Kiyomoto, Shinsaku
150  Ergebnisse:
Personensuche X
?
1

Compact Accountable Ring Signatures in the Plain Model:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
 
?
2

Logarithmic-Size (Linkable) Ring Signatures from Lattice Is..:

, In: Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science,
Khuc, Xuan Thanh ; Ta, Anh The ; Susilo, Willy... - p. 214-241 , 2024
 
?
3

Compact Ring Signatures with Post-Quantum Security in Stand..:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
 
?
4

Influence of Errors on the Evaluation of Text Classificatio..:

, In: Communications in Computer and Information Science; Computer Vision, Imaging and Computer Graphics Theory and Applications,
 
?
5

Multiparallel MMT: Faster ISD Algorithm Solving High-Dimens..:

NARISADA, Shintaro ; FUKUSHIMA, Kazuhide ; KIYOMOTO, Shinsaku
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E106.A (2023)  3 - p. 241-252 , 2023
 
?
6

Trapdoor Sanitizable and Redactable Signatures with Unlinka..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022,
 
?
7

Detecting Machine-Translated Paragraphs by Matching Similar..:

, In: Computational Linguistics and Intelligent Text Processing; Lecture Notes in Computer Science,
 
?
8

GPU Acceleration of High-Precision Homomorphic Computation ..:

, In: Proceedings of the 11th Workshop on Encrypted Computing & Applied Homomorphic Cryptography,
 
?
9

Spherical Gaussian Leftover Hash Lemma via the Rényi Diverg..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
 
?
10

R-HTDetector: Robust Hardware-Trojan Detection Based on Adv..:

Hasegawa, Kento ; Hidano, Seira ; Nozawa, Kohei..
IEEE Transactions on Computers.  72 (2023)  2 - p. 333-345 , 2023
 
?
11

Erratum: A Compact Digital Signature Scheme Based on the Mo..:

OKADA, Hiroki ; TAKAYASU, Atsushi ; FUKUSHIMA, Kazuhide..
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E105.A (2022)  2 - p. 130_e1-130_e1 , 2022
 
?
12

Security Inspection Framework and its Application to Use Ca..:

, In: 2022 IEEE 28th International Conference on Engineering, Technology and Innovation (ICE/ITMC) & 31st International Association For Management of Technology (IAMOT) Joint Conference,
 
?
13

Hierarchical Identity-based Puncturable Encryption from Lat..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
Dutta, Priyanka ; Jiang, Mei ; Duong, Dung Hoang... - p. 408-422 , 2022
 
?
15

Effects of Explanatory Information on Privacy Policy Summar..:

, In: Communications in Computer and Information Science; Information Systems Security and Privacy,
 
1-15