KOGA Hiroki
- Articles
- AK-1-4 Developments of Information-Spectrum Methods in Communication Systems with Information-Theoretic Security
古賀 弘樹
Proceedings of the Society Conference of IEICE/2008(0)/p.7, 2008-09 - A Unified Approach to Construction of the Complete Complementary Codes Using Sets of Orthogonal Vectors
金 一; 古賀 弘樹; 末廣 直樹
The Transactions of the Institute of Electronics, Information and Communication Engineers. A/92(2)/pp.105-114, 2009-02 - A Coding Theorem for Cheating-Detectable (2,2)-Threshold Schemes
古賀 弘樹; 岩本 貢; 山本 博資
IEICE technical report. Information theory/108(472)/pp.143-150, 2009-03 - A Coding Theorem for Cheating-Detectable (2,2)-Threshold Schemes
古賀 弘樹; 岩本 貢; 山本 博資
Technical report of IEICE. ISEC/108(473)/pp.143-150, 2009-03 - Developments of Information-Spectrum Methods and Their Applications to a Secret Sharing Scheme
古賀 弘樹
IEICE technical report. Information theory/109(314)/pp.1-8, 2009-11 - On the Capacity of the AND Anti-Collusion Fingerprinting Codes
古賀 弘樹
IEICE technical report. WBS, Wideband System/109(446)/pp.439-444, 2010-02 - On the Capacity of the AND Anti-Collusion Fingerprinting Codes
古賀 弘樹
IEICE technical report. Information theory/109(444)/pp.439-444, 2010-02 - On the Capacity of the AND Anti-Collusion Fingerprinting Codes
古賀 弘樹
Technical report of IEICE. ISEC/109(445)/pp.439-444, 2010-02 - Source coding using families of universal hash functions
Koga Hiroki
IEEE TRANSACTIONS ON INFORMATION THEORY/53(9)/pp.3226-3233, 2007-09 - Coding theorems on the threshold scheme for a general source
Koga Hiroki
IEEE TRANSACTIONS ON INFORMATION THEORY/54(6)/pp.2658-2677, 2008-06 - Asymptotic properties on codeword lengths of an optimal FV code for general sources
Koga H; Yamamoto H
IEEE TRANSACTIONS ON INFORMATION THEORY/51(4)/pp.1546-1555, 2005-04 - Basic properties of the (t, n)-threshold visual secret sharing scheme with perfect reconstruction of black pixels
Koga H; Ueda E
DESIGNS CODES AND CRYPTOGRAPHY/40(1)/pp.81-102, 2006-07
- AK-1-4 Developments of Information-Spectrum Methods in Communication Systems with Information-Theoretic Security