1.
|
2024/11/12
|
Chameleon Hashing Security Enhancement to Hierarchical Identity-Based Identification (ISITA 2024)
|
2.
|
2024/11/12
|
Checkable Key Generation and its Application to Hierarchical Identity-Based Signature (ISITA 2024)
|
3.
|
2024/11/11
|
$k^{m}$-Anonymization Meets Differential Privacy under Sampling (ISITA 2024)
|
4.
|
2024/08/29
|
$Pk$-Anonymization Meets Differential Privacy (PST 2024)
|
5.
|
2023/10/04
|
Making the Identity-Based Diffie--Hellman Key Exchange Efficiently Revocable (LatinCrypt 2023)
|
6.
|
2023/08/22
|
Extended $k^m$-Anonymity for Randomization Applied to Binary Data (PST 2023)
|
7.
|
2022/08/12
|
Toward Solving Pre-image Contest of Keccak[$r=40$, $c=160$, $n_r=2$]: Experiment on Keccak[$r=20$, $c=80$, $n_r=2$] (IWSEC 2022)
|
8.
|
2021/12/01
|
Revocable Hierarchical Identity-Based Authenticated Key Exchange (ICISC 2021)
|
9.
|
2019/10/04
|
One-Round Authenticated Group Key Exchange from Isogenies (ProvSec 2019)
|
10.
|
2019/09/25
|
Strongly Secure Identity-Based Key Exchange with Single Pairing Operation (ESORICS 2019)
|
11.
|
2019/07/17
|
One-Round Authenticated Group Key Exchange from Isogenies (The CJK-SIAMs joint mini-symposium on Mathematical Cryptography, ICIAM 2019)
|
12.
|
2018/11/29
|
Supersingular Isogeny Diffie--Hellman Authenticated Key Exchange (ICISC 2018)
|
13.
|
2018/10/27
|
Single Private-Key Generator Security Implies Multiple Private-Key Generators Security (ProvSec 2018)
|
14.
|
2017/09/01
|
Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators (IWSEC 2017)
|
15.
|
2016/12/02
|
One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key Generators (MyCrypt 2016)
|
16.
|
2016/06/23
|
Generalized Key Substitution Attacks on Message Recovery Signatures (CECC 2016)
|
17.
|
2013/05/08
|
Practical and Post-Quantum Authenticated Key Exchange from One-Way Secure Key Encapsulation Mechanism (ASIACCS 2013)
|
18.
|
2012/12/13
|
Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification (CANS 2012)
|
19.
|
2012/10/30
|
Security Enhancement of Identity-Based Identification with Reversibility (ICICS 2012)
|
20.
|
2012/09/20
|
Secure Hierarchical Identity-Based Identification without Random Oracles (ISC 2012)
|
21.
|
2012/07/09
|
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange (ACISP 2012)
|
22.
|
2012/06/28
|
Security Enhancements by OR-Proof in Identity-Based Identification (ACNS 2012)
|
23.
|
2012/05/23
|
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices (PKC 2012)
|
24.
|
2011/12/02
|
Sufficient Condition for Identity-based Authenticated Key Exchange Resilient to Leakage of Secret Keys (ICISC 2011)
|
25.
|
2011/11/30
|
Strong Security Notions for Timed-Release Public-Key Encryption Revisited (ICISC 2011)
|
26.
|
2011/11/08
|
Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique (IWSEC 2011)
|
27.
|
2011/07/12
|
Generic Construction of Strongly Secure Timed-Release Public-Key Encryption (ACISP 2011)
|
28.
|
2011/02/16
|
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys (CT-RSA 2011)
|
29.
|
2010/12/14
|
Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys (Pairing 2010)
|
30.
|
2010/11/23
|
Hierarchical ID-based Authenticated Key Exchange Resilient to Ephemeral Key Leakage (IWSEC 2010)
|
31.
|
2010/08/24
|
Predicate-based Authenticated Key Exchange Resilient to Ephemeral Key Leakage (WISA 2010)
|
32.
|
2010/08/09
|
Security of Sequential Multiple Encryption (LatinCrypt 2010)
|
33.
|
2009/10/29
|
Strongly Secure Authenticated Key Exchange without NAXOS' Approach (IWSEC 2009)
|
34.
|
2006/08/10
|
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting (SECRYPT 2006)
|
35.
|
1999/11/07
|
An Improvement of a Practical Secret Voting Scheme (ISW '99)
|
36.
|
1992/12/15
|
A Practical Secret Voting Scheme for Large Scale Elections (AusCrypt '92)
|
37.
|
1992/08/17
|
An Efficient Digital Signature Scheme Based on an Elliptic Curve over the Ring $Z_{n}$ (Crypto '92)
|
38.
|
1992/05/27
|
Secure Bit Commitment Function against Divertibility (EuroCrypt '92)
|
39.
|
1991/04/11
|
ESIGN: An Efficient Digital Signature Implementation for Smart Cards (EuroCrypt '91)
|
40.
|
1991/04/09
|
Interactive Bi-Proof Systems and Undeniable Signature Schemes (EuroCrypt '91)
|
41.
|
1990/05/21
|
Provably Secure Key-Updating Schemes in Identity-Based Systems (EuroCrypt '90)
|
42.
|
1986/10/08
|
A Public-Key Cryptosystem Based on the Difficulty of Solving a System of Non-linear Equations (1986 ISIT)
|
5 display
|
All display(42)
|