BibTeX records: Jacob C. N. Schuldt

download as .bib file

@article{DBLP:journals/ieiceta/KojimaSH24,
  author       = {Rikuhiro Kojima and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka},
  title        = {A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme
                  with Key Aggregation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {107},
  number       = {3},
  pages        = {193--202},
  year         = {2024},
  url          = {https://doi.org/10.1587/transfun.2023cip0022},
  doi          = {10.1587/TRANSFUN.2023CIP0022},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/KojimaSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/HayataSHM24,
  author       = {Junichiro Hayata and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Kanta Matsuura},
  title        = {On private information retrieval supporting range queries},
  journal      = {Int. J. Inf. Sec.},
  volume       = {23},
  number       = {1},
  pages        = {629--647},
  year         = {2024},
  url          = {https://doi.org/10.1007/s10207-023-00743-6},
  doi          = {10.1007/S10207-023-00743-6},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/HayataSHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/AttrapadungHHK024,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Ryo Hiromasa and
                  Yoshihiro Koseki and
                  Takahiro Matsuda and
                  Yutaro Nishida and
                  Yusuke Sakai and
                  Jacob C. N. Schuldt and
                  Satoshi Yasuda},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Privacy-Preserving Verifiable CNNs},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14584},
  pages        = {373--402},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54773-7\_15},
  doi          = {10.1007/978-3-031-54773-7\_15},
  timestamp    = {Tue, 05 Mar 2024 11:54:50 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/AttrapadungHHK024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AttrapadungHHMS23,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Ryo Hiromasa and
                  Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  title        = {Maliciously circuit-private multi-key {FHE} and {MPC} based on {LWE}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1645--1684},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01160-x},
  doi          = {10.1007/S10623-022-01160-X},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AttrapadungHHMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/NutaSN23,
  author       = {Seiya Nuta and
                  Jacob C. N. Schuldt and
                  Takashi Nishide},
  title        = {PoS Blockchain-Based Forward-Secure Public Key Encryption with Immutable
                  Keys and Post-Compromise Security Guarantees},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {3},
  pages        = {212--227},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022cip0016},
  doi          = {10.1587/TRANSFUN.2022CIP0016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/NutaSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HayashiAHMYKSTSAHMM23,
  author       = {Ryuya Hayashi and
                  Taiki Asano and
                  Junichiro Hayata and
                  Takahiro Matsuda and
                  Shota Yamada and
                  Shuichi Katsumata and
                  Yusuke Sakai and
                  Tadanori Teruya and
                  Jacob C. N. Schuldt and
                  Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Kanta Matsuura and
                  Tsutomu Matsumoto},
  editor       = {Foteini Baldimtsi and
                  Christian Cachin},
  title        = {Signature for Objects: Formalizing How to Authenticate Physical Data
                  and More},
  booktitle    = {Financial Cryptography and Data Security - 27th International Conference,
                  {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13950},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-47754-6\_11},
  doi          = {10.1007/978-3-031-47754-6\_11},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/HayashiAHMYKSTSAHMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icb/AttrapadungHKMMMNSTZ23,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Haochen M. Kotoi{-}Xie and
                  Takahiro Matsuda and
                  Takumi Moriyama and
                  Takao Murakami and
                  Hidenori Nakamura and
                  Jacob C. N. Schuldt and
                  Masaaki Tokuyama and
                  Jing Zhang},
  title        = {Two-Dimensional Dynamic Fusion for Continuous Authentication},
  booktitle    = {{IEEE} International Joint Conference on Biometrics, {IJCB} 2023,
                  Ljubljana, Slovenia, September 25-28, 2023},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IJCB57857.2023.10448866},
  doi          = {10.1109/IJCB57857.2023.10448866},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icb/AttrapadungHKMMMNSTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-04128,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Haochen M. Kotoi{-}Xie and
                  Takahiro Matsuda and
                  Takumi Moriyama and
                  Takao Murakami and
                  Hidenori Nakamura and
                  Jacob C. N. Schuldt and
                  Masaaki Tokuyama and
                  Jing Zhang},
  title        = {Two-Dimensional Dynamic Fusion for Continuous Authentication},
  journal      = {CoRR},
  volume       = {abs/2309.04128},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.04128},
  doi          = {10.48550/ARXIV.2309.04128},
  eprinttype    = {arXiv},
  eprint       = {2309.04128},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-04128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/popets/AttrapadungHIKM22,
  author       = {Nuttapong Attrapadung and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Takahiro Matsuda and
                  Ibuki Mishina and
                  Hiraku Morita and
                  Jacob C. N. Schuldt},
  title        = {Adam in Private: Secure and Fast Training of Deep Neural Networks
                  with Adaptive Moment Estimation},
  journal      = {Proc. Priv. Enhancing Technol.},
  volume       = {2022},
  number       = {4},
  pages        = {746--767},
  year         = {2022},
  url          = {https://doi.org/10.56553/popets-2022-0131},
  doi          = {10.56553/POPETS-2022-0131},
  timestamp    = {Fri, 30 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/popets/AttrapadungHIKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LuHOST22,
  author       = {Yi Lu and
                  Keisuke Hara and
                  Kazuma Ohara and
                  Jacob C. N. Schuldt and
                  Keisuke Tanaka},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Efficient Two-Party Exponentiation from Quotient Transfer},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {643--662},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_32},
  doi          = {10.1007/978-3-031-09234-3\_32},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LuHOST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/AttrapadungMOST22,
  author       = {Nuttapong Attrapadung and
                  Hiraku Morita and
                  Kazuma Ohara and
                  Jacob C. N. Schuldt and
                  Kazunari Tozawa},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Memory and Round-Efficient {MPC} Primitives in the Pre-Processing
                  Model from Unit Vectorization},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {858--872},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517407},
  doi          = {10.1145/3488932.3517407},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiaccs/AttrapadungMOST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AttrapadungMOST22,
  author       = {Nuttapong Attrapadung and
                  Hiraku Morita and
                  Kazuma Ohara and
                  Jacob C. N. Schuldt and
                  Tadanori Teruya and
                  Kazunari Tozawa},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {Secure Parallel Computation on Privately Partitioned Data and Applications},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {151--164},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560695},
  doi          = {10.1145/3548606.3560695},
  timestamp    = {Sat, 17 Dec 2022 01:15:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/AttrapadungMOST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NutaSN22,
  author       = {Seiya Nuta and
                  Jacob C. N. Schuldt and
                  Takashi Nishide},
  title        = {Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake
                  Blockchain},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {73},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/073},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NutaSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AttrapadungH0MO21,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Takahiro Matsuda and
                  Hiraku Morita and
                  Kazuma Ohara and
                  Jacob C. N. Schuldt and
                  Tadanori Teruya and
                  Kazunari Tozawa},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Oblivious Linear Group Actions and Applications},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {630--650},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484584},
  doi          = {10.1145/3460120.3484584},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/AttrapadungH0MO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/NutaSN21,
  author       = {Seiya Nuta and
                  Jacob C. N. Schuldt and
                  Takashi Nishide},
  editor       = {Avishek Adhikari and
                  Ralf K{\"{u}}sters and
                  Bart Preneel},
  title        = {Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake
                  Blockchain},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2021 - 22nd International Conference
                  on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13143},
  pages        = {436--461},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92518-5\_20},
  doi          = {10.1007/978-3-030-92518-5\_20},
  timestamp    = {Mon, 13 Dec 2021 16:43:06 +0100},
  biburl       = {https://dblp.org/rec/conf/indocrypt/NutaSN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2106-02203,
  author       = {Nuttapong Attrapadung and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Takahiro Matsuda and
                  Ibuki Mishina and
                  Hiraku Morita and
                  Jacob C. N. Schuldt},
  title        = {Adam in Private: Secure and Fast Training of Deep Neural Networks
                  with Adaptive Moment Estimation},
  journal      = {CoRR},
  volume       = {abs/2106.02203},
  year         = {2021},
  url          = {https://arxiv.org/abs/2106.02203},
  eprinttype    = {arXiv},
  eprint       = {2106.02203},
  timestamp    = {Thu, 10 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2106-02203.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttrapadungHIKM21,
  author       = {Nuttapong Attrapadung and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ryo Kikuchi and
                  Takahiro Matsuda and
                  Ibuki Mishina and
                  Hiraku Morita and
                  Jacob C. N. Schuldt},
  title        = {Adam in Private: Secure and Fast Training of Deep Neural Networks
                  with Adaptive Moment Estimation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {736},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/736},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AttrapadungHIKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HayataSHM20,
  author       = {Junichiro Hayata and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Kanta Matsuura},
  editor       = {Liqun Chen and
                  Ninghui Li and
                  Kaitai Liang and
                  Steve A. Schneider},
  title        = {On Private Information Retrieval Supporting Range Queries},
  booktitle    = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research
                  in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18,
                  2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12309},
  pages        = {674--694},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-59013-0\_33},
  doi          = {10.1007/978-3-030-59013-0\_33},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HayataSHM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AttrapadungHKMS19,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Shinsaku Kiyomoto and
                  Tomoaki Mimoto and
                  Jacob C. N. Schuldt},
  title        = {A Taxonomy of Secure Two-Party Comparison Protocols and Efficient
                  Constructions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {9},
  pages        = {1048--1060},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.1048},
  doi          = {10.1587/TRANSFUN.E102.A.1048},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/AttrapadungHKMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanaokaMS19,
  author       = {Goichiro Hanaoka and
                  Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  title        = {A New Combiner for Key Encapsulation Mechanisms},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {12},
  pages        = {1668--1675},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.1668},
  doi          = {10.1587/TRANSFUN.E102.A.1668},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanaokaMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KikuchiAHII00S19,
  author       = {Ryo Kikuchi and
                  Nuttapong Attrapadung and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ai Ishida and
                  Takahiro Matsuda and
                  Yusuke Sakai and
                  Jacob C. N. Schuldt},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Field Extension in Secret-Shared Form and Its Applications to Efficient
                  Secure Computation},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {343--361},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_19},
  doi          = {10.1007/978-3-030-21548-4\_19},
  timestamp    = {Wed, 26 Jun 2019 10:52:36 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KikuchiAHII00S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KikuchiAHIIMSS19,
  author       = {Ryo Kikuchi and
                  Nuttapong Attrapadung and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ai Ishida and
                  Takahiro Matsuda and
                  Yusuke Sakai and
                  Jacob C. N. Schuldt},
  title        = {Field Extension in Secret-Shared Form and Its Applications to Efficient
                  Secure Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {386},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/386},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KikuchiAHIIMSS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/PatersonS18,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  title        = {Statistical attacks on cookie masking for {RC4}},
  journal      = {Cryptogr. Commun.},
  volume       = {10},
  number       = {5},
  pages        = {777--801},
  year         = {2018},
  url          = {https://doi.org/10.1007/s12095-018-0280-y},
  doi          = {10.1007/S12095-018-0280-Y},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/PatersonS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/0002S18,
  author       = {Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  title        = {A New Key Encapsulation Combiner},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2018, Singapore, October 28-31, 2018},
  pages        = {698--702},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ISITA.2018.8664317},
  doi          = {10.23919/ISITA.2018.8664317},
  timestamp    = {Wed, 11 Aug 2021 11:51:25 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/0002S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/0002S18,
  author       = {Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Related Randomness Security for Public Key Encryption, Revisited},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {280--311},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_10},
  doi          = {10.1007/978-3-319-76578-5\_10},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/0002S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/AttrapadungHHKK18,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Takato Hirano and
                  Yutaka Kawai and
                  Yoshihiro Koseki and
                  Jacob C. N. Schuldt},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Token-Based Multi-input Functional Encryption},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {147--164},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_9},
  doi          = {10.1007/978-3-030-01446-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/AttrapadungHHKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002S18,
  author       = {Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  title        = {Related Randomness Security for Public Key Encryption, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {41},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/041},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002S18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS18,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  title        = {Statistical Attacks on Cookie Masking for {RC4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {93},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MoritaSMHI17,
  author       = {Hiraku Morita and
                  Jacob C. N. Schuldt and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Tetsu Iwata},
  title        = {On the Security of Schnorr Signatures, DSA, and ElGamal Signatures
                  against Related-Key Attacks},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {1},
  pages        = {73--90},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.73},
  doi          = {10.1587/TRANSFUN.E100.A.73},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MoritaSMHI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShinagawaMSNKNH17,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Jacob C. N. Schuldt and
                  Koji Nuida and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  title        = {Card-Based Protocols Using Regular Polygon Cards},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1900--1909},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1900},
  doi          = {10.1587/TRANSFUN.E100.A.1900},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShinagawaMSNKNH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MoritaS0HI17,
  author       = {Hiraku Morita and
                  Jacob C. N. Schuldt and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Tetsu Iwata},
  title        = {On the Security of Non-Interactive Key Exchange against Related-Key
                  Attacks},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1910--1923},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1910},
  doi          = {10.1587/TRANSFUN.E100.A.1910},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MoritaS0HI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanaokaS17,
  author       = {Goichiro Hanaoka and
                  Jacob C. N. Schuldt},
  title        = {Signatures from Trapdoor Commitments with Strong Openings},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1924--1931},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1924},
  doi          = {10.1587/TRANSFUN.E100.A.1924},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanaokaS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SchuldtS17,
  author       = {Jacob C. N. Schuldt and
                  Kazumasa Shinagawa},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {On the Robustness of {RSA-OAEP} Encryption and {RSA-PSS} Signatures
                  Against (Malicious) Randomness Failures},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {241--252},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053040},
  doi          = {10.1145/3052973.3053040},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/SchuldtS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AttrapadungHKMS17,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Shinsaku Kiyomoto and
                  Tomoaki Mimoto and
                  Jacob C. N. Schuldt},
  title        = {A Taxonomy of Secure Two-Party Comparison Protocols and Efficient
                  Constructions},
  booktitle    = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017,
                  Calgary, AB, Canada, August 28-30, 2017},
  pages        = {215--224},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/PST.2017.00033},
  doi          = {10.1109/PST.2017.00033},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/AttrapadungHKMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanaokaS16,
  author       = {Goichiro Hanaoka and
                  Jacob C. N. Schuldt},
  title        = {Convertible Nominative Signatures from Standard Assumptions without
                  Random Oracles},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {6},
  pages        = {1107--1121},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.1107},
  doi          = {10.1587/TRANSFUN.E99.A.1107},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanaokaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShinagawaMSNKNH16,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Jacob C. N. Schuldt and
                  Koji Nuida and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  title        = {Secure Computation Protocols Using Polarizing Cards},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {6},
  pages        = {1122--1131},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.1122},
  doi          = {10.1587/TRANSFUN.E99.A.1122},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShinagawaMSNKNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SakaiESHO16,
  author       = {Yusuke Sakai and
                  Keita Emura and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  title        = {Constructions of dynamic and non-dynamic threshold public-key encryption
                  schemes with decryption consistency},
  journal      = {Theor. Comput. Sci.},
  volume       = {630},
  pages        = {95--116},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.tcs.2016.04.003},
  doi          = {10.1016/J.TCS.2016.04.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/SakaiESHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DegabrielePSW16,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Joanne Woodage},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility
                  Results},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9814},
  pages        = {403--432},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53018-4\_15},
  doi          = {10.1007/978-3-662-53018-4\_15},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DegabrielePSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/HanaokaS16,
  author       = {Goichiro Hanaoka and
                  Jacob C. N. Schuldt},
  title        = {Signatures from trapdoor commitments with strong openings},
  booktitle    = {2016 International Symposium on Information Theory and Its Applications,
                  {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  pages        = {81--85},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7840390/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/HanaokaS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/HanaokaS16a,
  author       = {Goichiro Hanaoka and
                  Jacob C. N. Schuldt},
  title        = {On signatures with tight security in the multi-user setting},
  booktitle    = {2016 International Symposium on Information Theory and Its Applications,
                  {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  pages        = {91--95},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7840392/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/HanaokaS16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DegabrielePSW16,
  author       = {Jean Paul Degabriele and
                  Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Joanne Woodage},
  title        = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility
                  Results},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {577},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/577},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DegabrielePSW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/RivestS16,
  author       = {Ronald L. Rivest and
                  Jacob C. N. Schuldt},
  title        = {Spritz - a spongy RC4-like stream cipher and hash function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {856},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/856},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/RivestS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SakaiESHO15,
  author       = {Yusuke Sakai and
                  Keita Emura and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Dynamic Threshold Public-Key Encryption with Decryption Consistency
                  from Static Assumptions},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {77--92},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_5},
  doi          = {10.1007/978-3-319-19962-7\_5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SakaiESHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MoritaS0HI15,
  author       = {Hiraku Morita and
                  Jacob C. N. Schuldt and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Tetsu Iwata},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {On the Security of the Schnorr Signature Scheme and {DSA} Against
                  Related-Key Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {20--35},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_2},
  doi          = {10.1007/978-3-319-30840-1\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MoritaS0HI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/PatersonSSW15,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn and
                  Hoeteck Wee},
  editor       = {Jens Groth},
  title        = {Security Against Related Randomness Attacks via Reconstructive Extractors},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_2},
  doi          = {10.1007/978-3-319-27239-9\_2},
  timestamp    = {Wed, 18 Mar 2020 16:00:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/PatersonSSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShinagawaMSNKNH15,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Jacob C. N. Schuldt and
                  Koji Nuida and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Secure Multi-Party Computation Using Polarizing Cards},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {281--297},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_17},
  doi          = {10.1007/978-3-319-22425-1\_17},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShinagawaMSNKNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ShinagawaMSNKNH15,
  author       = {Kazumasa Shinagawa and
                  Takaaki Mizuki and
                  Jacob C. N. Schuldt and
                  Koji Nuida and
                  Naoki Kanayama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Eiji Okamoto},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {Multi-party Computation with Small Shuffle Complexity Using Regular
                  Polygon Cards},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_7},
  doi          = {10.1007/978-3-319-26059-4\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ShinagawaMSNKNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSSW15,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn and
                  Hoeteck Wee},
  title        = {Security Against Related Randomness Attacks via Reconstructive Extractors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {892},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/892},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSSW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoritaS0HI15,
  author       = {Hiraku Morita and
                  Jacob C. N. Schuldt and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Tetsu Iwata},
  title        = {On the Security of the Schnorr Signature Scheme and {DSA} against
                  Related-Key Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1135},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoritaS0HI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/EmuraHSS14,
  author       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai and
                  Jacob C. N. Schuldt},
  title        = {Group signature implies public-key encryption with non-interactive
                  opening},
  journal      = {Int. J. Inf. Sec.},
  volume       = {13},
  number       = {1},
  pages        = {51--62},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10207-013-0204-y},
  doi          = {10.1007/S10207-013-0204-Y},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/EmuraHSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PatersonPS14,
  author       = {Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation
                  of {RC4} Biases (Invited Paper)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {398--419},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_21},
  doi          = {10.1007/978-3-662-45611-8\_21},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PatersonPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/PintoPS14,
  author       = {Alexandre Pinto and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Shiho Moriai and
                  Trent Jaeger and
                  Kouichi Sakurai},
  title        = {Multi-recipient encryption, revisited},
  booktitle    = {9th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014},
  pages        = {229--238},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2590296.2590329},
  doi          = {10.1145/2590296.2590329},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/PintoPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/PatersonPS14,
  author       = {Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {Plaintext Recovery Attacks Against {WPA/TKIP}},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {325--349},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_17},
  doi          = {10.1007/978-3-662-46706-0\_17},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/PatersonPS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/PatersonSS14,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn},
  editor       = {Hugo Krawczyk},
  title        = {Related Randomness Attacks for Public Key Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {465--482},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_27},
  doi          = {10.1007/978-3-642-54631-0\_27},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/PatersonSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSS14,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Dale L. Sibborn},
  title        = {Related Randomness Attacks for Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {337},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/337},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/AlFardanBPPS13,
  author       = {Nadhem J. AlFardan and
                  Daniel J. Bernstein and
                  Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  editor       = {Samuel T. King},
  title        = {On the Security of {RC4} in {TLS}},
  booktitle    = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC,
                  USA, August 14-16, 2013},
  pages        = {305--320},
  publisher    = {{USENIX} Association},
  year         = {2013},
  url          = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/alFardan},
  timestamp    = {Mon, 01 Feb 2021 08:42:56 +0100},
  biburl       = {https://dblp.org/rec/conf/uss/AlFardanBPPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonPS13,
  author       = {Kenneth G. Paterson and
                  Bertram Poettering and
                  Jacob C. N. Schuldt},
  title        = {Plaintext Recovery Attacks Against {WPA/TKIP}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {748},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/748},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HanaokaMS12,
  author       = {Goichiro Hanaoka and
                  Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {On the Impossibility of Constructing Efficient Key Encapsulation and
                  Programmable Hash Functions in Prime Order Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {812--831},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_47},
  doi          = {10.1007/978-3-642-32009-5\_47},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HanaokaMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YamadaASSHK12,
  author       = {Shota Yamada and
                  Nuttapong Attrapadung and
                  Bagus Santoso and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Verifiable Predicate Encryption and Applications to {CCA} Security
                  and Anonymous Predicate Authentication},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {243--261},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_15},
  doi          = {10.1007/978-3-642-30057-8\_15},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/YamadaASSHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SakaiSEHO12,
  author       = {Yusuke Sakai and
                  Jacob C. N. Schuldt and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {On the Security of Dynamic Group Signatures: Preventing Signature
                  Hijacking},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {715--732},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_42},
  doi          = {10.1007/978-3-642-30057-8\_42},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SakaiSEHO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SakaiSEHO12,
  author       = {Yusuke Sakai and
                  Jacob C. N. Schuldt and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  title        = {On the Security of Dynamic Group Signatures: Preventing Signature
                  Hijacking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SakaiSEHO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaMS12,
  author       = {Goichiro Hanaoka and
                  Takahiro Matsuda and
                  Jacob C. N. Schuldt},
  title        = {On the Impossibility of Constructing Efficient Key Encapsulation and
                  Programmable Hash Functions in Prime Order Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {448},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/448},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SchuldtM11,
  author       = {Jacob C. N. Schuldt and
                  Kanta Matsuura},
  title        = {Efficient Convertible Undeniable Signatures with Delegatable Verification},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {71--83},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.71},
  doi          = {10.1587/TRANSFUN.E94.A.71},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SchuldtM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbdallaBCDMNSS11,
  author       = {Michel Abdalla and
                  James Birkett and
                  Dario Catalano and
                  Alexander W. Dent and
                  John Malone{-}Lee and
                  Gregory Neven and
                  Jacob C. N. Schuldt and
                  Nigel P. Smart},
  title        = {Wildcarded Identity-Based Encryption},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {1},
  pages        = {42--82},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9060-3},
  doi          = {10.1007/S00145-010-9060-3},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbdallaBCDMNSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChibaMSM11,
  author       = {Daiki Chiba and
                  Takahiro Matsuda and
                  Jacob C. N. Schuldt and
                  Kanta Matsuura},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Efficient Generic Constructions of Signcryption with Insider Security
                  in the Multi-user Setting},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {220--237},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_13},
  doi          = {10.1007/978-3-642-21554-4\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChibaMSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SchuldtH11,
  author       = {Jacob C. N. Schuldt and
                  Goichiro Hanaoka},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Non-transferable User Certification Secure against Authority Information
                  Leaks and Impersonation Attacks},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {413--430},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_24},
  doi          = {10.1007/978-3-642-21554-4\_24},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SchuldtH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/PatersonSST11,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Martijn Stam and
                  Susan Thomson},
  editor       = {Dong Hoon Lee and
                  Xiaoyun Wang},
  title        = {On the Joint Security of Encryption and Signature, Revisited},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Seoul, South Korea, December 4-8, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7073},
  pages        = {161--178},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25385-0\_9},
  doi          = {10.1007/978-3-642-25385-0\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/PatersonSST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SchuldtM11,
  author       = {Jacob C. N. Schuldt and
                  Kanta Matsuura},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {On-line Non-transferable Signatures Revisited},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {369--386},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_23},
  doi          = {10.1007/978-3-642-19379-8\_23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SchuldtM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonSST11,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt and
                  Martijn Stam and
                  Susan Thomson},
  title        = {On the Joint Security of Encryption and Signature, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {486},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/486},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonSST11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SchuldtM10,
  author       = {Jacob C. N. Schuldt and
                  Kanta Matsuura},
  editor       = {Jin Kwak and
                  Robert H. Deng and
                  Yoojae Won and
                  Guilin Wang},
  title        = {An Efficient Convertible Undeniable Signature Scheme with Delegatable
                  Verification},
  booktitle    = {Information Security, Practice and Experience, 6th International Conference,
                  {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6047},
  pages        = {276--293},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-12827-1\_21},
  doi          = {10.1007/978-3-642-12827-1\_21},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SchuldtM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MatsudaMS09,
  author       = {Takahiro Matsuda and
                  Kanta Matsuura and
                  Jacob C. N. Schuldt},
  editor       = {Bimal K. Roy and
                  Nicolas Sendrier},
  title        = {Efficient Constructions of Signcryption Schemes and Signcryption Composability},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference
                  on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5922},
  pages        = {321--342},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10628-6\_22},
  doi          = {10.1007/978-3-642-10628-6\_22},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MatsudaMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchuldtM09,
  author       = {Jacob C. N. Schuldt and
                  Kanta Matsuura},
  title        = {On-line Non-transferable Signatures Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {406},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/406},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchuldtM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SchuldtM09a,
  author       = {Jacob C. N. Schuldt and
                  Kanta Matsuura},
  title        = {An Efficient Convertible Undeniable Signature Scheme with Delegatable
                  Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SchuldtM09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SchuldtMP08,
  author       = {Jacob C. N. Schuldt and
                  Kanta Matsuura and
                  Kenneth G. Paterson},
  editor       = {Ronald Cramer},
  title        = {Proxy Signatures Secure Against Proxy Key Exposure},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {141--161},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_9},
  doi          = {10.1007/978-3-540-78440-1\_9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SchuldtMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BirkettDNS07,
  author       = {James Birkett and
                  Alexander W. Dent and
                  Gregory Neven and
                  Jacob C. N. Schuldt},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Efficient Chosen-Ciphertext Secure Identity-Based Encryption with
                  Wildcards},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {274--292},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_21},
  doi          = {10.1007/978-3-540-73458-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BirkettDNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PatersonS06,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Efficient Identity-Based Signatures Secure in the Standard Model},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_18},
  doi          = {10.1007/11780656\_18},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PatersonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PatersonS06,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  title        = {Efficient Identity-based Signatures Secure in the Standard Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {80},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/080},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PatersonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BirkettDNS06,
  author       = {James Birkett and
                  Alexander W. Dent and
                  Gregory Neven and
                  Jacob C. N. Schuldt},
  title        = {Efficient Chosen-Ciphertext Secure Identity-Based Encryption with
                  Wildcards},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {377},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/377},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BirkettDNS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics