Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kazuhide Fukushima
@article{DBLP:journals/ieiceta/MaedaMNFN24, author = {Daisuke Maeda and Koki Morimura and Shintaro Narisada and Kazuhide Fukushima and Takashi Nishide}, title = {Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {107}, number = {3}, pages = {234--247}, year = {2024}, url = {https://doi.org/10.1587/transfun.2023cip0010}, doi = {10.1587/TRANSFUN.2023CIP0010}, timestamp = {Thu, 04 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/MaedaMNFN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sncs/NakamuraOFI24, author = {Toru Nakamura and Hiroki Okada and Kazuhide Fukushima and Takamasa Isohara}, title = {Private Verification in Multi-stakeholder Environment and its Application to Stable Matching}, journal = {{SN} Comput. Sci.}, volume = {5}, number = {3}, pages = {309}, year = {2024}, url = {https://doi.org/10.1007/s42979-024-02631-9}, doi = {10.1007/S42979-024-02631-9}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sncs/NakamuraOFI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HasegawaHSKFMK24, author = {Kento Hasegawa and Katsutoshi Hanahara and Hiroshi Sugisaki and Minoru Kozu and Kazuhide Fukushima and Yosuke Murakami and Shinsaku Kiyomoto}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Vulnerability Information Sharing Platform for Securing Hardware Supply Chains}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {403--410}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012351800003648}, doi = {10.5220/0012351800003648}, timestamp = {Tue, 02 Apr 2024 14:37:52 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HasegawaHSKFMK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NguyenCHFB24, author = {Huynh Phuong Thanh Nguyen and Zhi Chen and Kento Hasegawa and Kazuhide Fukushima and Razvan Beuran}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {PenGym: Pentesting Training Framework for Reinforcement Learning Agents}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {498--509}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012367300003648}, doi = {10.5220/0012367300003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NguyenCHFB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/MeguroKNHFSH24, author = {Ryo Meguro and Hiroya Kato and Shintaro Narisada and Seira Hidano and Kazuhide Fukushima and Takuo Suganuma and Masahiro Hiji}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {510--521}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012369500003648}, doi = {10.5220/0012369500003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/MeguroKNHFSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/UemuraF24, author = {Shusaku Uemura and Kazuhide Fukushima}, editor = {Gabriele Lenzini and Paolo Mori and Steven Furnell}, title = {Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data}, booktitle = {Proceedings of the 10th International Conference on Information Systems Security and Privacy, {ICISSP} 2024, Rome, Italy, February 26-28, 2024}, pages = {534--545}, publisher = {{SCITEPRESS}}, year = {2024}, url = {https://doi.org/10.5220/0012394600003648}, doi = {10.5220/0012394600003648}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/UemuraF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NarisadaUOFAF24, author = {Shintaro Narisada and Shusaku Uemura and Hiroki Okada and Hiroki Furue and Yusuke Aikawa and Kazuhide Fukushima}, title = {Revisiting the May-Meurer-Thomae Algorithm - Solving McEliece-1409 in One Day}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {393}, year = {2024}, url = {https://eprint.iacr.org/2024/393}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/NarisadaUOFAF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/PhuongPF23, author = {Tran Thi Phuong and Le Trieu Phong and Kazuhide Fukushima}, title = {Distributed Stochastic Gradient Descent With Compressed and Skipped Communication}, journal = {{IEEE} Access}, volume = {11}, pages = {99836--99846}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3315331}, doi = {10.1109/ACCESS.2023.3315331}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/PhuongPF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/NarisadaFK23, author = {Shintaro Narisada and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Multiparallel {MMT:} Faster {ISD} Algorithm Solving High-Dimensional Syndrome Decoding Problem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {3}, pages = {241--252}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022cip0023}, doi = {10.1587/TRANSFUN.2022CIP0023}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/NarisadaFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/IshizakaF23, author = {Masahito Ishizaka and Kazuhide Fukushima}, title = {Wildcarded identity-based ring signatures based on linearly homomorphic signatures}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103499}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103499}, doi = {10.1016/J.JISA.2023.103499}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/IshizakaF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BajardFPS23, author = {Jean{-}Claude Bajard and Kazuhide Fukushima and Thomas Plantard and Arnaud Sipasseuth}, title = {Fast verification and public key storage optimization for unstructured lattice-based signatures}, journal = {J. Cryptogr. Eng.}, volume = {13}, number = {3}, pages = {373--388}, year = {2023}, url = {https://doi.org/10.1007/s13389-023-00309-1}, doi = {10.1007/S13389-023-00309-1}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BajardFPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IshizakaF23, author = {Masahito Ishizaka and Kazuhide Fukushima}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {291--319}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_14}, doi = {10.1007/978-3-031-35486-1\_14}, timestamp = {Wed, 21 Jun 2023 16:37:47 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IshizakaF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/Nguyen-SonHFKE23, author = {Hoang{-}Quoc Nguyen{-}Son and Seira Hidano and Kazuhide Fukushima and Shinsaku Kiyomoto and Isao Echizen}, editor = {Anna Rogers and Jordan L. Boyd{-}Graber and Naoaki Okazaki}, title = {VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations}, booktitle = {Findings of the Association for Computational Linguistics: {ACL} 2023, Toronto, Canada, July 9-14, 2023}, pages = {5090--5104}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.findings-acl.315}, doi = {10.18653/V1/2023.FINDINGS-ACL.315}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/Nguyen-SonHFKE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/OkadaFKT23, author = {Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13905}, pages = {695--724}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33488-7\_26}, doi = {10.1007/978-3-031-33488-7\_26}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/OkadaFKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/KhucSDGFK23, author = {Thanh Xuan Khuc and Willy Susilo and Dung Hoang Duong and Fuchun Guo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Chunpeng Ge and Moti Yung}, title = {Compact Accountable Ring Signatures in the Plain Model}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, pages = {23--43}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0942-7\_2}, doi = {10.1007/978-981-97-0942-7\_2}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/KhucSDGFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/NguyenSDGFK23, author = {Tuong Ngoc Nguyen and Willy Susilo and Dung Hoang Duong and Fuchun Guo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Chunpeng Ge and Moti Yung}, title = {Compact Ring Signatures with Post-Quantum Security in Standard Model}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14526}, pages = {65--84}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0942-7\_4}, doi = {10.1007/978-981-97-0942-7\_4}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cisc/NguyenSDGFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AnandBCFIKLNST23, author = {Ravi Anand and Subhadeep Banik and Andrea Caforio and Kazuhide Fukushima and Takanori Isobe and Shinsaku Kiyomoto and Fukang Liu and Yuto Nakano and Kosei Sakamoto and Nobuyuki Takeuchi}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14344}, pages = {229--248}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-50594-2\_12}, doi = {10.1007/978-3-031-50594-2\_12}, timestamp = {Thu, 18 Jan 2024 08:27:15 +0100}, biburl = {https://dblp.org/rec/conf/esorics/AnandBCFIKLNST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaart/NarisadaHF23, author = {Shintaro Narisada and Seira Hidano and Kazuhide Fukushima}, editor = {Ana Paula Rocha and Luc Steels and H. Jaap van den Herik}, title = {Fully Hidden Dynamic Trigger Backdoor Attacks}, booktitle = {Proceedings of the 15th International Conference on Agents and Artificial Intelligence, {ICAART} 2023, Volume 3, Lisbon, Portugal, February 22-24, 2023}, pages = {81--91}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011617800003393}, doi = {10.5220/0011617800003393}, timestamp = {Tue, 09 May 2023 16:57:00 +0200}, biburl = {https://dblp.org/rec/conf/icaart/NarisadaHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/NakamuraOFI23, author = {Toru Nakamura and Hiroki Okada and Kazuhide Fukushima and Takamasa Isohara}, editor = {Joaquim Filipe and Michal Smialek and Alexander Brodsky and Slimane Hammoudi}, title = {Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching}, booktitle = {Proceedings of the 25th International Conference on Enterprise Information Systems, {ICEIS} 2023, Volume 1, Prague, Czech Republic, April 24-26, 2023}, pages = {768--775}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0011995800003467}, doi = {10.5220/0011995800003467}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iceis/NakamuraOFI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/HasegawaHF23, author = {Kento Hasegawa and Seira Hidano and Kazuhide Fukushima}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Automating {XSS} Vulnerability Testing Using Reinforcement Learning}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {70--80}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011653600003405}, doi = {10.5220/0011653600003405}, timestamp = {Thu, 11 May 2023 10:52:54 +0200}, biburl = {https://dblp.org/rec/conf/icissp/HasegawaHF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/NarisadaBFK23, author = {Shintaro Narisada and Shohei Beppu and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {329--338}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011618000003405}, doi = {10.5220/0011618000003405}, timestamp = {Fri, 28 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/NarisadaBFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/OkadaF23, author = {Hiroki Okada and Kazuhide Fukushima}, editor = {Paolo Mori and Gabriele Lenzini and Steven Furnell}, title = {Revisiting the {DFT} Test in the {NIST} {SP} 800-22 Randomness Test Suite}, booktitle = {Proceedings of the 9th International Conference on Information Systems Security and Privacy, {ICISSP} 2023, Lisbon, Portugal, February 22-24, 2023}, pages = {366--372}, publisher = {SciTePress}, year = {2023}, url = {https://doi.org/10.5220/0011626300003405}, doi = {10.5220/0011626300003405}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/OkadaF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/0001F23, author = {Hiroki Okada and Kazuhide Fukushima}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {SoK: Towards {CCA} Secure Fully Homomorphic Encryption}, booktitle = {Proceedings of the 20th International Conference on Security and Cryptography, {SECRYPT} 2023, Rome, Italy, July 10-12, 2023}, pages = {793--798}, publisher = {{SCITEPRESS}}, year = {2023}, url = {https://doi.org/10.5220/0012129800003555}, doi = {10.5220/0012129800003555}, timestamp = {Mon, 31 Jul 2023 15:34:21 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/0001F23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/space/KhucTSDGFK23, author = {Thanh Xuan Khuc and Anh The Ta and Willy Susilo and Dung Hoang Duong and Fuchun Guo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Francesco Regazzoni and Bodhisatwa Mazumdar and Sri Parameswaran}, title = {Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems}, booktitle = {Security, Privacy, and Applied Cryptography Engineering - 13th International Conference, {SPACE} 2023, Roorkee, India, December 14-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14412}, pages = {214--241}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51583-5\_13}, doi = {10.1007/978-3-031-51583-5\_13}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/space/KhucTSDGFK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wahc/Narisada0FKN23, author = {Shintaro Narisada and Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto and Takashi Nishide}, editor = {Michael Brenner and Anamaria Costache and Kurt Rohloff}, title = {{GPU} Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation}, booktitle = {Proceedings of the 11th Workshop on Encrypted Computing {\&} Applied Homomorphic Cryptography, Copenhagen, Denmark, 26 November 2023}, pages = {1--9}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605759.3625256}, doi = {10.1145/3605759.3625256}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wahc/Narisada0FKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2306-01273, author = {Hoang{-}Quoc Nguyen{-}Son and Seira Hidano and Kazuhide Fukushima and Shinsaku Kiyomoto and Isao Echizen}, title = {VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations}, journal = {CoRR}, volume = {abs/2306.01273}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2306.01273}, doi = {10.48550/ARXIV.2306.01273}, eprinttype = {arXiv}, eprint = {2306.01273}, timestamp = {Mon, 12 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2306-01273.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-07022, author = {Hiroya Kato and Kento Hasegawa and Seira Hidano and Kazuhide Fukushima}, title = {EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning}, journal = {CoRR}, volume = {abs/2312.07022}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.07022}, doi = {10.48550/ARXIV.2312.07022}, eprinttype = {arXiv}, eprint = {2312.07022}, timestamp = {Thu, 04 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-07022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaedaMNFN23, author = {Daisuke Maeda and Koki Morimura and Shintaro Narisada and Kazuhide Fukushima and Takashi Nishide}, title = {Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {366}, year = {2023}, url = {https://eprint.iacr.org/2023/366}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MaedaMNFN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkadaFKT23, author = {Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2023}, url = {https://eprint.iacr.org/2023/479}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkadaFKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshizakaF23, author = {Masahito Ishizaka and Kazuhide Fukushima}, title = {Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {746}, year = {2023}, url = {https://eprint.iacr.org/2023/746}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshizakaF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NarisadaOFKN23, author = {Shintaro Narisada and Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto and Takashi Nishide}, title = {{GPU} Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1467}, year = {2023}, url = {https://eprint.iacr.org/2023/1467}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NarisadaOFKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OkadaTFKT22, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Erratum: {A} Compact Digital Signature Scheme Based on the Module-LWR Problem {[IEICE} Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. {E104.A} (2021), No. 9 pp.1219-1234]}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {2}, pages = {130}, year = {2022}, url = {https://doi.org/10.1587/transfun.2022eae0001}, doi = {10.1587/TRANSFUN.2022EAE0001}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/TomitaTFNSM22, author = {Chihiro Tomita and Makoto Takita and Kazuhide Fukushima and Yuto Nakano and Yoshiaki Shiraishi and Masakatu Morii}, title = {Extracting the Secrets of OpenSSL with RAMBleed}, journal = {Sensors}, volume = {22}, number = {9}, pages = {3586}, year = {2022}, url = {https://doi.org/10.3390/s22093586}, doi = {10.3390/S22093586}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/TomitaTFNSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/DuongRSFKS22, author = {Dung Hoang Duong and Partha Sarathi Roy and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto and Arnaud Sipasseuth}, title = {Chosen-ciphertext lattice-based public key encryption with equality test in standard model}, journal = {Theor. Comput. Sci.}, volume = {905}, pages = {31--53}, year = {2022}, url = {https://doi.org/10.1016/j.tcs.2021.12.013}, doi = {10.1016/J.TCS.2021.12.013}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/DuongRSFKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/RoyDSSFK22, author = {Partha Sarathi Roy and Dung Hoang Duong and Willy Susilo and Arnaud Sipasseuth and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Lattice-based public-key encryption with equality test supporting flexible authorization in standard model}, journal = {Theor. Comput. Sci.}, volume = {929}, pages = {124--139}, year = {2022}, url = {https://doi.org/10.1016/j.tcs.2022.06.034}, doi = {10.1016/J.TCS.2022.06.034}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/RoyDSSFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tetc/BajardFPS22, author = {Jean{-}Claude Bajard and Kazuhide Fukushima and Thomas Plantard and Arnaud Sipasseuth}, title = {Generating Very Large {RNS} Bases}, journal = {{IEEE} Trans. Emerg. Top. Comput.}, volume = {10}, number = {3}, pages = {1289--1301}, year = {2022}, url = {https://doi.org/10.1109/TETC.2022.3187072}, doi = {10.1109/TETC.2022.3187072}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tetc/BajardFPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/BajardFPS22, author = {Jean{-}Claude Bajard and Kazuhide Fukushima and Thomas Plantard and Arnaud Sipasseuth}, title = {Generating Very Large {RNS} Bases}, booktitle = {29th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2022, Lyon, France, September 12-14, 2022}, pages = {102}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ARITH54963.2022.00027}, doi = {10.1109/ARITH54963.2022.00027}, timestamp = {Thu, 29 Dec 2022 15:06:50 +0100}, biburl = {https://dblp.org/rec/conf/arith/BajardFPS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiaccs/0001JDSFK22, author = {Priyanka Dutta and Mei Jiang and Dung Hoang Duong and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Yuji Suga and Kouichi Sakurai and Xuhua Ding and Kazue Sako}, title = {Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security}, booktitle = {{ASIA} {CCS} '22: {ACM} Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022}, pages = {408--422}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488932.3517400}, doi = {10.1145/3488932.3517400}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiaccs/0001JDSFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/emnlp/Nguyen-SonUHFK22, author = {Hoang{-}Quoc Nguyen{-}Son and Huy Quang Ung and Seira Hidano and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Yoav Goldberg and Zornitsa Kozareva and Yue Zhang}, title = {CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion}, booktitle = {Findings of the Association for Computational Linguistics: {EMNLP} 2022, Abu Dhabi, United Arab Emirates, December 7-11, 2022}, pages = {2903--2913}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.findings-emnlp.210}, doi = {10.18653/V1/2022.FINDINGS-EMNLP.210}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/emnlp/Nguyen-SonUHFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/NguyenTLDSGFK22, author = {Tuong Ngoc Nguyen and Anh The Ta and Huy Quoc Le and Dung Hoang Duong and Willy Susilo and Fuchun Guo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Efficient Unique Ring Signatures from Lattices}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, pages = {447--466}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8\_22}, doi = {10.1007/978-3-031-17146-8\_22}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/NguyenTLDSGFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/IshizakaFK22, author = {Masahito Ishizaka and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {337--362}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_17}, doi = {10.1007/978-3-031-29371-9\_17}, timestamp = {Thu, 06 Apr 2023 10:01:46 +0200}, biburl = {https://dblp.org/rec/conf/icisc/IshizakaFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/IshizakaF22, author = {Masahito Ishizaka and Kazuhide Fukushima}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Attribute-Based Signatures for Range of Inner Product and Its Applications}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {382--407}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_19}, doi = {10.1007/978-3-031-29371-9\_19}, timestamp = {Thu, 06 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/IshizakaF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iolts/YamashitaKHHFT22, author = {Kazuki Yamashita and Tomohiro Kato and Kento Hasegawa and Seira Hidano and Kazuhide Fukushima and Nozomu Togawa}, editor = {Alessandro Savino and Paolo Rech and Stefano Di Carlo and Dimitris Gizopoulos}, title = {Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists}, booktitle = {28th {IEEE} International Symposium on On-Line Testing and Robust System Design, {IOLTS} 2022, Torino, Italy, September 12-14, 2022}, pages = {1--7}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/IOLTS56730.2022.9897557}, doi = {10.1109/IOLTS56730.2022.9897557}, timestamp = {Thu, 06 Oct 2022 14:48:19 +0200}, biburl = {https://dblp.org/rec/conf/iolts/YamashitaKHHFT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/DuttaDSFK22, author = {Priyanka Dutta and Dung Hoang Duong and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Chunpeng Ge and Fuchun Guo}, title = {Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices}, booktitle = {Provable and Practical Security - 16th International Conference, ProvSec 2022, Nanjing, China, November 11-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13600}, pages = {121--136}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-20917-8\_9}, doi = {10.1007/978-3-031-20917-8\_9}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/DuttaDSFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FukushimaOTKHKS22, author = {Kazuhide Fukushima and Hiroki Okada and Sofiane Takarabt and Amina Korchi and Meziane Hamoud and Khaled Karray and Youssef Souissy and Sylvain Guilley}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature}, booktitle = {Proceedings of the 19th International Conference on Security and Cryptography, {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022}, pages = {701--706}, publisher = {{SCITEPRESS}}, year = {2022}, url = {https://doi.org/10.5220/0011328400003283}, doi = {10.5220/0011328400003283}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FukushimaOTKHKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenTLDSGFK22, author = {Tuong Ngoc Nguyen and Anh The Ta and Huy Quoc Le and Dung Hoang Duong and Willy Susilo and Fuchun Guo and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Efficient Unique Ring Signatures From Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1070}, year = {2022}, url = {https://eprint.iacr.org/2022/1070}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenTLDSGFK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshizakaF22, author = {Masahito Ishizaka and Kazuhide Fukushima}, title = {Attribute-Based Signatures for Range of Inner Product and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1451}, year = {2022}, url = {https://eprint.iacr.org/2022/1451}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/IshizakaF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LeVDSLFK21, author = {Huy Quoc Le and Bay Vo and Dung Hoang Duong and Willy Susilo and Ngoc T. Le and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Identity-Based Linkable Ring Signatures From Lattices}, journal = {{IEEE} Access}, volume = {9}, pages = {84739--84755}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3087808}, doi = {10.1109/ACCESS.2021.3087808}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LeVDSLFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/LeDRSFK21, author = {Huy Quoc Le and Dung Hoang Duong and Partha Sarathi Roy and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Lattice-based signcryption with equality test in standard model}, journal = {Comput. Stand. Interfaces}, volume = {76}, pages = {103515}, year = {2021}, url = {https://doi.org/10.1016/j.csi.2021.103515}, doi = {10.1016/J.CSI.2021.103515}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csi/LeDRSFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/NarisadaOFK21, author = {Shintaro Narisada and Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Faster Rotation-Based Gauss Sieve for Solving the {SVP} on General Ideal Lattices}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {1}, pages = {79--88}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020CIP0014}, doi = {10.1587/TRANSFUN.2020CIP0014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/NarisadaOFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OkadaTFKT21, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {A Compact Digital Signature Scheme Based on the Module-LWR Problem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {9}, pages = {1219--1234}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020dmp0012}, doi = {10.1587/TRANSFUN.2020DMP0012}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/0005FXKT21, author = {Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform}, journal = {{IET} Inf. Secur.}, volume = {15}, number = {4}, pages = {267--281}, year = {2021}, url = {https://doi.org/10.1049/ise2.12012}, doi = {10.1049/ISE2.12012}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/0005FXKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TaKNLDSFK21, author = {Anh The Ta and Thanh Xuan Khuc and Tuong Ngoc Nguyen and Huy Quoc Le and Dung Hoang Duong and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Efficient Unique Ring Signature for Blockchain Privacy Protection}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {391--407}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_20}, doi = {10.1007/978-3-030-90567-5\_20}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TaKNLDSFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/BajardFKPSS21, author = {Jean{-}Claude Bajard and Kazuhide Fukushima and Shinsaku Kiyomoto and Thomas Plantard and Arnaud Sipasseuth and Willy Susilo}, title = {Generating Residue Number System Bases}, booktitle = {28th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2021, Lyngby, Denmark, June 14-16, 2021}, pages = {86--93}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ARITH51176.2021.00027}, doi = {10.1109/ARITH51176.2021.00027}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/arith/BajardFKPSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispa/NarisadaFK21, author = {Shintaro Narisada and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Fast {GPU} Implementation of Dumer's Algorithm Solving the Syndrome Decoding Problem}, booktitle = {2021 {IEEE} Intl Conf on Parallel {\&} Distributed Processing with Applications, Big Data {\&} Cloud Computing, Sustainable Computing {\&} Communications, Social Computing {\&} Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30 - Oct. 3, 2021}, pages = {971--977}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00136}, doi = {10.1109/ISPA-BDCLOUD-SOCIALCOM-SUSTAINCOM52081.2021.00136}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispa/NarisadaFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/UemuraFKKT21, author = {Shusaku Uemura and Kazuhide Fukushima and Shinsaku Kiyomoto and Momonari Kudo and Tsuyoshi Takagi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the {LWR} Problem}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {23--41}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_2}, doi = {10.1007/978-3-030-85987-9\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/UemuraFKKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paclic/Nguyen-SonHFK21, author = {Hoang{-}Quoc Nguyen{-}Son and Seira Hidano and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Kaibao Hu and Jong{-}Bok Kim and Chengqing Zong and Emmanuele Chersoni}, title = {{SEPP:} Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text}, booktitle = {Proceedings of the 35th Pacific Asia Conference on Language, Information and Computation, {PACLIC} 2021, Shanghai International Studies University, Shanghai, China, 5-7 November 2021}, pages = {11--20}, publisher = {Association for Computational Lingustics}, year = {2021}, url = {https://aclanthology.org/2021.paclic-1.2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paclic/Nguyen-SonHFK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-05748, author = {Hoang{-}Quoc Nguyen{-}Son and Seira Hidano and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {{SEPP:} Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text}, journal = {CoRR}, volume = {abs/2110.05748}, year = {2021}, url = {https://arxiv.org/abs/2110.05748}, eprinttype = {arXiv}, eprint = {2110.05748}, timestamp = {Thu, 21 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-05748.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-02213, author = {Kento Hasegawa and Kazuki Yamashita and Seira Hidano and Kazuhide Fukushima and Kazuo Hashimoto and Nozomu Togawa}, title = {Node-wise Hardware Trojan Detection Based on Graph Learning}, journal = {CoRR}, volume = {abs/2112.02213}, year = {2021}, url = {https://arxiv.org/abs/2112.02213}, eprinttype = {arXiv}, eprint = {2112.02213}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-02213.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkadaTFKT21, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {A Compact Digital Signature Scheme Based on the Module-LWR problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1699}, year = {2021}, url = {https://eprint.iacr.org/2021/1699}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkadaTFKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkadaTFKT20, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {On the Complexity of the LWR-Solving {BKW} Algorithm}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {1}, pages = {173--182}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_173}, doi = {10.1587/TRANSFUN.2019CIP0022}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkadaTFKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/FukushimaPDKGF20, author = {Kazuhide Fukushima and Thomas Perianin and Victor Dyseryn and Shinsaku Kiyomoto and Sylvain Guilley and Adrien Facon}, editor = {Melanie Volkamer and Christian Wressnegger}, title = {Feasibility study of a camera-based {PUF} in a realistic scenario}, booktitle = {{ARES} 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020}, pages = {31:1--31:6}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3407023.3407047}, doi = {10.1145/3407023.3407047}, timestamp = {Mon, 03 Aug 2020 16:17:13 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/FukushimaPDKGF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/UenoFNKH20, author = {Rei Ueno and Kazuhide Fukushima and Yuto Nakano and Shinsaku Kiyomoto and Naofumi Homma}, editor = {Guido Marco Bertoni and Francesco Regazzoni}, title = {Single-Trace Side-Channel Analysis on Polynomial-Based {MAC} Schemes}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 11th International Workshop, {COSADE} 2020, Lugano, Switzerland, April 1-3, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12244}, pages = {43--67}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68773-1\_3}, doi = {10.1007/978-3-030-68773-1\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/UenoFNKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/OkadaTFKT20, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Weizhi Meng and Dieter Gollmann and Christian Damsgaard Jensen and Jianying Zhou}, title = {A Compact Digital Signature Scheme Based on the Module-LWR Problem}, booktitle = {Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12282}, pages = {73--90}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61078-4\_5}, doi = {10.1007/978-3-030-61078-4\_5}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/OkadaTFKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-03178, author = {Dung Hoang Duong and Partha Sarathi Roy and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto and Arnaud Sipasseuth}, title = {Lattice-based public key encryption with equality test in standard model, revisited}, journal = {CoRR}, volume = {abs/2005.03178}, year = {2020}, url = {https://arxiv.org/abs/2005.03178}, eprinttype = {arXiv}, eprint = {2005.03178}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-03178.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-05308, author = {Dung Hoang Duong and Kazuhide Fukushima and Shinsaku Kiyomoto and Partha Sarathi Roy and Arnaud Sipasseuth and Willy Susilo}, title = {Lattice-based public key encryption with equality test supporting flexible authorization in standard model}, journal = {CoRR}, volume = {abs/2005.05308}, year = {2020}, url = {https://arxiv.org/abs/2005.05308}, eprinttype = {arXiv}, eprint = {2005.05308}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-05308.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2012-15423, author = {Huy Quoc Le and Dung Hoang Duong and Partha Sarathi Roy and Willy Susilo and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Lattice-based Signcryption with Equality Test in Standard Model}, journal = {CoRR}, volume = {abs/2012.15423}, year = {2020}, url = {https://arxiv.org/abs/2012.15423}, eprinttype = {arXiv}, eprint = {2012.15423}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2012-15423.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuongFK0S19, author = {Dung Hoang Duong and Kazuhide Fukushima and Shinsaku Kiyomoto and Partha Sarathi Roy and Willy Susilo}, editor = {Julian Jang{-}Jaccard and Fuchun Guo}, title = {A Lattice-Based Public Key Encryption with Equality Test in Standard Model}, booktitle = {Information Security and Privacy - 24th Australasian Conference, {ACISP} 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11547}, pages = {138--155}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21548-4\_8}, doi = {10.1007/978-3-030-21548-4\_8}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DuongFK0S19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Experiment on Side-Channel Key-Recovery using a Real {LPWA} End-device}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {67--74}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007259500670074}, doi = {10.5220/0007259500670074}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/Fukushima0NFKG19a, author = {Kazuhide Fukushima and Damien Marion and Yuto Nakano and Adrien Facon and Shinsaku Kiyomoto and Sylvain Guilley}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device}, booktitle = {Information Systems Security and Privacy - 5th International Conference, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1221}, pages = {74--92}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-49443-8\_4}, doi = {10.1007/978-3-030-49443-8\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/Fukushima0NFKG19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0001MFKT19, author = {Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Security Analysis and Efficient Implementation of Code-based Signature Schemes}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {213--220}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007259102130220}, doi = {10.5220/0007259102130220}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0001MFKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/FukushimaYKY19, author = {Kazuhide Fukushima and Ayumu Yoshimura and Shinsaku Kiyomoto and Norikazu Yamasaki}, editor = {Swee{-}Huay Heng and Javier L{\'{o}}pez}, title = {Evaluation of Software {PUF} Based on Gyroscope}, booktitle = {Information Security Practice and Experience - 15th International Conference, {ISPEC} 2019, Kuala Lumpur, Malaysia, November 26-28, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11879}, pages = {232--247}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34339-2\_13}, doi = {10.1007/978-3-030-34339-2\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/FukushimaYKY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Dutta0FKS19, author = {Sabyasachi Dutta and Partha Sarathi Roy and Kazuhide Fukushima and Shinsaku Kiyomoto and Kouichi Sakurai}, editor = {Ilsun You}, title = {Secret Sharing on Evolving Multi-level Access Structure}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {180--191}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_14}, doi = {10.1007/978-3-030-39303-8\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Dutta0FKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001MFK19, author = {Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Evaluation of Code-based Signature Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {544}, year = {2019}, url = {https://eprint.iacr.org/2019/544}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001MFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuanXFKT18, author = {Ye Yuan and Junting Xiao and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {9846168:1--9846168:14}, year = {2018}, url = {https://doi.org/10.1155/2018/9846168}, doi = {10.1155/2018/9846168}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/YuanXFKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/OkadaTFKT18, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Kwangsu Lee}, title = {On the Complexity of the LWR-Solving {BKW} Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {196--214}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_13}, doi = {10.1007/978-3-030-12146-4\_13}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/OkadaTFKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/0001DMAFKS18, author = {Partha Sarathi Roy and Sabyasachi Dutta and Kirill Morozov and Avishek Adhikari and Kazuhide Fukushima and Shinsaku Kiyomoto and Kouichi Sakurai}, editor = {Chunhua Su and Hiroaki Kikuchi}, title = {Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness}, booktitle = {Information Security Practice and Experience - 14th International Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11125}, pages = {578--594}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-99807-7\_37}, doi = {10.1007/978-3-319-99807-7\_37}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/0001DMAFKS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuanFXKT18, author = {Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1238}, year = {2018}, url = {https://eprint.iacr.org/2018/1238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuanFXKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XuYFTSKH17, author = {Rui Xu and Sze Ling Yeo and Kazuhide Fukushima and Tsuyoshi Takagi and Hwajung Seo and Shinsaku Kiyomoto and Matt Henricksen}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {An Experimental Study of the {BDD} Approach for the Search {LWE} Problem}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {253--272}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_13}, doi = {10.1007/978-3-319-61204-1\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/XuYFTSKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/KawaiUHAFK17, author = {Wataru Kawai and Rei Ueno and Naofumi Homma and Takafumi Aoki and Kazuhide Fukushima and Shinsaku Kiyomoto}, title = {Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers}, booktitle = {2017 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2017, Paris, France, April 26-28, 2017}, pages = {113--121}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/EuroSPW.2017.60}, doi = {10.1109/EUROSPW.2017.60}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/KawaiUHAFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/YuanFKT17, author = {Ye Yuan and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Memory-constrained implementation of lattice-based encryption scheme on standard Java Card}, booktitle = {2017 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017}, pages = {47--50}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HST.2017.7951796}, doi = {10.1109/HST.2017.7951796}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/YuanFKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/FukushimaHK17, author = {Kazuhide Fukushima and Seira Hidano and Shinsaku Kiyomoto}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {White-box Implementation of Stream Cipher}, booktitle = {Proceedings of the 3rd International Conference on Information Systems Security and Privacy, {ICISSP} 2017, Porto, Portugal, February 19-21, 2017}, pages = {263--269}, publisher = {SciTePress}, year = {2017}, url = {https://doi.org/10.5220/0006115202630269}, doi = {10.5220/0006115202630269}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/FukushimaHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/BasuRXFK17, author = {Anirban Basu and Mohammad Shahriar Rahman and Rui Xu and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Jan{-}Philipp Stegh{\"{o}}fer and Babak Esfandiari}, title = {VIGraph - {A} Framework for Verifiable Information}, booktitle = {Trust Management {XI} - 11th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2017, Gothenburg, Sweden, June 12-16, 2017, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {505}, pages = {12--20}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59171-1\_2}, doi = {10.1007/978-3-319-59171-1\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/BasuRXFK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FukushimaXKH17, author = {Kazuhide Fukushima and Rui Xu and Shinsaku Kiyomoto and Naofumi Homma}, title = {Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure}, booktitle = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017}, pages = {1032--1037}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.348}, doi = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.348}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/FukushimaXKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FukushimaHK16, author = {Kazuhide Fukushima and Seira Hidano and Shinsaku Kiyomoto}, editor = {Christian Callegari and Marten van Sinderen and Panagiotis G. Sarigiannidis and Pierangela Samarati and Enrique Cabello and Pascal Lorenz and Mohammad S. Obaidat}, title = {Sensor-based Wearable {PUF}}, booktitle = {Proceedings of the 13th International Joint Conference on e-Business and Telecommunications {(ICETE} 2016) - Volume 4: SECRYPT, Lisbon, Portugal, July 26-28, 2016}, pages = {207--214}, publisher = {SciTePress}, year = {2016}, url = {https://doi.org/10.5220/0005946702070214}, doi = {10.5220/0005946702070214}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FukushimaHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/FukushimaSHNDGN16, author = {Kazuhide Fukushima and Youssef Souissi and Seira Hidano and Robert Nguyen and Jean{-}Luc Danger and Sylvain Guilley and Yuto Nakano and Shinsaku Kiyomoto and Laurent Sauvage}, title = {Delay {PUF} Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {201--207}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0064}, doi = {10.1109/TRUSTCOM.2016.0064}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/FukushimaSHNDGN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakanoFKIMTS14, author = {Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsukasa Ishiguro and Yutaka Miyake and Toshiaki Tanaka and Kouichi Sakurai}, title = {Fast Implementation of KCipher-2 for Software and Hardware}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {1}, pages = {43--52}, year = {2014}, url = {https://doi.org/10.1587/transinf.E97.D.43}, doi = {10.1587/TRANSINF.E97.D.43}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/NakanoFKIMTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HibikiHNFKMA14, author = {Takafumi Hibiki and Naofumi Homma and Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Takafumi Aoki}, title = {Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {1}, pages = {157--166}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.157}, doi = {10.1587/TRANSFUN.E97.A.157}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/HibikiHNFKMA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/KiyomotoFM14, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, title = {Security issues on {IT} systems during disasters: a survey}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {5}, number = {2}, pages = {173--185}, year = {2014}, url = {https://doi.org/10.1007/s12652-013-0177-8}, doi = {10.1007/S12652-013-0177-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jaihc/KiyomotoFM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/HibikiHNFKMA13, author = {Takafumi Hibiki and Naofumi Homma and Yuto Nakano and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Takafumi Aoki}, editor = {Emmanuel Prouff}, title = {Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, pages = {169--183}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1\_11}, doi = {10.1007/978-3-642-40026-1\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/HibikiHNFKMA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/JiaAFBSFKM13, author = {Limin Jia and Jassim Aljuraidan and Elli Fragkaki and Lujo Bauer and Michael Stroucken and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, editor = {Jason Crampton and Sushil Jajodia and Keith Mayes}, title = {Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract)}, booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research in Computer Security, Egham, UK, September 9-13, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8134}, pages = {775--792}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40203-6\_43}, doi = {10.1007/978-3-642-40203-6\_43}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/JiaAFBSFKM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FukushimaKM12, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, title = {Software Protection Combined with Tamper-Proof Device}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {213--222}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.213}, doi = {10.1587/TRANSFUN.E95.A.213}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/FukushimaKM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, title = {Design of Categorization Mechanism for Disaster-Information-Gathering System}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {3}, number = {4}, pages = {21--34}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.12.31.021}, doi = {10.22667/JOWUA.2012.12.31.021}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, editor = {Gerald Quirchmayr and Josef Basl and Ilsun You and Lida Xu and Edgar R. Weippl}, title = {Security-and-Privacy-Related Issues on {IT} Systems During Disasters}, booktitle = {Multidisciplinary Research and Practice for Information Systems - {IFIP} {WG} 8.4, 8.9/TC 5 International Cross-Domain Conference and Workshop on Availability, Reliability, and Security, {CD-ARES} 2012, Prague, Czech Republic, August 20-24, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7465}, pages = {445--459}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32498-7\_33}, doi = {10.1007/978-3-642-32498-7\_33}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KiyomotoFM12, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, editor = {Ioannis G. Askoxylakis and Henrich Christopher P{\"{o}}hls and Joachim Posegga}, title = {Privacy Preservation of User History Graph}, booktitle = {Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems - 6th {IFIP} {WG} 11.2 International Workshop, {WISTP} 2012, Egham, UK, June 20-22, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7322}, pages = {87--96}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30955-7\_9}, doi = {10.1007/978-3-642-30955-7\_9}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KiyomotoFM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/FukushimaKM11, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, title = {Towards Secure Cloud Computing Architecture - {A} Solution Based on Software Protection Mechanism}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {1}, pages = {4--17}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.05.31.004}, doi = {10.22667/JISIS.2011.05.31.004}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/FukushimaKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tce/ShinFKM11, author = {Wook Shin and Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake}, title = {{AMY:} Use your cell phone to create a protected personal network over devices}, journal = {{IEEE} Trans. Consumer Electron.}, volume = {57}, number = {1}, pages = {99--104}, year = {2011}, url = {https://doi.org/10.1109/TCE.2011.5735487}, doi = {10.1109/TCE.2011.5735487}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tce/ShinFKM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NakanoCFK11, author = {Yuto Nakano and Carlos Cid and Kazuhide Fukushima and Shinsaku Kiyomoto}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Analysis of Message Injection in Stream Cipher-Based Hash Functions}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {498--513}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_29}, doi = {10.1007/978-3-642-21554-4\_29}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NakanoCFK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/KiyomotoFM11, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Yutaka Miyake}, editor = {Tai{-}Hoon Kim and Hojjat Adeli and Wai{-}Chi Fang and L. Javier Garc{\'{\i}}a{-}Villalba and Kirk P. Arnett and Muhammad Khurram Khan}, title = {Data Anonymity in Multi-Party Service Model}, booktitle = {Security Technology - International Conference, SecTech 2011, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2011, in Conjunction with {GDC} 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings}, series = {Communications in Computer and Information Science}, volume = {259}, pages = {21--30}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27189-2\_3}, doi = {10.1007/978-3-642-27189-2\_3}, timestamp = {Sat, 30 Sep 2023 09:41:06 +0200}, biburl = {https://dblp.org/rec/conf/fgit/KiyomotoFM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/FukushimaKMS11, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai}, editor = {Mohammad S. Obaidat and Jos{\'{e}} Luis Sevillano and Joaquim Filipe}, title = {Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme}, booktitle = {E-Business and Telecommunications - International Joint Conference, {ICETE} 2011, Seville, Spain, July 18-21, 2011, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {314}, pages = {233--248}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-35755-8\_17}, doi = {10.1007/978-3-642-35755-8\_17}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/FukushimaKMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KiyomotoHYNF11, author = {Shinsaku Kiyomoto and Matthew Henricksen and Wun{-}She Yap and Yuto Nakano and Kazuhide Fukushima}, editor = {Xuejia Lai and Jianying Zhou and Hui Li}, title = {{MASHA} - Low Cost Authentication with a New Stream Cipher}, booktitle = {Information Security, 14th International Conference, {ISC} 2011, Xi'an, China, October 26-29, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7001}, pages = {63--78}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24861-0\_5}, doi = {10.1007/978-3-642-24861-0\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KiyomotoHYNF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/FukushimaKMS11, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Yutaka Miyake and Kouichi Sakurai}, editor = {Javier L{\'{o}}pez and Pierangela Samarati}, title = {Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree}, booktitle = {{SECRYPT} 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {37--49}, publisher = {SciTePress}, year = {2011}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/FukushimaKMS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FukushimaKTS10, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, title = {Improved Subset Difference Method with Ternary Tree}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {11}, pages = {2034--2044}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.2034}, doi = {10.1587/TRANSFUN.E93.A.2034}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FukushimaKTS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/ShinKFT10, author = {Wook Shin and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {323--329}, publisher = {{CSREA} Press}, year = {2010}, timestamp = {Fri, 10 Dec 2010 11:46:08 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/ShinKFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IyamaKFTT10, author = {Tadashi Iyama and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka and Tsuyoshi Takagi}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Efficient Implementation of Pairing on {BREW} Mobile Phones}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {326--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_22}, doi = {10.1007/978-3-642-16825-3\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IyamaKFTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/policy/ShinKKFT10, author = {Wook Shin and Sanghoon Kwak and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {A Small But Non-negligible Flaw in the Android Permission Scheme}, booktitle = {{POLICY} 2010, {IEEE} International Symposium on Policies for Distributed Systems and Networks, Fairfax, VA, USA, 21-23 July 2010}, pages = {107--110}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/POLICY.2010.11}, doi = {10.1109/POLICY.2010.11}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/policy/ShinKKFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialcom/ShinKFT10, author = {Wook Shin and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, editor = {Ahmed K. Elmagarmid and Divyakant Agrawal}, title = {A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework}, booktitle = {Proceedings of the 2010 {IEEE} Second International Conference on Social Computing, SocialCom / {IEEE} International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2010, Minneapolis, Minnesota, USA, August 20-22, 2010}, pages = {944--951}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SocialCom.2010.140}, doi = {10.1109/SOCIALCOM.2010.140}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialcom/ShinKFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KiyomotoFT09, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {Design of Anonymous Attribute Authentication Mechanism}, journal = {{IEICE} Trans. Commun.}, volume = {92-B}, number = {4}, pages = {1112--1118}, year = {2009}, url = {https://doi.org/10.1587/transcom.E92.B.1112}, doi = {10.1587/TRANSCOM.E92.B.1112}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KiyomotoFT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KuriharaKFT09, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {A Fast (\emph{k}, \emph{L}, \emph{n})-Threshold Ramp Secret Sharing Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {8}, pages = {1808--1821}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1808}, doi = {10.1587/TRANSFUN.E92.A.1808}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KuriharaKFT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cse/FukushimaKT09, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Obfuscation Mechanism in Conjunction with Tamper-Proof Module}, booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August 29-31, 2009}, pages = {665--670}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSE.2009.20}, doi = {10.1109/CSE.2009.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cse/FukushimaKT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/KiyomotoFM09, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Keith M. Martin}, editor = {Mohammad S. Obaidat and Joaquim Filipe}, title = {Offline Peer-to-Peer Broadcast with Anonymity}, booktitle = {e-Business and Telecommunications - 6th International Joint Conference, {ICETE} 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {130}, pages = {174--185}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-20077-9\_12}, doi = {10.1007/978-3-642-20077-9\_12}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icete/KiyomotoFM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sec/ShinGKFT09, author = {Wook Shin and Carl A. Gunter and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, editor = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {How to Bootstrap Security for Ad-Hoc Network: Revisited}, booktitle = {Emerging Challenges for Security, Privacy and Trust, 24th {IFIP} {TC} 11 International Information Security Conference, {SEC} 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {297}, pages = {119--131}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01244-0\_11}, doi = {10.1007/978-3-642-01244-0\_11}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sec/ShinGKFT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KiyomotoFM09, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Keith M. Martin}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {An Offline Peer-to-peer Broadcasting Scheme with Anonymity}, booktitle = {{SECRYPT} 2009, Proceedings of the International Conference on Security and Cryptography, Milan, Italy, July 7-10, 2009, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {75--82}, publisher = {{INSTICC} Press}, year = {2009}, timestamp = {Thu, 10 Sep 2009 21:15:22 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/KiyomotoFM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wistp/KiyomotoMF09, author = {Shinsaku Kiyomoto and Keith M. Martin and Kazuhide Fukushima}, editor = {Olivier Markowitch and Angelos Bilas and Jaap{-}Henk Hoepman and Chris J. Mitchell and Jean{-}Jacques Quisquater}, title = {Privacy-Aware Location Database Service for Granular Queries}, booktitle = {Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third {IFIP} {WG} 11.2 International Workshop, {WISTP} 2009, Brussels, Belgium, September 1-4, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5746}, pages = {28--37}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03944-7\_3}, doi = {10.1007/978-3-642-03944-7\_3}, timestamp = {Sun, 02 Oct 2022 16:17:41 +0200}, biburl = {https://dblp.org/rec/conf/wistp/KiyomotoMF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KuriharaKFT08, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {A Fast (3, \emph{n})-Threshold Secret Sharing Scheme Using Exclusive-OR Operations}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {127--138}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.127}, doi = {10.1093/IETFEC/E91-A.1.127}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KuriharaKFT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FukushimaKTS08, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, title = {Analysis of Program Obfuscation Schemes with Variable Encoding Technique}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {316--329}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.316}, doi = {10.1093/IETFEC/E91-A.1.316}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FukushimaKTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KuriharaKFT08a, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {On a Fast (\emph{k, n})-Threshold Secret Sharing Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {9}, pages = {2365--2378}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.9.2365}, doi = {10.1093/IETFEC/E91-A.9.2365}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KuriharaKFT08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/FukushimaKTS08, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, title = {Optimization of Group Key Management Structure with a Client Join-Leave Mechanism}, journal = {J. Inf. Process.}, volume = {16}, pages = {130--141}, year = {2008}, url = {https://doi.org/10.2197/ipsjjip.16.130}, doi = {10.2197/IPSJJIP.16.130}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/FukushimaKTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KuriharaKFT08, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, editor = {Tzong{-}Chen Wu and Chin{-}Laung Lei and Vincent Rijmen and Der{-}Tsai Lee}, title = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension}, booktitle = {Information Security, 11th International Conference, {ISC} 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5222}, pages = {455--470}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85886-7\_31}, doi = {10.1007/978-3-540-85886-7\_31}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KuriharaKFT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FukushimaKTS08, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Ternary Subset Difference Method and Its Quantitative Analysis}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {225--239}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_17}, doi = {10.1007/978-3-642-00306-6\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FukushimaKTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KuriharaKFT08, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, title = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2008}, url = {http://eprint.iacr.org/2008/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KuriharaKFT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KiyomotoFTS07, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka and Kouichi Sakurai}, title = {On Effectiveness of Clock Control in Stream Ciphers}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {9}, pages = {1780--1787}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.9.1780}, doi = {10.1093/IETFEC/E90-A.9.1780}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KiyomotoFTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jips/SakuraiF07, author = {Kouichi Sakurai and Kazuhide Fukushima}, title = {Actual Condition and Issues for Mobile Security System}, journal = {J. Inf. Process. Syst.}, volume = {3}, number = {2}, pages = {54--63}, year = {2007}, url = {https://doi.org/10.3745/JIPS.2008.3.2.054}, doi = {10.3745/JIPS.2008.3.2.054}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jips/SakuraiF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/FukushimaKT06, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services}, booktitle = {7th International Conference on Mobile Data Management {(MDM} 2006), Nara, Japan, May 9-13, 2006}, pages = {17}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/MDM.2006.83}, doi = {10.1109/MDM.2006.83}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/FukushimaKT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FukushimaS03, author = {Kazuhide Fukushima and Kouichi Sakurai}, editor = {Kijoon Chae and Moti Yung}, title = {A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation}, booktitle = {Information Security Applications, 4th International Workshop, {WISA} 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2908}, pages = {303--316}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24591-9\_23}, doi = {10.1007/978-3-540-24591-9\_23}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FukushimaS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.