Personensuche
X
?
Communications in Computer and Information Science; Mobile Internet Security ,
2
Exploring Leakage Characteristics and Attacks Through Profi..:
, In:
?
Innovative Security Solutions for Information Technology and Communications; Lecture Notes in Computer Science ,
4
Towards Verifying Physical Assumption in Card-Based Cryptog..:
, In:
?
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop ,
6
Few-helping-card Protocols for Some Wider Class of Symmetri..:
, In:
?
Advances in Information and Computer Security; Lecture Notes in Computer Science ,
7
Check Alternating Patterns: A Physical Zero-Knowledge Proof..:
, In:
?
2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW) ,
8
On the Practical Dependency of Fresh Randomness in AES S-bo..:
, In:
?
Progress in Cryptology - AFRICACRYPT 2022; Lecture Notes in Computer Science ,
11
Card-Minimal Protocols for Three-Input Functions with Stand..:
, In:
?
Lecture Notes in Computer Science; Stabilization, Safety, and Security of Distributed Systems ,
12
Card-Based ZKP Protocol for Nurimisaki:
, In:
?
Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop ,
13
Card-based Single-shuffle Protocols for Secure Multiple-inp..:
, In:
?
Lecture Notes in Computer Science; Theoretical Aspects of Computing – ICTAC 2022 ,
14
Card-Minimal Protocols for Symmetric Boolean Functions of M..:
, In:
?
2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW) ,
15