTOGRAPHY/40(1)/pp.81-102, 2006-07
- A Coding Theorem for Cheating-Detectable (2,2)-Threshold Schemes