BibTeX records: Kazuhide Fukushima

download as .bib file

@article{DBLP:journals/ieiceta/MaedaMNFN24,
  author       = {Daisuke Maeda and
                  Koki Morimura and
                  Shintaro Narisada and
                  Kazuhide Fukushima and
                  Takashi Nishide},
  title        = {Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer
                  Functions and Their Applications},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {107},
  number       = {3},
  pages        = {234--247},
  year         = {2024},
  url          = {https://doi.org/10.1587/transfun.2023cip0010},
  doi          = {10.1587/TRANSFUN.2023CIP0010},
  timestamp    = {Thu, 04 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/MaedaMNFN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sncs/NakamuraOFI24,
  author       = {Toru Nakamura and
                  Hiroki Okada and
                  Kazuhide Fukushima and
                  Takamasa Isohara},
  title        = {Private Verification in Multi-stakeholder Environment and its Application
                  to Stable Matching},
  journal      = {{SN} Comput. Sci.},
  volume       = {5},
  number       = {3},
  pages        = {309},
  year         = {2024},
  url          = {https://doi.org/10.1007/s42979-024-02631-9},
  doi          = {10.1007/S42979-024-02631-9},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sncs/NakamuraOFI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HasegawaHSKFMK24,
  author       = {Kento Hasegawa and
                  Katsutoshi Hanahara and
                  Hiroshi Sugisaki and
                  Minoru Kozu and
                  Kazuhide Fukushima and
                  Yosuke Murakami and
                  Shinsaku Kiyomoto},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Vulnerability Information Sharing Platform for Securing Hardware Supply
                  Chains},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {403--410},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012351800003648},
  doi          = {10.5220/0012351800003648},
  timestamp    = {Tue, 02 Apr 2024 14:37:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HasegawaHSKFMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NguyenCHFB24,
  author       = {Huynh Phuong Thanh Nguyen and
                  Zhi Chen and
                  Kento Hasegawa and
                  Kazuhide Fukushima and
                  Razvan Beuran},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {PenGym: Pentesting Training Framework for Reinforcement Learning Agents},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {498--509},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012367300003648},
  doi          = {10.5220/0012367300003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NguyenCHFB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/MeguroKNHFSH24,
  author       = {Ryo Meguro and
                  Hiroya Kato and
                  Shintaro Narisada and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Takuo Suganuma and
                  Masahiro Hiji},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {510--521},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012369500003648},
  doi          = {10.5220/0012369500003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/MeguroKNHFSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/UemuraF24,
  author       = {Shusaku Uemura and
                  Kazuhide Fukushima},
  editor       = {Gabriele Lenzini and
                  Paolo Mori and
                  Steven Furnell},
  title        = {Feasibility of Random Forest with Fully Homomorphic Encryption Applied
                  to Network Data},
  booktitle    = {Proceedings of the 10th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28,
                  2024},
  pages        = {534--545},
  publisher    = {{SCITEPRESS}},
  year         = {2024},
  url          = {https://doi.org/10.5220/0012394600003648},
  doi          = {10.5220/0012394600003648},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/UemuraF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NarisadaUOFAF24,
  author       = {Shintaro Narisada and
                  Shusaku Uemura and
                  Hiroki Okada and
                  Hiroki Furue and
                  Yusuke Aikawa and
                  Kazuhide Fukushima},
  title        = {Revisiting the May-Meurer-Thomae Algorithm - Solving McEliece-1409
                  in One Day},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {393},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/393},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/NarisadaUOFAF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/PhuongPF23,
  author       = {Tran Thi Phuong and
                  Le Trieu Phong and
                  Kazuhide Fukushima},
  title        = {Distributed Stochastic Gradient Descent With Compressed and Skipped
                  Communication},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {99836--99846},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3315331},
  doi          = {10.1109/ACCESS.2023.3315331},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/PhuongPF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/NarisadaFK23,
  author       = {Shintaro Narisada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Multiparallel {MMT:} Faster {ISD} Algorithm Solving High-Dimensional
                  Syndrome Decoding Problem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {3},
  pages        = {241--252},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022cip0023},
  doi          = {10.1587/TRANSFUN.2022CIP0023},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/NarisadaFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/IshizakaF23,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima},
  title        = {Wildcarded identity-based ring signatures based on linearly homomorphic
                  signatures},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {75},
  pages        = {103499},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103499},
  doi          = {10.1016/J.JISA.2023.103499},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/IshizakaF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/BajardFPS23,
  author       = {Jean{-}Claude Bajard and
                  Kazuhide Fukushima and
                  Thomas Plantard and
                  Arnaud Sipasseuth},
  title        = {Fast verification and public key storage optimization for unstructured
                  lattice-based signatures},
  journal      = {J. Cryptogr. Eng.},
  volume       = {13},
  number       = {3},
  pages        = {373--388},
  year         = {2023},
  url          = {https://doi.org/10.1007/s13389-023-00309-1},
  doi          = {10.1007/S13389-023-00309-1},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/BajardFPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IshizakaF23,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Homomorphic Signatures for Subset and Superset Mixed Predicates and
                  Its Applications},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {291--319},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_14},
  doi          = {10.1007/978-3-031-35486-1\_14},
  timestamp    = {Wed, 21 Jun 2023 16:37:47 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IshizakaF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acl/Nguyen-SonHFKE23,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Isao Echizen},
  editor       = {Anna Rogers and
                  Jordan L. Boyd{-}Graber and
                  Naoaki Okazaki},
  title        = {VoteTRANS: Detecting Adversarial Text without Training by Voting on
                  Hard Labels of Transformations},
  booktitle    = {Findings of the Association for Computational Linguistics: {ACL} 2023,
                  Toronto, Canada, July 9-14, 2023},
  pages        = {5090--5104},
  publisher    = {Association for Computational Linguistics},
  year         = {2023},
  url          = {https://doi.org/10.18653/v1/2023.findings-acl.315},
  doi          = {10.18653/V1/2023.FINDINGS-ACL.315},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acl/Nguyen-SonHFKE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/OkadaFKT23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13905},
  pages        = {695--724},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33488-7\_26},
  doi          = {10.1007/978-3-031-33488-7\_26},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/OkadaFKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/KhucSDGFK23,
  author       = {Thanh Xuan Khuc and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Fuchun Guo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Compact Accountable Ring Signatures in the Plain Model},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0942-7\_2},
  doi          = {10.1007/978-981-97-0942-7\_2},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/KhucSDGFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/NguyenSDGFK23,
  author       = {Tuong Ngoc Nguyen and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Fuchun Guo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Chunpeng Ge and
                  Moti Yung},
  title        = {Compact Ring Signatures with Post-Quantum Security in Standard Model},
  booktitle    = {Information Security and Cryptology - 19th International Conference,
                  Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected
                  Papers, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14526},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-0942-7\_4},
  doi          = {10.1007/978-981-97-0942-7\_4},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cisc/NguyenSDGFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AnandBCFIKLNST23,
  author       = {Ravi Anand and
                  Subhadeep Banik and
                  Andrea Caforio and
                  Kazuhide Fukushima and
                  Takanori Isobe and
                  Shinsaku Kiyomoto and
                  Fukang Liu and
                  Yuto Nakano and
                  Kosei Sakamoto and
                  Nobuyuki Takeuchi},
  editor       = {Gene Tsudik and
                  Mauro Conti and
                  Kaitai Liang and
                  Georgios Smaragdakis},
  title        = {An Ultra-High Throughput AES-Based Authenticated Encryption Scheme
                  for 6G: Design and Implementation},
  booktitle    = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
                  in Computer Security, The Hague, The Netherlands, September 25-29,
                  2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14344},
  pages        = {229--248},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-50594-2\_12},
  doi          = {10.1007/978-3-031-50594-2\_12},
  timestamp    = {Thu, 18 Jan 2024 08:27:15 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AnandBCFIKLNST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaart/NarisadaHF23,
  author       = {Shintaro Narisada and
                  Seira Hidano and
                  Kazuhide Fukushima},
  editor       = {Ana Paula Rocha and
                  Luc Steels and
                  H. Jaap van den Herik},
  title        = {Fully Hidden Dynamic Trigger Backdoor Attacks},
  booktitle    = {Proceedings of the 15th International Conference on Agents and Artificial
                  Intelligence, {ICAART} 2023, Volume 3, Lisbon, Portugal, February
                  22-24, 2023},
  pages        = {81--91},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011617800003393},
  doi          = {10.5220/0011617800003393},
  timestamp    = {Tue, 09 May 2023 16:57:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icaart/NarisadaHF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iceis/NakamuraOFI23,
  author       = {Toru Nakamura and
                  Hiroki Okada and
                  Kazuhide Fukushima and
                  Takamasa Isohara},
  editor       = {Joaquim Filipe and
                  Michal Smialek and
                  Alexander Brodsky and
                  Slimane Hammoudi},
  title        = {Achieving Private Verification in Multi-stakeholder Environment and
                  Application to Stable Matching},
  booktitle    = {Proceedings of the 25th International Conference on Enterprise Information
                  Systems, {ICEIS} 2023, Volume 1, Prague, Czech Republic, April 24-26,
                  2023},
  pages        = {768--775},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011995800003467},
  doi          = {10.5220/0011995800003467},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iceis/NakamuraOFI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/HasegawaHF23,
  author       = {Kento Hasegawa and
                  Seira Hidano and
                  Kazuhide Fukushima},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Automating {XSS} Vulnerability Testing Using Reinforcement Learning},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {70--80},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011653600003405},
  doi          = {10.5220/0011653600003405},
  timestamp    = {Thu, 11 May 2023 10:52:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/HasegawaHF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/NarisadaBFK23,
  author       = {Shintaro Narisada and
                  Shohei Beppu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Concrete Quantum Circuits to Prepare Generalized Dicke States on a
                  Quantum Machine},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {329--338},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011618000003405},
  doi          = {10.5220/0011618000003405},
  timestamp    = {Fri, 28 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/NarisadaBFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/OkadaF23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima},
  editor       = {Paolo Mori and
                  Gabriele Lenzini and
                  Steven Furnell},
  title        = {Revisiting the {DFT} Test in the {NIST} {SP} 800-22 Randomness Test
                  Suite},
  booktitle    = {Proceedings of the 9th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24,
                  2023},
  pages        = {366--372},
  publisher    = {SciTePress},
  year         = {2023},
  url          = {https://doi.org/10.5220/0011626300003405},
  doi          = {10.5220/0011626300003405},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/OkadaF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/0001F23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {SoK: Towards {CCA} Secure Fully Homomorphic Encryption},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {793--798},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012129800003555},
  doi          = {10.5220/0012129800003555},
  timestamp    = {Mon, 31 Jul 2023 15:34:21 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/0001F23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/space/KhucTSDGFK23,
  author       = {Thanh Xuan Khuc and
                  Anh The Ta and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Fuchun Guo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Francesco Regazzoni and
                  Bodhisatwa Mazumdar and
                  Sri Parameswaran},
  title        = {Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism
                  Problems},
  booktitle    = {Security, Privacy, and Applied Cryptography Engineering - 13th International
                  Conference, {SPACE} 2023, Roorkee, India, December 14-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14412},
  pages        = {214--241},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-51583-5\_13},
  doi          = {10.1007/978-3-031-51583-5\_13},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/space/KhucTSDGFK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wahc/Narisada0FKN23,
  author       = {Shintaro Narisada and
                  Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Takashi Nishide},
  editor       = {Michael Brenner and
                  Anamaria Costache and
                  Kurt Rohloff},
  title        = {{GPU} Acceleration of High-Precision Homomorphic Computation Utilizing
                  Redundant Representation},
  booktitle    = {Proceedings of the 11th Workshop on Encrypted Computing {\&} Applied
                  Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605759.3625256},
  doi          = {10.1145/3605759.3625256},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wahc/Narisada0FKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2306-01273,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Isao Echizen},
  title        = {VoteTRANS: Detecting Adversarial Text without Training by Voting on
                  Hard Labels of Transformations},
  journal      = {CoRR},
  volume       = {abs/2306.01273},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2306.01273},
  doi          = {10.48550/ARXIV.2306.01273},
  eprinttype    = {arXiv},
  eprint       = {2306.01273},
  timestamp    = {Mon, 12 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2306-01273.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2312-07022,
  author       = {Hiroya Kato and
                  Kento Hasegawa and
                  Seira Hidano and
                  Kazuhide Fukushima},
  title        = {EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning},
  journal      = {CoRR},
  volume       = {abs/2312.07022},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2312.07022},
  doi          = {10.48550/ARXIV.2312.07022},
  eprinttype    = {arXiv},
  eprint       = {2312.07022},
  timestamp    = {Thu, 04 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2312-07022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaedaMNFN23,
  author       = {Daisuke Maeda and
                  Koki Morimura and
                  Shintaro Narisada and
                  Kazuhide Fukushima and
                  Takashi Nishide},
  title        = {Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer
                  Functions and Their Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {366},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/366},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MaedaMNFN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkadaFKT23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/479},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkadaFKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshizakaF23,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima},
  title        = {Homomorphic Signatures for Subset and Superset Mixed Predicates and
                  Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {746},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/746},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshizakaF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NarisadaOFKN23,
  author       = {Shintaro Narisada and
                  Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Takashi Nishide},
  title        = {{GPU} Acceleration of High-Precision Homomorphic Computation Utilizing
                  Redundant Representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1467},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1467},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NarisadaOFKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OkadaTFKT22,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Erratum: {A} Compact Digital Signature Scheme Based on the Module-LWR
                  Problem {[IEICE} Transactions on Fundamentals of Electronics, Communications
                  and Computer Sciences Vol. {E104.A} (2021), No. 9 pp.1219-1234]},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {2},
  pages        = {130},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2022eae0001},
  doi          = {10.1587/TRANSFUN.2022EAE0001},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/TomitaTFNSM22,
  author       = {Chihiro Tomita and
                  Makoto Takita and
                  Kazuhide Fukushima and
                  Yuto Nakano and
                  Yoshiaki Shiraishi and
                  Masakatu Morii},
  title        = {Extracting the Secrets of OpenSSL with RAMBleed},
  journal      = {Sensors},
  volume       = {22},
  number       = {9},
  pages        = {3586},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22093586},
  doi          = {10.3390/S22093586},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/TomitaTFNSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/DuongRSFKS22,
  author       = {Dung Hoang Duong and
                  Partha Sarathi Roy and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Arnaud Sipasseuth},
  title        = {Chosen-ciphertext lattice-based public key encryption with equality
                  test in standard model},
  journal      = {Theor. Comput. Sci.},
  volume       = {905},
  pages        = {31--53},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.tcs.2021.12.013},
  doi          = {10.1016/J.TCS.2021.12.013},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/DuongRSFKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/RoyDSSFK22,
  author       = {Partha Sarathi Roy and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Arnaud Sipasseuth and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Lattice-based public-key encryption with equality test supporting
                  flexible authorization in standard model},
  journal      = {Theor. Comput. Sci.},
  volume       = {929},
  pages        = {124--139},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.tcs.2022.06.034},
  doi          = {10.1016/J.TCS.2022.06.034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/RoyDSSFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tetc/BajardFPS22,
  author       = {Jean{-}Claude Bajard and
                  Kazuhide Fukushima and
                  Thomas Plantard and
                  Arnaud Sipasseuth},
  title        = {Generating Very Large {RNS} Bases},
  journal      = {{IEEE} Trans. Emerg. Top. Comput.},
  volume       = {10},
  number       = {3},
  pages        = {1289--1301},
  year         = {2022},
  url          = {https://doi.org/10.1109/TETC.2022.3187072},
  doi          = {10.1109/TETC.2022.3187072},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tetc/BajardFPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/BajardFPS22,
  author       = {Jean{-}Claude Bajard and
                  Kazuhide Fukushima and
                  Thomas Plantard and
                  Arnaud Sipasseuth},
  title        = {Generating Very Large {RNS} Bases},
  booktitle    = {29th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2022, Lyon,
                  France, September 12-14, 2022},
  pages        = {102},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ARITH54963.2022.00027},
  doi          = {10.1109/ARITH54963.2022.00027},
  timestamp    = {Thu, 29 Dec 2022 15:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/BajardFPS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiaccs/0001JDSFK22,
  author       = {Priyanka Dutta and
                  Mei Jiang and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Yuji Suga and
                  Kouichi Sakurai and
                  Xuhua Ding and
                  Kazue Sako},
  title        = {Hierarchical Identity-based Puncturable Encryption from Lattices with
                  Application to Forward Security},
  booktitle    = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications
                  Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022},
  pages        = {408--422},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3488932.3517400},
  doi          = {10.1145/3488932.3517400},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiaccs/0001JDSFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/emnlp/Nguyen-SonUHFK22,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Huy Quang Ung and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Yoav Goldberg and
                  Zornitsa Kozareva and
                  Yue Zhang},
  title        = {CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction
                  Correction, and Perturbed Word Suggestion},
  booktitle    = {Findings of the Association for Computational Linguistics: {EMNLP}
                  2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022},
  pages        = {2903--2913},
  publisher    = {Association for Computational Linguistics},
  year         = {2022},
  url          = {https://doi.org/10.18653/v1/2022.findings-emnlp.210},
  doi          = {10.18653/V1/2022.FINDINGS-EMNLP.210},
  timestamp    = {Thu, 10 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/emnlp/Nguyen-SonUHFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/NguyenTLDSGFK22,
  author       = {Tuong Ngoc Nguyen and
                  Anh The Ta and
                  Huy Quoc Le and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Fuchun Guo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Vijayalakshmi Atluri and
                  Roberto Di Pietro and
                  Christian Damsgaard Jensen and
                  Weizhi Meng},
  title        = {Efficient Unique Ring Signatures from Lattices},
  booktitle    = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research
                  in Computer Security, Copenhagen, Denmark, September 26-30, 2022,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13555},
  pages        = {447--466},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17146-8\_22},
  doi          = {10.1007/978-3-031-17146-8\_22},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/NguyenTLDSGFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IshizakaFK22,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Trapdoor Sanitizable and Redactable Signatures with Unlinkability,
                  Invisibility and Strong Context-Hiding},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {337--362},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_17},
  doi          = {10.1007/978-3-031-29371-9\_17},
  timestamp    = {Thu, 06 Apr 2023 10:01:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IshizakaFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IshizakaF22,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Attribute-Based Signatures for Range of Inner Product and Its Applications},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {382--407},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_19},
  doi          = {10.1007/978-3-031-29371-9\_19},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IshizakaF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iolts/YamashitaKHHFT22,
  author       = {Kazuki Yamashita and
                  Tomohiro Kato and
                  Kento Hasegawa and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Nozomu Togawa},
  editor       = {Alessandro Savino and
                  Paolo Rech and
                  Stefano Di Carlo and
                  Dimitris Gizopoulos},
  title        = {Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks
                  at Gate-Level Netlists},
  booktitle    = {28th {IEEE} International Symposium on On-Line Testing and Robust
                  System Design, {IOLTS} 2022, Torino, Italy, September 12-14, 2022},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IOLTS56730.2022.9897557},
  doi          = {10.1109/IOLTS56730.2022.9897557},
  timestamp    = {Thu, 06 Oct 2022 14:48:19 +0200},
  biburl       = {https://dblp.org/rec/conf/iolts/YamashitaKHHFT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/DuttaDSFK22,
  author       = {Priyanka Dutta and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Chunpeng Ge and
                  Fuchun Guo},
  title        = {Zero-Knowledge Range Arguments for Signed Fractional Numbers from
                  Lattices},
  booktitle    = {Provable and Practical Security - 16th International Conference, ProvSec
                  2022, Nanjing, China, November 11-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13600},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20917-8\_9},
  doi          = {10.1007/978-3-031-20917-8\_9},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/DuttaDSFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FukushimaOTKHKS22,
  author       = {Kazuhide Fukushima and
                  Hiroki Okada and
                  Sofiane Takarabt and
                  Amina Korchi and
                  Meziane Hamoud and
                  Khaled Karray and
                  Youssef Souissy and
                  Sylvain Guilley},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Side-channel Analysis and Countermeasure for Implementation of Lattice-based
                  Signature},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {701--706},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328400003283},
  doi          = {10.5220/0011328400003283},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FukushimaOTKHKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenTLDSGFK22,
  author       = {Tuong Ngoc Nguyen and
                  Anh The Ta and
                  Huy Quoc Le and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Fuchun Guo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Efficient Unique Ring Signatures From Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1070},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1070},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenTLDSGFK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshizakaF22,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima},
  title        = {Attribute-Based Signatures for Range of Inner Product and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1451},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1451},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/IshizakaF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LeVDSLFK21,
  author       = {Huy Quoc Le and
                  Bay Vo and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Ngoc T. Le and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Identity-Based Linkable Ring Signatures From Lattices},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {84739--84755},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3087808},
  doi          = {10.1109/ACCESS.2021.3087808},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LeVDSLFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/LeDRSFK21,
  author       = {Huy Quoc Le and
                  Dung Hoang Duong and
                  Partha Sarathi Roy and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Lattice-based signcryption with equality test in standard model},
  journal      = {Comput. Stand. Interfaces},
  volume       = {76},
  pages        = {103515},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.csi.2021.103515},
  doi          = {10.1016/J.CSI.2021.103515},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csi/LeDRSFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/NarisadaOFK21,
  author       = {Shintaro Narisada and
                  Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Faster Rotation-Based Gauss Sieve for Solving the {SVP} on General
                  Ideal Lattices},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {1},
  pages        = {79--88},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020CIP0014},
  doi          = {10.1587/TRANSFUN.2020CIP0014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/NarisadaOFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OkadaTFKT21,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {A Compact Digital Signature Scheme Based on the Module-LWR Problem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {9},
  pages        = {1219--1234},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020dmp0012},
  doi          = {10.1587/TRANSFUN.2020DMP0012},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/0005FXKT21,
  author       = {Ye Yuan and
                  Kazuhide Fukushima and
                  Junting Xiao and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Memory-constrained implementation of lattice-based encryption scheme
                  on standard Java Card platform},
  journal      = {{IET} Inf. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {267--281},
  year         = {2021},
  url          = {https://doi.org/10.1049/ise2.12012},
  doi          = {10.1049/ISE2.12012},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/0005FXKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TaKNLDSFK21,
  author       = {Anh The Ta and
                  Thanh Xuan Khuc and
                  Tuong Ngoc Nguyen and
                  Huy Quoc Le and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Efficient Unique Ring Signature for Blockchain Privacy Protection},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {391--407},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_20},
  doi          = {10.1007/978-3-030-90567-5\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TaKNLDSFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/BajardFKPSS21,
  author       = {Jean{-}Claude Bajard and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Thomas Plantard and
                  Arnaud Sipasseuth and
                  Willy Susilo},
  title        = {Generating Residue Number System Bases},
  booktitle    = {28th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2021, Lyngby,
                  Denmark, June 14-16, 2021},
  pages        = {86--93},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ARITH51176.2021.00027},
  doi          = {10.1109/ARITH51176.2021.00027},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/arith/BajardFKPSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/NarisadaFK21,
  author       = {Shintaro Narisada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Fast {GPU} Implementation of Dumer's Algorithm Solving the Syndrome
                  Decoding Problem},
  booktitle    = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing
                  with Applications, Big Data {\&} Cloud Computing, Sustainable
                  Computing {\&} Communications, Social Computing {\&} Networking
                  (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September
                  30 - Oct. 3, 2021},
  pages        = {971--977},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00136},
  doi          = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00136},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispa/NarisadaFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/UemuraFKKT21,
  author       = {Shusaku Uemura and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Momonari Kudo and
                  Tsuyoshi Takagi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on
                  the {LWR} Problem},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_2},
  doi          = {10.1007/978-3-030-85987-9\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/UemuraFKKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paclic/Nguyen-SonHFK21,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Kaibao Hu and
                  Jong{-}Bok Kim and
                  Chengqing Zong and
                  Emmanuele Chersoni},
  title        = {{SEPP:} Similarity Estimation of Predicted Probabilities for Defending
                  and Detecting Adversarial Text},
  booktitle    = {Proceedings of the 35th Pacific Asia Conference on Language, Information
                  and Computation, {PACLIC} 2021, Shanghai International Studies University,
                  Shanghai, China, 5-7 November 2021},
  pages        = {11--20},
  publisher    = {Association for Computational Lingustics},
  year         = {2021},
  url          = {https://aclanthology.org/2021.paclic-1.2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paclic/Nguyen-SonHFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-05748,
  author       = {Hoang{-}Quoc Nguyen{-}Son and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {{SEPP:} Similarity Estimation of Predicted Probabilities for Defending
                  and Detecting Adversarial Text},
  journal      = {CoRR},
  volume       = {abs/2110.05748},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.05748},
  eprinttype    = {arXiv},
  eprint       = {2110.05748},
  timestamp    = {Thu, 21 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-05748.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-02213,
  author       = {Kento Hasegawa and
                  Kazuki Yamashita and
                  Seira Hidano and
                  Kazuhide Fukushima and
                  Kazuo Hashimoto and
                  Nozomu Togawa},
  title        = {Node-wise Hardware Trojan Detection Based on Graph Learning},
  journal      = {CoRR},
  volume       = {abs/2112.02213},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.02213},
  eprinttype    = {arXiv},
  eprint       = {2112.02213},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-02213.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkadaTFKT21,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {A Compact Digital Signature Scheme Based on the Module-LWR problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1699},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1699},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkadaTFKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkadaTFKT20,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {On the Complexity of the LWR-Solving {BKW} Algorithm},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {1},
  pages        = {173--182},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_173},
  doi          = {10.1587/TRANSFUN.2019CIP0022},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkadaTFKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/FukushimaPDKGF20,
  author       = {Kazuhide Fukushima and
                  Thomas Perianin and
                  Victor Dyseryn and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley and
                  Adrien Facon},
  editor       = {Melanie Volkamer and
                  Christian Wressnegger},
  title        = {Feasibility study of a camera-based {PUF} in a realistic scenario},
  booktitle    = {{ARES} 2020: The 15th International Conference on Availability, Reliability
                  and Security, Virtual Event, Ireland, August 25-28, 2020},
  pages        = {31:1--31:6},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3407023.3407047},
  doi          = {10.1145/3407023.3407047},
  timestamp    = {Mon, 03 Aug 2020 16:17:13 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/FukushimaPDKGF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/UenoFNKH20,
  author       = {Rei Ueno and
                  Kazuhide Fukushima and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Naofumi Homma},
  editor       = {Guido Marco Bertoni and
                  Francesco Regazzoni},
  title        = {Single-Trace Side-Channel Analysis on Polynomial-Based {MAC} Schemes},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 11th International
                  Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12244},
  pages        = {43--67},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68773-1\_3},
  doi          = {10.1007/978-3-030-68773-1\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/UenoFNKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/OkadaTFKT20,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Compact Digital Signature Scheme Based on the Module-LWR Problem},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_5},
  doi          = {10.1007/978-3-030-61078-4\_5},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/OkadaTFKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-03178,
  author       = {Dung Hoang Duong and
                  Partha Sarathi Roy and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Arnaud Sipasseuth},
  title        = {Lattice-based public key encryption with equality test in standard
                  model, revisited},
  journal      = {CoRR},
  volume       = {abs/2005.03178},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.03178},
  eprinttype    = {arXiv},
  eprint       = {2005.03178},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-03178.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-05308,
  author       = {Dung Hoang Duong and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Partha Sarathi Roy and
                  Arnaud Sipasseuth and
                  Willy Susilo},
  title        = {Lattice-based public key encryption with equality test supporting
                  flexible authorization in standard model},
  journal      = {CoRR},
  volume       = {abs/2005.05308},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.05308},
  eprinttype    = {arXiv},
  eprint       = {2005.05308},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-05308.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2012-15423,
  author       = {Huy Quoc Le and
                  Dung Hoang Duong and
                  Partha Sarathi Roy and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Lattice-based Signcryption with Equality Test in Standard Model},
  journal      = {CoRR},
  volume       = {abs/2012.15423},
  year         = {2020},
  url          = {https://arxiv.org/abs/2012.15423},
  eprinttype    = {arXiv},
  eprint       = {2012.15423},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2012-15423.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuongFK0S19,
  author       = {Dung Hoang Duong and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Partha Sarathi Roy and
                  Willy Susilo},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {A Lattice-Based Public Key Encryption with Equality Test in Standard
                  Model},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {138--155},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_8},
  doi          = {10.1007/978-3-030-21548-4\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DuongFK0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {67--74},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007259500670074},
  doi          = {10.5220/0007259500670074},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a,
  author       = {Kazuhide Fukushima and
                  Damien Marion and
                  Yuto Nakano and
                  Adrien Facon and
                  Shinsaku Kiyomoto and
                  Sylvain Guilley},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device},
  booktitle    = {Information Systems Security and Privacy - 5th International Conference,
                  {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised
                  Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1221},
  pages        = {74--92},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-49443-8\_4},
  doi          = {10.1007/978-3-030-49443-8\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0001MFKT19,
  author       = {Partha Sarathi Roy and
                  Kirill Morozov and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Security Analysis and Efficient Implementation of Code-based Signature
                  Schemes},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {213--220},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007259102130220},
  doi          = {10.5220/0007259102130220},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0001MFKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/FukushimaYKY19,
  author       = {Kazuhide Fukushima and
                  Ayumu Yoshimura and
                  Shinsaku Kiyomoto and
                  Norikazu Yamasaki},
  editor       = {Swee{-}Huay Heng and
                  Javier L{\'{o}}pez},
  title        = {Evaluation of Software {PUF} Based on Gyroscope},
  booktitle    = {Information Security Practice and Experience - 15th International
                  Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28,
                  2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11879},
  pages        = {232--247},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34339-2\_13},
  doi          = {10.1007/978-3-030-34339-2\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/FukushimaYKY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Dutta0FKS19,
  author       = {Sabyasachi Dutta and
                  Partha Sarathi Roy and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Kouichi Sakurai},
  editor       = {Ilsun You},
  title        = {Secret Sharing on Evolving Multi-level Access Structure},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_14},
  doi          = {10.1007/978-3-030-39303-8\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Dutta0FKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0001MFK19,
  author       = {Partha Sarathi Roy and
                  Kirill Morozov and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Evaluation of Code-based Signature Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {544},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/544},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0001MFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuanXFKT18,
  author       = {Ye Yuan and
                  Junting Xiao and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Portable Implementation of Postquantum Encryption Schemes and Key
                  Exchange Protocols on JavaScript-Enabled Platforms},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {9846168:1--9846168:14},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/9846168},
  doi          = {10.1155/2018/9846168},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/YuanXFKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/OkadaTFKT18,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Kwangsu Lee},
  title        = {On the Complexity of the LWR-Solving {BKW} Algorithm},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_13},
  doi          = {10.1007/978-3-030-12146-4\_13},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/OkadaTFKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/0001DMAFKS18,
  author       = {Partha Sarathi Roy and
                  Sabyasachi Dutta and
                  Kirill Morozov and
                  Avishek Adhikari and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Kouichi Sakurai},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary:
                  Cheater Identification and Robustness},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11125},
  pages        = {578--594},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_37},
  doi          = {10.1007/978-3-319-99807-7\_37},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/0001DMAFKS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuanFXKT18,
  author       = {Ye Yuan and
                  Kazuhide Fukushima and
                  Junting Xiao and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Memory-Constrained Implementation of Lattice-based Encryption Scheme
                  on the Standard Java Card Platform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1238},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuanFXKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XuYFTSKH17,
  author       = {Rui Xu and
                  Sze Ling Yeo and
                  Kazuhide Fukushima and
                  Tsuyoshi Takagi and
                  Hwajung Seo and
                  Shinsaku Kiyomoto and
                  Matt Henricksen},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {An Experimental Study of the {BDD} Approach for the Search {LWE} Problem},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {253--272},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_13},
  doi          = {10.1007/978-3-319-61204-1\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/XuYFTSKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/KawaiUHAFK17,
  author       = {Wataru Kawai and
                  Rei Ueno and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  title        = {Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers},
  booktitle    = {2017 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017},
  pages        = {113--121},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/EuroSPW.2017.60},
  doi          = {10.1109/EUROSPW.2017.60},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/KawaiUHAFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/YuanFKT17,
  author       = {Ye Yuan and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Memory-constrained implementation of lattice-based encryption scheme
                  on standard Java Card},
  booktitle    = {2017 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017},
  pages        = {47--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HST.2017.7951796},
  doi          = {10.1109/HST.2017.7951796},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/YuanFKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/FukushimaHK17,
  author       = {Kazuhide Fukushima and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {White-box Implementation of Stream Cipher},
  booktitle    = {Proceedings of the 3rd International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21,
                  2017},
  pages        = {263--269},
  publisher    = {SciTePress},
  year         = {2017},
  url          = {https://doi.org/10.5220/0006115202630269},
  doi          = {10.5220/0006115202630269},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/FukushimaHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/BasuRXFK17,
  author       = {Anirban Basu and
                  Mohammad Shahriar Rahman and
                  Rui Xu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Jan{-}Philipp Stegh{\"{o}}fer and
                  Babak Esfandiari},
  title        = {VIGraph - {A} Framework for Verifiable Information},
  booktitle    = {Trust Management {XI} - 11th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {505},
  pages        = {12--20},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59171-1\_2},
  doi          = {10.1007/978-3-319-59171-1\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/BasuRXFK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaXKH17,
  author       = {Kazuhide Fukushima and
                  Rui Xu and
                  Shinsaku Kiyomoto and
                  Naofumi Homma},
  title        = {Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1032--1037},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.348},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.348},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaXKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FukushimaHK16,
  author       = {Kazuhide Fukushima and
                  Seira Hidano and
                  Shinsaku Kiyomoto},
  editor       = {Christian Callegari and
                  Marten van Sinderen and
                  Panagiotis G. Sarigiannidis and
                  Pierangela Samarati and
                  Enrique Cabello and
                  Pascal Lorenz and
                  Mohammad S. Obaidat},
  title        = {Sensor-based Wearable {PUF}},
  booktitle    = {Proceedings of the 13th International Joint Conference on e-Business
                  and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon,
                  Portugal, July 26-28, 2016},
  pages        = {207--214},
  publisher    = {SciTePress},
  year         = {2016},
  url          = {https://doi.org/10.5220/0005946702070214},
  doi          = {10.5220/0005946702070214},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FukushimaHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16,
  author       = {Kazuhide Fukushima and
                  Youssef Souissi and
                  Seira Hidano and
                  Robert Nguyen and
                  Jean{-}Luc Danger and
                  Sylvain Guilley and
                  Yuto Nakano and
                  Shinsaku Kiyomoto and
                  Laurent Sauvage},
  title        = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes:
                  The Final Piece of All-in-One Assessment Methodology},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {201--207},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0064},
  doi          = {10.1109/TRUSTCOM.2016.0064},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakanoFKIMTS14,
  author       = {Yuto Nakano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsukasa Ishiguro and
                  Yutaka Miyake and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {Fast Implementation of KCipher-2 for Software and Hardware},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {97-D},
  number       = {1},
  pages        = {43--52},
  year         = {2014},
  url          = {https://doi.org/10.1587/transinf.E97.D.43},
  doi          = {10.1587/TRANSINF.E97.D.43},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakanoFKIMTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HibikiHNFKMA14,
  author       = {Takafumi Hibiki and
                  Naofumi Homma and
                  Yuto Nakano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Takafumi Aoki},
  title        = {Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based
                  Countermeasure},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {1},
  pages        = {157--166},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.157},
  doi          = {10.1587/TRANSFUN.E97.A.157},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/HibikiHNFKMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/KiyomotoFM14,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  title        = {Security issues on {IT} systems during disasters: a survey},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {5},
  number       = {2},
  pages        = {173--185},
  year         = {2014},
  url          = {https://doi.org/10.1007/s12652-013-0177-8},
  doi          = {10.1007/S12652-013-0177-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jaihc/KiyomotoFM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/HibikiHNFKMA13,
  author       = {Takafumi Hibiki and
                  Naofumi Homma and
                  Yuto Nakano and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Takafumi Aoki},
  editor       = {Emmanuel Prouff},
  title        = {Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 4th International
                  Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7864},
  pages        = {169--183},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40026-1\_11},
  doi          = {10.1007/978-3-642-40026-1\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/HibikiHNFKMA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/JiaAFBSFKM13,
  author       = {Limin Jia and
                  Jassim Aljuraidan and
                  Elli Fragkaki and
                  Lujo Bauer and
                  Michael Stroucken and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  editor       = {Jason Crampton and
                  Sushil Jajodia and
                  Keith Mayes},
  title        = {Run-Time Enforcement of Information-Flow Properties on Android - (Extended
                  Abstract)},
  booktitle    = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
                  in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8134},
  pages        = {775--792},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40203-6\_43},
  doi          = {10.1007/978-3-642-40203-6\_43},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/JiaAFBSFKM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FukushimaKM12,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  title        = {Software Protection Combined with Tamper-Proof Device},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {213--222},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.213},
  doi          = {10.1587/TRANSFUN.E95.A.213},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/FukushimaKM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/KiyomotoFM12,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  title        = {Design of Categorization Mechanism for Disaster-Information-Gathering
                  System},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {3},
  number       = {4},
  pages        = {21--34},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.12.31.021},
  doi          = {10.22667/JOWUA.2012.12.31.021},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/KiyomotoFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KiyomotoFM12,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  editor       = {Gerald Quirchmayr and
                  Josef Basl and
                  Ilsun You and
                  Lida Xu and
                  Edgar R. Weippl},
  title        = {Security-and-Privacy-Related Issues on {IT} Systems During Disasters},
  booktitle    = {Multidisciplinary Research and Practice for Information Systems -
                  {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and
                  Workshop on Availability, Reliability, and Security, {CD-ARES} 2012,
                  Prague, Czech Republic, August 20-24, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7465},
  pages        = {445--459},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32498-7\_33},
  doi          = {10.1007/978-3-642-32498-7\_33},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KiyomotoFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KiyomotoFM12,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  editor       = {Ioannis G. Askoxylakis and
                  Henrich Christopher P{\"{o}}hls and
                  Joachim Posegga},
  title        = {Privacy Preservation of User History Graph},
  booktitle    = {Information Security Theory and Practice. Security, Privacy and Trust
                  in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP}
                  {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7322},
  pages        = {87--96},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30955-7\_9},
  doi          = {10.1007/978-3-642-30955-7\_9},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KiyomotoFM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/FukushimaKM11,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  title        = {Towards Secure Cloud Computing Architecture - {A} Solution Based on
                  Software Protection Mechanism},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {1},
  number       = {1},
  pages        = {4--17},
  year         = {2011},
  url          = {https://doi.org/10.22667/JISIS.2011.05.31.004},
  doi          = {10.22667/JISIS.2011.05.31.004},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/FukushimaKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/ShinFKM11,
  author       = {Wook Shin and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake},
  title        = {{AMY:} Use your cell phone to create a protected personal network
                  over devices},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {57},
  number       = {1},
  pages        = {99--104},
  year         = {2011},
  url          = {https://doi.org/10.1109/TCE.2011.5735487},
  doi          = {10.1109/TCE.2011.5735487},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/ShinFKM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NakanoCFK11,
  author       = {Yuto Nakano and
                  Carlos Cid and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Analysis of Message Injection in Stream Cipher-Based Hash Functions},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {498--513},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_29},
  doi          = {10.1007/978-3-642-21554-4\_29},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NakanoCFK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/KiyomotoFM11,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Yutaka Miyake},
  editor       = {Tai{-}Hoon Kim and
                  Hojjat Adeli and
                  Wai{-}Chi Fang and
                  L. Javier Garc{\'{\i}}a{-}Villalba and
                  Kirk P. Arnett and
                  Muhammad Khurram Khan},
  title        = {Data Anonymity in Multi-Party Service Model},
  booktitle    = {Security Technology - International Conference, SecTech 2011, Held
                  as Part of the Future Generation Information Technology Conference,
                  {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December
                  8-10, 2011. Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {259},
  pages        = {21--30},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27189-2\_3},
  doi          = {10.1007/978-3-642-27189-2\_3},
  timestamp    = {Sat, 30 Sep 2023 09:41:06 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/KiyomotoFM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/FukushimaKMS11,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Kouichi Sakurai},
  editor       = {Mohammad S. Obaidat and
                  Jos{\'{e}} Luis Sevillano and
                  Joaquim Filipe},
  title        = {Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast
                  Encryption Scheme},
  booktitle    = {E-Business and Telecommunications - International Joint Conference,
                  {ICETE} 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {314},
  pages        = {233--248},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-35755-8\_17},
  doi          = {10.1007/978-3-642-35755-8\_17},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/FukushimaKMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KiyomotoHYNF11,
  author       = {Shinsaku Kiyomoto and
                  Matthew Henricksen and
                  Wun{-}She Yap and
                  Yuto Nakano and
                  Kazuhide Fukushima},
  editor       = {Xuejia Lai and
                  Jianying Zhou and
                  Hui Li},
  title        = {{MASHA} - Low Cost Authentication with a New Stream Cipher},
  booktitle    = {Information Security, 14th International Conference, {ISC} 2011, Xi'an,
                  China, October 26-29, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7001},
  pages        = {63--78},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24861-0\_5},
  doi          = {10.1007/978-3-642-24861-0\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KiyomotoHYNF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FukushimaKMS11,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Kouichi Sakurai},
  editor       = {Javier L{\'{o}}pez and
                  Pierangela Samarati},
  title        = {Towards Optimal Revocation and Tracing Schemes - The Power of the
                  Ternary Tree},
  booktitle    = {{SECRYPT} 2011 - Proceedings of the International Conference on Security
                  and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {37--49},
  publisher    = {SciTePress},
  year         = {2011},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FukushimaKMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FukushimaKTS10,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {Improved Subset Difference Method with Ternary Tree},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {11},
  pages        = {2034--2044},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.2034},
  doi          = {10.1587/TRANSFUN.E93.A.2034},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FukushimaKTS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/ShinKFT10,
  author       = {Wook Shin and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi and
                  Michael R. Grimaila and
                  George Markowsky and
                  Selim Aissi and
                  Victor A. Clincy and
                  Leonidas Deligiannidis and
                  Donara Gabrielyan and
                  Gevorg Margarov and
                  Ashu M. G. Solo and
                  Craig Valli and
                  Patricia A. H. Williams},
  title        = {A Frst Step Towards Automated Permission-enforcement Analysis of the
                  Android Framework},
  booktitle    = {Proceedings of the 2010 International Conference on Security {\&}
                  Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {323--329},
  publisher    = {{CSREA} Press},
  year         = {2010},
  timestamp    = {Fri, 10 Dec 2010 11:46:08 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/ShinKFT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IyamaKFTT10,
  author       = {Tadashi Iyama and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka and
                  Tsuyoshi Takagi},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Efficient Implementation of Pairing on {BREW} Mobile Phones},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {326--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_22},
  doi          = {10.1007/978-3-642-16825-3\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IyamaKFTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/policy/ShinKKFT10,
  author       = {Wook Shin and
                  Sanghoon Kwak and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {A Small But Non-negligible Flaw in the Android Permission Scheme},
  booktitle    = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed
                  Systems and Networks, Fairfax, VA, USA, 21-23 July 2010},
  pages        = {107--110},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/POLICY.2010.11},
  doi          = {10.1109/POLICY.2010.11},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/policy/ShinKKFT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/ShinKFT10,
  author       = {Wook Shin and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  editor       = {Ahmed K. Elmagarmid and
                  Divyakant Agrawal},
  title        = {A Formal Model to Analyze the Permission Authorization and Enforcement
                  in the Android Framework},
  booktitle    = {Proceedings of the 2010 {IEEE} Second International Conference on
                  Social Computing, SocialCom / {IEEE} International Conference on Privacy,
                  Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA,
                  August 20-22, 2010},
  pages        = {944--951},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/SocialCom.2010.140},
  doi          = {10.1109/SOCIALCOM.2010.140},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialcom/ShinKFT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KiyomotoFT09,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {Design of Anonymous Attribute Authentication Mechanism},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {92-B},
  number       = {4},
  pages        = {1112--1118},
  year         = {2009},
  url          = {https://doi.org/10.1587/transcom.E92.B.1112},
  doi          = {10.1587/TRANSCOM.E92.B.1112},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KiyomotoFT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KuriharaKFT09,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {A Fast (\emph{k}, \emph{L}, \emph{n})-Threshold Ramp Secret Sharing
                  Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {8},
  pages        = {1808--1821},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1808},
  doi          = {10.1587/TRANSFUN.E92.A.1808},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KuriharaKFT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/FukushimaKT09,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Obfuscation Mechanism in Conjunction with Tamper-Proof Module},
  booktitle    = {Proceedings of the 12th {IEEE} International Conference on Computational
                  Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
                  29-31, 2009},
  pages        = {665--670},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/CSE.2009.20},
  doi          = {10.1109/CSE.2009.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cse/FukushimaKT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/KiyomotoFM09,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Keith M. Martin},
  editor       = {Mohammad S. Obaidat and
                  Joaquim Filipe},
  title        = {Offline Peer-to-Peer Broadcast with Anonymity},
  booktitle    = {e-Business and Telecommunications - 6th International Joint Conference,
                  {ICETE} 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {130},
  pages        = {174--185},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-20077-9\_12},
  doi          = {10.1007/978-3-642-20077-9\_12},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/KiyomotoFM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ShinGKFT09,
  author       = {Wook Shin and
                  Carl A. Gunter and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  editor       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {How to Bootstrap Security for Ad-Hoc Network: Revisited},
  booktitle    = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC}
                  11 International Information Security Conference, {SEC} 2009, Pafos,
                  Cyprus, May 18-20, 2009. Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {297},
  pages        = {119--131},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01244-0\_11},
  doi          = {10.1007/978-3-642-01244-0\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ShinGKFT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KiyomotoFM09,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Keith M. Martin},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {An Offline Peer-to-peer Broadcasting Scheme with Anonymity},
  booktitle    = {{SECRYPT} 2009, Proceedings of the International Conference on Security
                  and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {75--82},
  publisher    = {{INSTICC} Press},
  year         = {2009},
  timestamp    = {Thu, 10 Sep 2009 21:15:22 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/KiyomotoFM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wistp/KiyomotoMF09,
  author       = {Shinsaku Kiyomoto and
                  Keith M. Martin and
                  Kazuhide Fukushima},
  editor       = {Olivier Markowitch and
                  Angelos Bilas and
                  Jaap{-}Henk Hoepman and
                  Chris J. Mitchell and
                  Jean{-}Jacques Quisquater},
  title        = {Privacy-Aware Location Database Service for Granular Queries},
  booktitle    = {Information Security Theory and Practice. Smart Devices, Pervasive
                  Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International
                  Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5746},
  pages        = {28--37},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03944-7\_3},
  doi          = {10.1007/978-3-642-03944-7\_3},
  timestamp    = {Sun, 02 Oct 2022 16:17:41 +0200},
  biburl       = {https://dblp.org/rec/conf/wistp/KiyomotoMF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KuriharaKFT08,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {A Fast (3, \emph{n})-Threshold Secret Sharing Scheme Using Exclusive-OR
                  Operations},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {127--138},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.127},
  doi          = {10.1093/IETFEC/E91-A.1.127},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KuriharaKFT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FukushimaKTS08,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {Analysis of Program Obfuscation Schemes with Variable Encoding Technique},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {316--329},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.316},
  doi          = {10.1093/IETFEC/E91-A.1.316},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FukushimaKTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KuriharaKFT08a,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {On a Fast (\emph{k, n})-Threshold Secret Sharing Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {9},
  pages        = {2365--2378},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.9.2365},
  doi          = {10.1093/IETFEC/E91-A.9.2365},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KuriharaKFT08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/FukushimaKTS08,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {Optimization of Group Key Management Structure with a Client Join-Leave
                  Mechanism},
  journal      = {J. Inf. Process.},
  volume       = {16},
  pages        = {130--141},
  year         = {2008},
  url          = {https://doi.org/10.2197/ipsjjip.16.130},
  doi          = {10.2197/IPSJJIP.16.130},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/FukushimaKTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KuriharaKFT08,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  editor       = {Tzong{-}Chen Wu and
                  Chin{-}Laung Lei and
                  Vincent Rijmen and
                  Der{-}Tsai Lee},
  title        = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension},
  booktitle    = {Information Security, 11th International Conference, {ISC} 2008, Taipei,
                  Taiwan, September 15-18, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5222},
  pages        = {455--470},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85886-7\_31},
  doi          = {10.1007/978-3-540-85886-7\_31},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KuriharaKFT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FukushimaKTS08,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Ternary Subset Difference Method and Its Quantitative Analysis},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {225--239},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_17},
  doi          = {10.1007/978-3-642-00306-6\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FukushimaKTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KuriharaKFT08,
  author       = {Jun Kurihara and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka},
  title        = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KuriharaKFT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KiyomotoFTS07,
  author       = {Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka and
                  Kouichi Sakurai},
  title        = {On Effectiveness of Clock Control in Stream Ciphers},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {9},
  pages        = {1780--1787},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.9.1780},
  doi          = {10.1093/IETFEC/E90-A.9.1780},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KiyomotoFTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jips/SakuraiF07,
  author       = {Kouichi Sakurai and
                  Kazuhide Fukushima},
  title        = {Actual Condition and Issues for Mobile Security System},
  journal      = {J. Inf. Process. Syst.},
  volume       = {3},
  number       = {2},
  pages        = {54--63},
  year         = {2007},
  url          = {https://doi.org/10.3745/JIPS.2008.3.2.054},
  doi          = {10.3745/JIPS.2008.3.2.054},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jips/SakuraiF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mdm/FukushimaKT06,
  author       = {Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile
                  Services},
  booktitle    = {7th International Conference on Mobile Data Management {(MDM} 2006),
                  Nara, Japan, May 9-13, 2006},
  pages        = {17},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/MDM.2006.83},
  doi          = {10.1109/MDM.2006.83},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mdm/FukushimaKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FukushimaS03,
  author       = {Kazuhide Fukushima and
                  Kouichi Sakurai},
  editor       = {Kijoon Chae and
                  Moti Yung},
  title        = {A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation},
  booktitle    = {Information Security Applications, 4th International Workshop, {WISA}
                  2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2908},
  pages        = {303--316},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24591-9\_23},
  doi          = {10.1007/978-3-540-24591-9\_23},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FukushimaS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics