Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jacob C. N. Schuldt
@article{DBLP:journals/ieiceta/KojimaSH24, author = {Rikuhiro Kojima and Jacob C. N. Schuldt and Goichiro Hanaoka}, title = {A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {107}, number = {3}, pages = {193--202}, year = {2024}, url = {https://doi.org/10.1587/transfun.2023cip0022}, doi = {10.1587/TRANSFUN.2023CIP0022}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/KojimaSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/HayataSHM24, author = {Junichiro Hayata and Jacob C. N. Schuldt and Goichiro Hanaoka and Kanta Matsuura}, title = {On private information retrieval supporting range queries}, journal = {Int. J. Inf. Sec.}, volume = {23}, number = {1}, pages = {629--647}, year = {2024}, url = {https://doi.org/10.1007/s10207-023-00743-6}, doi = {10.1007/S10207-023-00743-6}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/HayataSHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/AttrapadungHHK024, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Ryo Hiromasa and Yoshihiro Koseki and Takahiro Matsuda and Yutaro Nishida and Yusuke Sakai and Jacob C. N. Schuldt and Satoshi Yasuda}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Privacy-Preserving Verifiable CNNs}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14584}, pages = {373--402}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54773-7\_15}, doi = {10.1007/978-3-031-54773-7\_15}, timestamp = {Tue, 05 Mar 2024 11:54:50 +0100}, biburl = {https://dblp.org/rec/conf/acns/AttrapadungHHK024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AttrapadungHHMS23, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Ryo Hiromasa and Takahiro Matsuda and Jacob C. N. Schuldt}, title = {Maliciously circuit-private multi-key {FHE} and {MPC} based on {LWE}}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1645--1684}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01160-x}, doi = {10.1007/S10623-022-01160-X}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AttrapadungHHMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/NutaSN23, author = {Seiya Nuta and Jacob C. N. Schuldt and Takashi Nishide}, title = {PoS Blockchain-Based Forward-Secure Public Key Encryption with Immutable Keys and Post-Compromise Security Guarantees}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {3}, pages = {212--227}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022cip0016}, doi = {10.1587/TRANSFUN.2022CIP0016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/NutaSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HayashiAHMYKSTSAHMM23, author = {Ryuya Hayashi and Taiki Asano and Junichiro Hayata and Takahiro Matsuda and Shota Yamada and Shuichi Katsumata and Yusuke Sakai and Tadanori Teruya and Jacob C. N. Schuldt and Nuttapong Attrapadung and Goichiro Hanaoka and Kanta Matsuura and Tsutomu Matsumoto}, editor = {Foteini Baldimtsi and Christian Cachin}, title = {Signature for Objects: Formalizing How to Authenticate Physical Data and More}, booktitle = {Financial Cryptography and Data Security - 27th International Conference, {FC} 2023, Bol, Bra{\v{c}}, Croatia, May 1-5, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13950}, pages = {182--199}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-47754-6\_11}, doi = {10.1007/978-3-031-47754-6\_11}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fc/HayashiAHMYKSTSAHMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icb/AttrapadungHKMMMNSTZ23, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Haochen M. Kotoi{-}Xie and Takahiro Matsuda and Takumi Moriyama and Takao Murakami and Hidenori Nakamura and Jacob C. N. Schuldt and Masaaki Tokuyama and Jing Zhang}, title = {Two-Dimensional Dynamic Fusion for Continuous Authentication}, booktitle = {{IEEE} International Joint Conference on Biometrics, {IJCB} 2023, Ljubljana, Slovenia, September 25-28, 2023}, pages = {1--9}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/IJCB57857.2023.10448866}, doi = {10.1109/IJCB57857.2023.10448866}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icb/AttrapadungHKMMMNSTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-04128, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Haochen M. Kotoi{-}Xie and Takahiro Matsuda and Takumi Moriyama and Takao Murakami and Hidenori Nakamura and Jacob C. N. Schuldt and Masaaki Tokuyama and Jing Zhang}, title = {Two-Dimensional Dynamic Fusion for Continuous Authentication}, journal = {CoRR}, volume = {abs/2309.04128}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.04128}, doi = {10.48550/ARXIV.2309.04128}, eprinttype = {arXiv}, eprint = {2309.04128}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-04128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/popets/AttrapadungHIKM22, author = {Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Takahiro Matsuda and Ibuki Mishina and Hiraku Morita and Jacob C. N. Schuldt}, title = {Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation}, journal = {Proc. Priv. Enhancing Technol.}, volume = {2022}, number = {4}, pages = {746--767}, year = {2022}, url = {https://doi.org/10.56553/popets-2022-0131}, doi = {10.56553/POPETS-2022-0131}, timestamp = {Fri, 30 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/popets/AttrapadungHIKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LuHOST22, author = {Yi Lu and Keisuke Hara and Kazuma Ohara and Jacob C. N. Schuldt and Keisuke Tanaka}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Efficient Two-Party Exponentiation from Quotient Transfer}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {643--662}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_32}, doi = {10.1007/978-3-031-09234-3\_32}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/LuHOST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/AttrapadungMOST22, author = {Nuttapong Attrapadung and Hiraku Morita and Kazuma Ohara and Jacob C. N. Schuldt and Kazunari Tozawa}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Memory and Round-Efficient {MPC} Primitives in the Pre-Processing Model from Unit Vectorization}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {858--872}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517407}, doi = {10.1145/3488932.3517407}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiaccs/AttrapadungMOST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AttrapadungMOST22, author = {Nuttapong Attrapadung and Hiraku Morita and Kazuma Ohara and Jacob C. N. Schuldt and Tadanori Teruya and Kazunari Tozawa}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {Secure Parallel Computation on Privately Partitioned Data and Applications}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {151--164}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560695}, doi = {10.1145/3548606.3560695}, timestamp = {Sat, 17 Dec 2022 01:15:29 +0100}, biburl = {https://dblp.org/rec/conf/ccs/AttrapadungMOST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NutaSN22, author = {Seiya Nuta and Jacob C. N. Schuldt and Takashi Nishide}, title = {Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {73}, year = {2022}, url = {https://eprint.iacr.org/2022/073}, timestamp = {Fri, 18 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NutaSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/AttrapadungH0MO21, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Takahiro Matsuda and Hiraku Morita and Kazuma Ohara and Jacob C. N. Schuldt and Tadanori Teruya and Kazunari Tozawa}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Oblivious Linear Group Actions and Applications}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {630--650}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484584}, doi = {10.1145/3460120.3484584}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/AttrapadungH0MO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NutaSN21, author = {Seiya Nuta and Jacob C. N. Schuldt and Takashi Nishide}, editor = {Avishek Adhikari and Ralf K{\"{u}}sters and Bart Preneel}, title = {Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2021 - 22nd International Conference on Cryptology in India, Jaipur, India, December 12-15, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13143}, pages = {436--461}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92518-5\_20}, doi = {10.1007/978-3-030-92518-5\_20}, timestamp = {Mon, 13 Dec 2021 16:43:06 +0100}, biburl = {https://dblp.org/rec/conf/indocrypt/NutaSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-02203, author = {Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Takahiro Matsuda and Ibuki Mishina and Hiraku Morita and Jacob C. N. Schuldt}, title = {Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation}, journal = {CoRR}, volume = {abs/2106.02203}, year = {2021}, url = {https://arxiv.org/abs/2106.02203}, eprinttype = {arXiv}, eprint = {2106.02203}, timestamp = {Thu, 10 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-02203.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttrapadungHIKM21, author = {Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ryo Kikuchi and Takahiro Matsuda and Ibuki Mishina and Hiraku Morita and Jacob C. N. Schuldt}, title = {Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {736}, year = {2021}, url = {https://eprint.iacr.org/2021/736}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AttrapadungHIKM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HayataSHM20, author = {Junichiro Hayata and Jacob C. N. Schuldt and Goichiro Hanaoka and Kanta Matsuura}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {On Private Information Retrieval Supporting Range Queries}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {674--694}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_33}, doi = {10.1007/978-3-030-59013-0\_33}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HayataSHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AttrapadungHKMS19, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Shinsaku Kiyomoto and Tomoaki Mimoto and Jacob C. N. Schuldt}, title = {A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {9}, pages = {1048--1060}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.1048}, doi = {10.1587/TRANSFUN.E102.A.1048}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/AttrapadungHKMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanaokaMS19, author = {Goichiro Hanaoka and Takahiro Matsuda and Jacob C. N. Schuldt}, title = {A New Combiner for Key Encapsulation Mechanisms}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {12}, pages = {1668--1675}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.1668}, doi = {10.1587/TRANSFUN.E102.A.1668}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/HanaokaMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KikuchiAHII00S19, author = {Ryo Kikuchi and Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ai Ishida and Takahiro Matsuda and Yusuke Sakai and Jacob C. N. Schuldt}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {343--361}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_19}, doi = {10.1007/978-3-030-21548-4\_19}, timestamp = {Wed, 26 Jun 2019 10:52:36 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KikuchiAHII00S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KikuchiAHIIMSS19, author = {Ryo Kikuchi and Nuttapong Attrapadung and Koki Hamada and Dai Ikarashi and Ai Ishida and Takahiro Matsuda and Yusuke Sakai and Jacob C. N. Schuldt}, title = {Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {386}, year = {2019}, url = {https://eprint.iacr.org/2019/386}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KikuchiAHIIMSS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ccds/PatersonS18, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, title = {Statistical attacks on cookie masking for {RC4}}, journal = {Cryptogr. Commun.}, volume = {10}, number = {5}, pages = {777--801}, year = {2018}, url = {https://doi.org/10.1007/s12095-018-0280-y}, doi = {10.1007/S12095-018-0280-Y}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ccds/PatersonS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/0002S18, author = {Takahiro Matsuda and Jacob C. N. Schuldt}, title = {A New Key Encapsulation Combiner}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2018, Singapore, October 28-31, 2018}, pages = {698--702}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ISITA.2018.8664317}, doi = {10.23919/ISITA.2018.8664317}, timestamp = {Wed, 11 Aug 2021 11:51:25 +0200}, biburl = {https://dblp.org/rec/conf/isita/0002S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/0002S18, author = {Takahiro Matsuda and Jacob C. N. Schuldt}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Related Randomness Security for Public Key Encryption, Revisited}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {280--311}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_10}, doi = {10.1007/978-3-319-76578-5\_10}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/0002S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/AttrapadungHHKK18, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Takato Hirano and Yutaka Kawai and Yoshihiro Koseki and Jacob C. N. Schuldt}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Token-Based Multi-input Functional Encryption}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {147--164}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_9}, doi = {10.1007/978-3-030-01446-9\_9}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/AttrapadungHHKK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0002S18, author = {Takahiro Matsuda and Jacob C. N. Schuldt}, title = {Related Randomness Security for Public Key Encryption, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {41}, year = {2018}, url = {http://eprint.iacr.org/2018/041}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0002S18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS18, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, title = {Statistical Attacks on Cookie Masking for {RC4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {93}, year = {2018}, url = {http://eprint.iacr.org/2018/093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MoritaSMHI17, author = {Hiraku Morita and Jacob C. N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata}, title = {On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {1}, pages = {73--90}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.73}, doi = {10.1587/TRANSFUN.E100.A.73}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MoritaSMHI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShinagawaMSNKNH17, author = {Kazumasa Shinagawa and Takaaki Mizuki and Jacob C. N. Schuldt and Koji Nuida and Naoki Kanayama and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, title = {Card-Based Protocols Using Regular Polygon Cards}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1900--1909}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1900}, doi = {10.1587/TRANSFUN.E100.A.1900}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShinagawaMSNKNH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MoritaS0HI17, author = {Hiraku Morita and Jacob C. N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata}, title = {On the Security of Non-Interactive Key Exchange against Related-Key Attacks}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1910--1923}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1910}, doi = {10.1587/TRANSFUN.E100.A.1910}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MoritaS0HI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanaokaS17, author = {Goichiro Hanaoka and Jacob C. N. Schuldt}, title = {Signatures from Trapdoor Commitments with Strong Openings}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1924--1931}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1924}, doi = {10.1587/TRANSFUN.E100.A.1924}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanaokaS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/SchuldtS17, author = {Jacob C. N. Schuldt and Kazumasa Shinagawa}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {On the Robustness of {RSA-OAEP} Encryption and {RSA-PSS} Signatures Against (Malicious) Randomness Failures}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {241--252}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053040}, doi = {10.1145/3052973.3053040}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/SchuldtS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pst/AttrapadungHKMS17, author = {Nuttapong Attrapadung and Goichiro Hanaoka and Shinsaku Kiyomoto and Tomoaki Mimoto and Jacob C. N. Schuldt}, title = {A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions}, booktitle = {15th Annual Conference on Privacy, Security and Trust, {PST} 2017, Calgary, AB, Canada, August 28-30, 2017}, pages = {215--224}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/PST.2017.00033}, doi = {10.1109/PST.2017.00033}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pst/AttrapadungHKMS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanaokaS16, author = {Goichiro Hanaoka and Jacob C. N. Schuldt}, title = {Convertible Nominative Signatures from Standard Assumptions without Random Oracles}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {6}, pages = {1107--1121}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.1107}, doi = {10.1587/TRANSFUN.E99.A.1107}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanaokaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShinagawaMSNKNH16, author = {Kazumasa Shinagawa and Takaaki Mizuki and Jacob C. N. Schuldt and Koji Nuida and Naoki Kanayama and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, title = {Secure Computation Protocols Using Polarizing Cards}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {6}, pages = {1122--1131}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.1122}, doi = {10.1587/TRANSFUN.E99.A.1122}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShinagawaMSNKNH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SakaiESHO16, author = {Yusuke Sakai and Keita Emura and Jacob C. N. Schuldt and Goichiro Hanaoka and Kazuo Ohta}, title = {Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency}, journal = {Theor. Comput. Sci.}, volume = {630}, pages = {95--116}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2016.04.003}, doi = {10.1016/J.TCS.2016.04.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SakaiESHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DegabrielePSW16, author = {Jean Paul Degabriele and Kenneth G. Paterson and Jacob C. N. Schuldt and Joanne Woodage}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, pages = {403--432}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4\_15}, doi = {10.1007/978-3-662-53018-4\_15}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DegabrielePSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/HanaokaS16, author = {Goichiro Hanaoka and Jacob C. N. Schuldt}, title = {Signatures from trapdoor commitments with strong openings}, booktitle = {2016 International Symposium on Information Theory and Its Applications, {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016}, pages = {81--85}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7840390/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/HanaokaS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/HanaokaS16a, author = {Goichiro Hanaoka and Jacob C. N. Schuldt}, title = {On signatures with tight security in the multi-user setting}, booktitle = {2016 International Symposium on Information Theory and Its Applications, {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016}, pages = {91--95}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7840392/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/HanaokaS16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DegabrielePSW16, author = {Jean Paul Degabriele and Kenneth G. Paterson and Jacob C. N. Schuldt and Joanne Woodage}, title = {Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {577}, year = {2016}, url = {http://eprint.iacr.org/2016/577}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DegabrielePSW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/RivestS16, author = {Ronald L. Rivest and Jacob C. N. Schuldt}, title = {Spritz - a spongy RC4-like stream cipher and hash function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {856}, year = {2016}, url = {http://eprint.iacr.org/2016/856}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/RivestS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SakaiESHO15, author = {Yusuke Sakai and Keita Emura and Jacob C. N. Schuldt and Goichiro Hanaoka and Kazuo Ohta}, editor = {Ernest Foo and Douglas Stebila}, title = {Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {77--92}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_5}, doi = {10.1007/978-3-319-19962-7\_5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SakaiESHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MoritaS0HI15, author = {Hiraku Morita and Jacob C. N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata}, editor = {Soonhak Kwon and Aaram Yun}, title = {On the Security of the Schnorr Signature Scheme and {DSA} Against Related-Key Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {20--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_2}, doi = {10.1007/978-3-319-30840-1\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MoritaS0HI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/PatersonSSW15, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee}, editor = {Jens Groth}, title = {Security Against Related Randomness Attacks via Reconstructive Extractors}, booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC} 2015, Oxford, UK, December 15-17, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9496}, pages = {23--40}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27239-9\_2}, doi = {10.1007/978-3-319-27239-9\_2}, timestamp = {Wed, 18 Mar 2020 16:00:58 +0100}, biburl = {https://dblp.org/rec/conf/ima/PatersonSSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShinagawaMSNKNH15, author = {Kazumasa Shinagawa and Takaaki Mizuki and Jacob C. N. Schuldt and Koji Nuida and Naoki Kanayama and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Secure Multi-Party Computation Using Polarizing Cards}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {281--297}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_17}, doi = {10.1007/978-3-319-22425-1\_17}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ShinagawaMSNKNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ShinagawaMSNKNH15, author = {Kazumasa Shinagawa and Takaaki Mizuki and Jacob C. N. Schuldt and Koji Nuida and Naoki Kanayama and Takashi Nishide and Goichiro Hanaoka and Eiji Okamoto}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {127--146}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_7}, doi = {10.1007/978-3-319-26059-4\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ShinagawaMSNKNH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSSW15, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn and Hoeteck Wee}, title = {Security Against Related Randomness Attacks via Reconstructive Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {892}, year = {2015}, url = {http://eprint.iacr.org/2015/892}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSSW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoritaS0HI15, author = {Hiraku Morita and Jacob C. N. Schuldt and Takahiro Matsuda and Goichiro Hanaoka and Tetsu Iwata}, title = {On the Security of the Schnorr Signature Scheme and {DSA} against Related-Key Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1135}, year = {2015}, url = {http://eprint.iacr.org/2015/1135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoritaS0HI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/EmuraHSS14, author = {Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Jacob C. N. Schuldt}, title = {Group signature implies public-key encryption with non-interactive opening}, journal = {Int. J. Inf. Sec.}, volume = {13}, number = {1}, pages = {51--62}, year = {2014}, url = {https://doi.org/10.1007/s10207-013-0204-y}, doi = {10.1007/S10207-013-0204-Y}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/EmuraHSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PatersonPS14, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Palash Sarkar and Tetsu Iwata}, title = {Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of {RC4} Biases (Invited Paper)}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {398--419}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_21}, doi = {10.1007/978-3-662-45611-8\_21}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PatersonPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/PintoPS14, author = {Alexandre Pinto and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Shiho Moriai and Trent Jaeger and Kouichi Sakurai}, title = {Multi-recipient encryption, revisited}, booktitle = {9th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '14, Kyoto, Japan - June 03 - 06, 2014}, pages = {229--238}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2590296.2590329}, doi = {10.1145/2590296.2590329}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/PintoPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/PatersonPS14, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Carlos Cid and Christian Rechberger}, title = {Plaintext Recovery Attacks Against {WPA/TKIP}}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {325--349}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_17}, doi = {10.1007/978-3-662-46706-0\_17}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/PatersonPS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/PatersonSS14, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn}, editor = {Hugo Krawczyk}, title = {Related Randomness Attacks for Public Key Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {465--482}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_27}, doi = {10.1007/978-3-642-54631-0\_27}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/PatersonSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSS14, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Dale L. Sibborn}, title = {Related Randomness Attacks for Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {337}, year = {2014}, url = {http://eprint.iacr.org/2014/337}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/AlFardanBPPS13, author = {Nadhem J. AlFardan and Daniel J. Bernstein and Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, editor = {Samuel T. King}, title = {On the Security of {RC4} in {TLS}}, booktitle = {Proceedings of the 22th {USENIX} Security Symposium, Washington, DC, USA, August 14-16, 2013}, pages = {305--320}, publisher = {{USENIX} Association}, year = {2013}, url = {https://www.usenix.org/conference/usenixsecurity13/technical-sessions/paper/alFardan}, timestamp = {Mon, 01 Feb 2021 08:42:56 +0100}, biburl = {https://dblp.org/rec/conf/uss/AlFardanBPPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonPS13, author = {Kenneth G. Paterson and Bertram Poettering and Jacob C. N. Schuldt}, title = {Plaintext Recovery Attacks Against {WPA/TKIP}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {748}, year = {2013}, url = {http://eprint.iacr.org/2013/748}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonPS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HanaokaMS12, author = {Goichiro Hanaoka and Takahiro Matsuda and Jacob C. N. Schuldt}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {812--831}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_47}, doi = {10.1007/978-3-642-32009-5\_47}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HanaokaMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YamadaASSHK12, author = {Shota Yamada and Nuttapong Attrapadung and Bagus Santoso and Jacob C. N. Schuldt and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Verifiable Predicate Encryption and Applications to {CCA} Security and Anonymous Predicate Authentication}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {243--261}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_15}, doi = {10.1007/978-3-642-30057-8\_15}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/YamadaASSHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SakaiSEHO12, author = {Yusuke Sakai and Jacob C. N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {715--732}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_42}, doi = {10.1007/978-3-642-30057-8\_42}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SakaiSEHO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SakaiSEHO12, author = {Yusuke Sakai and Jacob C. N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta}, title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2012}, url = {http://eprint.iacr.org/2012/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SakaiSEHO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanaokaMS12, author = {Goichiro Hanaoka and Takahiro Matsuda and Jacob C. N. Schuldt}, title = {On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {448}, year = {2012}, url = {http://eprint.iacr.org/2012/448}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanaokaMS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SchuldtM11, author = {Jacob C. N. Schuldt and Kanta Matsuura}, title = {Efficient Convertible Undeniable Signatures with Delegatable Verification}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {71--83}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.71}, doi = {10.1587/TRANSFUN.E94.A.71}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SchuldtM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbdallaBCDMNSS11, author = {Michel Abdalla and James Birkett and Dario Catalano and Alexander W. Dent and John Malone{-}Lee and Gregory Neven and Jacob C. N. Schuldt and Nigel P. Smart}, title = {Wildcarded Identity-Based Encryption}, journal = {J. Cryptol.}, volume = {24}, number = {1}, pages = {42--82}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9060-3}, doi = {10.1007/S00145-010-9060-3}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbdallaBCDMNSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChibaMSM11, author = {Daiki Chiba and Takahiro Matsuda and Jacob C. N. Schuldt and Kanta Matsuura}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {220--237}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_13}, doi = {10.1007/978-3-642-21554-4\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChibaMSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SchuldtH11, author = {Jacob C. N. Schuldt and Goichiro Hanaoka}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {413--430}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_24}, doi = {10.1007/978-3-642-21554-4\_24}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SchuldtH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PatersonSST11, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Martijn Stam and Susan Thomson}, editor = {Dong Hoon Lee and Xiaoyun Wang}, title = {On the Joint Security of Encryption and Signature, Revisited}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7073}, pages = {161--178}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25385-0\_9}, doi = {10.1007/978-3-642-25385-0\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PatersonSST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SchuldtM11, author = {Jacob C. N. Schuldt and Kanta Matsuura}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {On-line Non-transferable Signatures Revisited}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {369--386}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_23}, doi = {10.1007/978-3-642-19379-8\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SchuldtM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonSST11, author = {Kenneth G. Paterson and Jacob C. N. Schuldt and Martijn Stam and Susan Thomson}, title = {On the Joint Security of Encryption and Signature, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {486}, year = {2011}, url = {http://eprint.iacr.org/2011/486}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonSST11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SchuldtM10, author = {Jacob C. N. Schuldt and Kanta Matsuura}, editor = {Jin Kwak and Robert H. Deng and Yoojae Won and Guilin Wang}, title = {An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification}, booktitle = {Information Security, Practice and Experience, 6th International Conference, {ISPEC} 2010, Seoul, Korea, May 12-13, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6047}, pages = {276--293}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12827-1\_21}, doi = {10.1007/978-3-642-12827-1\_21}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SchuldtM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MatsudaMS09, author = {Takahiro Matsuda and Kanta Matsuura and Jacob C. N. Schuldt}, editor = {Bimal K. Roy and Nicolas Sendrier}, title = {Efficient Constructions of Signcryption Schemes and Signcryption Composability}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5922}, pages = {321--342}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10628-6\_22}, doi = {10.1007/978-3-642-10628-6\_22}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/MatsudaMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchuldtM09, author = {Jacob C. N. Schuldt and Kanta Matsuura}, title = {On-line Non-transferable Signatures Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {406}, year = {2009}, url = {http://eprint.iacr.org/2009/406}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchuldtM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SchuldtM09a, author = {Jacob C. N. Schuldt and Kanta Matsuura}, title = {An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2009}, url = {http://eprint.iacr.org/2009/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SchuldtM09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SchuldtMP08, author = {Jacob C. N. Schuldt and Kanta Matsuura and Kenneth G. Paterson}, editor = {Ronald Cramer}, title = {Proxy Signatures Secure Against Proxy Key Exposure}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {141--161}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_9}, doi = {10.1007/978-3-540-78440-1\_9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SchuldtMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BirkettDNS07, author = {James Birkett and Alexander W. Dent and Gregory Neven and Jacob C. N. Schuldt}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {274--292}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_21}, doi = {10.1007/978-3-540-73458-1\_21}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BirkettDNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PatersonS06, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Efficient Identity-Based Signatures Secure in the Standard Model}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {207--222}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_18}, doi = {10.1007/11780656\_18}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PatersonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PatersonS06, author = {Kenneth G. Paterson and Jacob C. N. Schuldt}, title = {Efficient Identity-based Signatures Secure in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {80}, year = {2006}, url = {http://eprint.iacr.org/2006/080}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PatersonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BirkettDNS06, author = {James Birkett and Alexander W. Dent and Gregory Neven and Jacob C. N. Schuldt}, title = {Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {377}, year = {2006}, url = {http://eprint.iacr.org/2006/377}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BirkettDNS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.