Miyahara, Daiki
113  Ergebnisse:
Personensuche X
?
2

Exploring Leakage Characteristics and Attacks Through Profi..:

, In: Communications in Computer and Information Science; Mobile Internet Security,
 
?
3

ZKP Protocols for Usowan, Herugolf, and Five Cells:

Miyahara, Daiki ; Robert, Léo ; Lafourcade, Pascal.
Tsinghua Science and Technology.  29 (2024)  6 - p. 1651-1666 , 2024
 
?
4

Towards Verifying Physical Assumption in Card-Based Cryptog..:

, In: Innovative Security Solutions for Information Technology and Communications; Lecture Notes in Computer Science,
 
?
5

Software Evaluation for Second Round Candidates in NIST Lig..:

Hira, Ryota ; Kitahara, Tomoaki ; Miyahara, Daiki...
Journal of Information Processing.  31 (2023)  0 - p. 205-219 , 2023
 
?
6

Few-helping-card Protocols for Some Wider Class of Symmetri..:

, In: Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop,
 
?
7

Check Alternating Patterns: A Physical Zero-Knowledge Proof..:

, In: Advances in Information and Computer Security; Lecture Notes in Computer Science,
Hand, Samuel ; Koch, Alexander ; Lafourcade, Pascal.. - p. 255-272 , 2023
 
?
8

On the Practical Dependency of Fresh Randomness in AES S-bo..:

, In: 2023 Eleventh International Symposium on Computing and Networking Workshops (CANDARW),
Tsukahara, Maki ; Hirata, Haruka ; Yang, Mingyu... - p. 286-291 , 2023
 
?
 
?
10

All You Need Is Fault: Zero-Value Attacks on AES and a New ..:

Hirata, Haruka ; Miyahara, Daiki ; Arribas, Victor...
IACR Transactions on Cryptographic Hardware and Embedded Systems.  2024 (2023)  1 - p. 133-156 , 2023
 
?
11

Card-Minimal Protocols for Three-Input Functions with Stand..:

, In: Progress in Cryptology - AFRICACRYPT 2022; Lecture Notes in Computer Science,
Haga, Rikuo ; Hayashi, Yuichi ; Miyahara, Daiki. - p. 448-468 , 2022
 
?
12

Card-Based ZKP Protocol for Nurimisaki:

, In: Lecture Notes in Computer Science; Stabilization, Safety, and Security of Distributed Systems,
 
?
13

Card-based Single-shuffle Protocols for Secure Multiple-inp..:

, In: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop,
 
?
14

Card-Minimal Protocols for Symmetric Boolean Functions of M..:

, In: Lecture Notes in Computer Science; Theoretical Aspects of Computing – ICTAC 2022,
Shikata, Hayato ; Toyoda, Kodai ; Miyahara, Daiki. - p. 388-406 , 2022
 
?
15

Optimized Software Implementations of Ascon, Grain-128AEAD,..:

, In: 2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW),
Kitahara, Tomoaki ; Hira, Ryota ; Hara-Azumi, Yuko... - p. 316-322 , 2022
 
1-15