Kiyomoto, Shinsaku
48  Ergebnisse:
Personensuche X
?
1

Compact Ring Signatures with Post-Quantum Security in Stand..:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
 
?
2

Compact Accountable Ring Signatures in the Plain Model:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
 
?
3

Logarithmic-Size (Linkable) Ring Signatures from Lattice Is..:

, In: Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science,
Khuc, Xuan Thanh ; Ta, Anh The ; Susilo, Willy... - p. 214-241 , 2024
 
?
4

Spherical Gaussian Leftover Hash Lemma via the Rényi Diverg..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
5

Detecting Machine-Translated Paragraphs by Matching Similar..:

, In: Computational Linguistics and Intelligent Text Processing; Lecture Notes in Computer Science,
 
?
6

Influence of Errors on the Evaluation of Text Classificatio..:

, In: Communications in Computer and Information Science; Computer Vision, Imaging and Computer Graphics Theory and Applications,
 
?
7

Trapdoor Sanitizable and Redactable Signatures with Unlinka..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022,
 
?
8

GPU Acceleration of High-Precision Homomorphic Computation ..:

, In: Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography,
 
?
9

Security Inspection Framework and its Application to Use Ca..:

, In: 2022 IEEE 28th International Conference on Engineering, Technology and Innovation (ICE/ITMC) & 31st International Association For Management of Technology (IAMOT) Joint Conference,
 
?
10

Zero-Knowledge Range Arguments for Signed Fractional Number..:

, In: Provable and Practical Security; Lecture Notes in Computer Science,
Dutta, Priyanka ; Duong, Dung Hoang ; Susilo, Willy.. - p. 121-136 , 2022
 
?
11

Efficient Unique Ring Signatures from Lattices:

, In: Computer Security – ESORICS 2022; Lecture Notes in Computer Science,
Nguyen, Tuong Ngoc ; Ta, Anh The ; Le, Huy Quoc... - p. 447-466 , 2022
 
?
12

Hierarchical Identity-based Puncturable Encryption from Lat..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
Dutta, Priyanka ; Jiang, Mei ; Duong, Dung Hoang... - p. 408-422 , 2022
 
?
13

Effects of Explanatory Information on Privacy Policy Summar..:

, In: Communications in Computer and Information Science; Information Systems Security and Privacy,
 
?
14

Efficient Unique Ring Signature for Blockchain Privacy Prot..:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
Ta, Anh The ; Khuc, Thanh Xuan ; Nguyen, Tuong Ngoc... - p. 391-407 , 2021
 
?
15

Single-Trace Side-Channel Analysis on Polynomial-Based MAC ..:

, In: Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science,
Ueno, Rei ; Fukushima, Kazuhide ; Nakano, Yuto.. - p. 43-67 , 2021
 
1-15