Symposium and Misc
M. Abe, M. Ohkubo, T. Mehdi, “Impossibility of Symmetric Structure-Preserving Signatures with Single Verification Equation”, The 2013 Symposium on Cryptography and Information Security (SCIS2013), IEICE, Jan. 2013.
N. Okamae, M. Yoshida, K. Kumojima, M. Abe, M. Ohkubo, T. Fujiwara, "Automated Attack Derivation for Cryptograhpic Problems on Bilinear Groups", The 2011 Symposium on Cryptography and Information Security (SCIS2011), IEICE, Jan. 2011.
M. Ohkubo, M. Abe, “An Efficient Signature for a Message in Group”, The 2010 Symposium on Cryptography and Information Security (SCIS2010), IEICE, Jan. 2010.
M. Ohkubo, M. Abe, “Security of Universally Composable Blind Signatures Revisited”, The 2009 Symposium on Cryptography and Information Security (SCIS2009), IEICE, Jan. 2009
M. Ohkubo, M. Abe, “Similarity between Anonymity in ring Signatures and Security in Public-key Encryption”, The 2007 Symposium on Cryptography and Information Security (SCIS2007), IEICE, Jan. 2007
M. Ohkubo, M. Abe, “Security of Three-Move Blind Signature Schemes Reconsidered”, The 2003 Symposium on Cryptography and Information Security (SCIS2003), 13C-4, IEICE, Jan. 2003
M. Ohkubo, M. Abe, K. Suzuki, S. Tsujii, “Short 1-out-of-n Proofs”, The 2002 Symposium on Cryptography and Information Security (SCIS2002), 4C-4, IEICE, Jan. 2002
M. Ohkubo and M. Abe, “On Public-Key Encryption with Signature in Non-Separable Model”, The 2001 Symposium on Cryptography and Information Security (SCIS 2001), B5, Jan. 2001.
A. Fujioka, M. Abe, M. Ohkubo and F. Hoshino, “An Implementation and an Experiment of a Practical and Secure Voting Scheme", 2000 Symposium on Cryptography and Information Security (SCIS '2000), B23, 2000, (in Japanese)
F. Hoshino and M. Abe, “More efficient Mix-network on Permutation Networks", 2000 Symposium on Cryptography and Information Security (SCIS '2000), B23, 2000, (in Japanese)
M. Abe, M. Ohkubo, A. Fujioka and F. Hoshino, “An Electronic Voting Scheme with Revocable Threshold Blind Signatures", Symposium on Cryptography and Information Security (SCIS '2000), B25, 2000
M. Abe, “Robust Threshold Cramer-Shoup Cryptosystem", 1999 Symposium on Cryptography and Information Security (SCIS '99), T1-1.3, 1999, (in Japanese)
M. Abe, M. Kanda, “A Key Escrow Scheme for Real-Time Monitoring", Symposium on Cryptography and Information Security (SCIS '98), 5.2.D, 1998
M. Abe and J. Camenisch, “Partially blind signatures", In the 1997 Symposium on Cryptography and Information Security (SCIS '97), SCIS97-33D, 1997.
M. Abe and H. Morita, An implementation of public key LSI, The 1995 Symposium on Cryptography and Information Security, (SCIS '95), Jan. 1995.
M. Abe, An LSI implementation technics for public-key schemes, In proceedings of the 1994 IEICE fall conference, A-194. IEICE, Sept. 1994.
M. Abe and H. Morita, Key distribution by software, In proceedings of the 1993 IEICE fall conference, A-202. IEICE, Sept. 1993.
S. Hangai, M. Abe, K. Miyauchi, “On Selecting Parameters for Speaker Recognition", ISITA, pp.213-216 (1991)