BibTeX records: Keisuke Tanaka

download as .bib file

@inproceedings{DBLP:conf/acns/WangSLT24,
  author       = {Pengfei Wang and
                  Xiangyu Su and
                  Mario Larangeira and
                  Keisuke Tanaka},
  editor       = {Christina P{\"{o}}pper and
                  Lejla Batina},
  title        = {Auditable Attribute-Based Credentials Scheme and Its Application in
                  Contact Tracing},
  booktitle    = {Applied Cryptography and Network Security - 22nd International Conference,
                  {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14583},
  pages        = {88--118},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-54770-6\_4},
  doi          = {10.1007/978-3-031-54770-6\_4},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/WangSLT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2404-00602,
  author       = {Masayuki Tezuka and
                  Keisuke Tanaka},
  title        = {1-out-of-n Oblivious Signatures: Security Revisited and a Generic
                  Construction with an Efficient Communication Cost},
  journal      = {CoRR},
  volume       = {abs/2404.00602},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2404.00602},
  doi          = {10.48550/ARXIV.2404.00602},
  eprinttype    = {arXiv},
  eprint       = {2404.00602},
  timestamp    = {Wed, 08 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2404-00602.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/YamamuroHTYT23,
  author       = {Hiroki Yamamuro and
                  Keisuke Hara and
                  Masayuki Tezuka and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  title        = {Forward Secure Message Franking with Updatable Reporting Tags},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {9},
  pages        = {1164--1176},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022dmp0004},
  doi          = {10.1587/TRANSFUN.2022DMP0004},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/YamamuroHTYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TezukaT23,
  author       = {Masayuki Tezuka and
                  Keisuke Tanaka},
  editor       = {Hwajeong Seo and
                  Suhri Kim},
  title        = {1-out-of-n Oblivious Signatures: Security Revisited and a Generic
                  Construction with an Efficient Communication Cost},
  booktitle    = {Information Security and Cryptology - {ICISC} 2023 - 26th International
                  Conference on Information Security and Cryptology, {ICISC} 2023, Seoul,
                  South Korea, November 29 - December 1, 2023, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14561},
  pages        = {261--281},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1235-9\_14},
  doi          = {10.1007/978-981-97-1235-9\_14},
  timestamp    = {Wed, 13 Mar 2024 19:10:54 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/TezukaT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SuLT23,
  author       = {Xiangyu Su and
                  Mario Larangeira and
                  Keisuke Tanaka},
  editor       = {Shujun Li and
                  Mark Manulis and
                  Atsuko Miyaji},
  title        = {Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning},
  booktitle    = {Network and System Security - 17th International Conference, {NSS}
                  2023, Canterbury, UK, August 14-16, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13983},
  pages        = {114--136},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-39828-5\_7},
  doi          = {10.1007/978-3-031-39828-5\_7},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/SuLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-00265,
  author       = {Masayuki Tezuka and
                  Keisuke Tanaka},
  title        = {Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature},
  journal      = {CoRR},
  volume       = {abs/2304.00265},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.00265},
  doi          = {10.48550/ARXIV.2304.00265},
  eprinttype    = {arXiv},
  eprint       = {2304.00265},
  timestamp    = {Mon, 17 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-00265.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuLT23,
  author       = {Xiangyu Su and
                  Mario Larangeira and
                  Keisuke Tanaka},
  title        = {Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1059},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1059},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangSLT23,
  author       = {Pengfei Wang and
                  Xiangyu Su and
                  Mario Larangeira and
                  Keisuke Tanaka},
  title        = {Auditable Attribute-Based Credentials Scheme and Its Applications
                  in Contact Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1060},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1060},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangSLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SuLT22,
  author       = {Xiangyu Su and
                  Mario Larangeira and
                  Keisuke Tanaka},
  title        = {How to Prove Work: With Time or Memory},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {1192--1201},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2021.3138497},
  doi          = {10.1109/ACCESS.2021.3138497},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SuLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangSJJLT22,
  author       = {Pengfei Wang and
                  Xiangyu Su and
                  Maxim Jourenko and
                  Zixian Jiang and
                  Mario Larangeira and
                  Keisuke Tanaka},
  title        = {Environmental Adaptive Privacy Preserving Contact Tracing System:
                  {A} Construction From Public Key Rerandomizable {BLS} Signatures},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {37181--37199},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3164186},
  doi          = {10.1109/ACCESS.2022.3164186},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/WangSJJLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LuHT22,
  author       = {Yi Lu and
                  Keisuke Hara and
                  Keisuke Tanaka},
  title        = {Multikey Verifiable Homomorphic Encryption},
  journal      = {{IEEE} Access},
  volume       = {10},
  pages        = {84761--84775},
  year         = {2022},
  url          = {https://doi.org/10.1109/ACCESS.2022.3197634},
  doi          = {10.1109/ACCESS.2022.3197634},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/LuHT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/HaraMHT22,
  author       = {Keisuke Hara and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {Generic transformation from broadcast encryption to round-optimal
                  deniable ring authentication},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {2},
  pages        = {277--316},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-021-00975-4},
  doi          = {10.1007/S10623-021-00975-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/HaraMHT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/HaraMT22,
  author       = {Keisuke Hara and
                  Takahiro Matsuda and
                  Keisuke Tanaka},
  title        = {Receiver Selective Opening Chosen Ciphertext Secure Identity-Based
                  Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {3},
  pages        = {160--172},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021cip0006},
  doi          = {10.1587/TRANSFUN.2021CIP0006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/HaraMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KitagawaMT22,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Keisuke Tanaka},
  title        = {{CCA} Security and Trapdoor Functions via Key-Dependent-Message Security},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {2},
  pages        = {9},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-022-09420-8},
  doi          = {10.1007/S00145-022-09420-8},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/KitagawaMT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KitagawaNT22,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Obfustopia Built on Secret-Key Functional Encryption},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {3},
  pages        = {19},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-022-09429-z},
  doi          = {10.1007/S00145-022-09429-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KitagawaNT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/LuHOST22,
  author       = {Yi Lu and
                  Keisuke Hara and
                  Kazuma Ohara and
                  Jacob C. N. Schuldt and
                  Keisuke Tanaka},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Efficient Two-Party Exponentiation from Quotient Transfer},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {643--662},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_32},
  doi          = {10.1007/978-3-031-09234-3\_32},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/LuHOST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TezukaT22,
  author       = {Masayuki Tezuka and
                  Keisuke Tanaka},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {317--336},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_16},
  doi          = {10.1007/978-3-031-29371-9\_16},
  timestamp    = {Thu, 06 Apr 2023 10:01:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/TezukaT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IwataYT22,
  author       = {Ichiro Iwata and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  editor       = {Seung{-}Hyun Seo and
                  Hwajeong Seo},
  title        = {Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary
                  Fields},
  booktitle    = {Information Security and Cryptology - {ICISC} 2022 - 25th International
                  Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December
                  2, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13849},
  pages        = {435--449},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-29371-9\_21},
  doi          = {10.1007/978-3-031-29371-9\_21},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IwataYT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/marble/JourenkoLT22,
  author       = {Maxim Jourenko and
                  Mario Larangeira and
                  Keisuke Tanaka},
  editor       = {Panos M. Pardalos and
                  Ilias S. Kotsireas and
                  Yike Guo and
                  William J. Knottenbelt},
  title        = {Interhead Hydra: Two Heads are Better than One},
  booktitle    = {3rd International Conference on Mathematical Research for Blockchain
                  Economy, {MARBLE} 2022, Vilamoura, Portugal, July 12-14, 2022},
  series       = {Lecture Notes in Operations Research},
  pages        = {187--212},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-18679-0\_11},
  doi          = {10.1007/978-3-031-18679-0\_11},
  timestamp    = {Tue, 11 Jul 2023 16:47:12 +0200},
  biburl       = {https://dblp.org/rec/conf/marble/JourenkoLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-09799,
  author       = {Masayuki Tezuka and
                  Keisuke Tanaka},
  title        = {Redactable Signature with Compactness from Set-Commitment},
  journal      = {CoRR},
  volume       = {abs/2202.09799},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.09799},
  eprinttype    = {arXiv},
  eprint       = {2202.09799},
  timestamp    = {Tue, 01 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-09799.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-09807,
  author       = {Masayuki Tezuka and
                  Xiangyu Su and
                  Keisuke Tanaka},
  title        = {A t-out-of-n Redactable Signature Scheme},
  journal      = {CoRR},
  volume       = {abs/2202.09807},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.09807},
  eprinttype    = {arXiv},
  eprint       = {2202.09807},
  timestamp    = {Tue, 01 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-09807.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2202-09808,
  author       = {Masayuki Tezuka and
                  Keisuke Tanaka},
  title        = {Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based
                  Synchronized Aggregate Signature Scheme},
  journal      = {CoRR},
  volume       = {abs/2202.09808},
  year         = {2022},
  url          = {https://arxiv.org/abs/2202.09808},
  eprinttype    = {arXiv},
  eprint       = {2202.09808},
  timestamp    = {Tue, 01 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2202-09808.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuDLMOOTT22,
  author       = {Xiangyu Su and
                  Xavier D{\'{e}}fago and
                  Mario Larangeira and
                  Kazuyuki Mori and
                  Takuya Oda and
                  Yuta Okumura and
                  Yasumasa Tamura and
                  Keisuke Tanaka},
  title        = {Bid-Matching Problem and Score-Based Consensus for Peer-to-Peer Energy
                  Trading},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1471},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1471},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SuDLMOOTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HaraT21,
  author       = {Keisuke Hara and
                  Keisuke Tanaka},
  title        = {Ring Signature With Unconditional Anonymity in the Plain Model},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {7762--7774},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3049240},
  doi          = {10.1109/ACCESS.2021.3049240},
  timestamp    = {Wed, 20 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HaraT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/alr/TanakaU21,
  author       = {Keisuke Tanaka and
                  Masafumi Uchida},
  title        = {Evaluation of handwriting task difficulty based on detrended fluctuation
                  analysis},
  journal      = {Artif. Life Robotics},
  volume       = {26},
  number       = {2},
  pages        = {169--175},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10015-020-00672-w},
  doi          = {10.1007/S10015-020-00672-W},
  timestamp    = {Fri, 23 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/alr/TanakaU21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/TezukaT21,
  author       = {Masayuki Tezuka and
                  Keisuke Tanaka},
  title        = {Redactable Signature with Compactness from Set-Commitment},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {9},
  pages        = {1175--1187},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020dmp0013},
  doi          = {10.1587/TRANSFUN.2020DMP0013},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/TezukaT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/LuHT21,
  author       = {Yi Lu and
                  Keisuke Hara and
                  Keisuke Tanaka},
  title        = {Receiver Selective Opening {CCA} Secure Public Key Encryption from
                  Various Assumptions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {9},
  pages        = {1206--1218},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020dmp0009},
  doi          = {10.1587/TRANSFUN.2020DMP0009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/LuHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/SudoHTYT21,
  author       = {Kyohei Sudo and
                  Keisuke Hara and
                  Masayuki Tezuka and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  title        = {Watermarkable Signature with Computational Function Preserving},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {9},
  pages        = {1255--1270},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020dmp0022},
  doi          = {10.1587/TRANSFUN.2020DMP0022},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/SudoHTYT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/EgashiraWT21,
  author       = {Shohei Egashira and
                  Yuyu Wang and
                  Keisuke Tanaka},
  title        = {Fine-Grained Cryptography Revisited},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {23},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09390-3},
  doi          = {10.1007/S00145-021-09390-3},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/EgashiraWT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KitagawaNT21,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Simple and Generic Constructions of Succinct Functional Encryption},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {25},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09396-x},
  doi          = {10.1007/S00145-021-09396-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KitagawaNT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/HaraT21,
  author       = {Keisuke Hara and
                  Keisuke Tanaka},
  title        = {Tightly secure ring signatures in the standard model},
  journal      = {Theor. Comput. Sci.},
  volume       = {892},
  pages        = {208--237},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.09.022},
  doi          = {10.1016/J.TCS.2021.09.022},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/HaraT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HaraMT21,
  author       = {Keisuke Hara and
                  Takahiro Matsuda and
                  Keisuke Tanaka},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Receiver Selective Opening Chosen Ciphertext Secure Identity-Based
                  Encryption},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {51--59},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458294},
  doi          = {10.1145/3457338.3458294},
  timestamp    = {Wed, 16 Jun 2021 07:21:06 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/HaraMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/WangSJJLT21,
  author       = {Pengfei Wang and
                  Xiangyu Su and
                  Maxim Jourenko and
                  Zixian Jiang and
                  Mario Larangeira and
                  Keisuke Tanaka},
  editor       = {Weizhi Meng and
                  Mauro Conti},
  title        = {Environmental Adaptive Privacy Preserving Contact Tracing System for
                  Respiratory Infectious Diseases},
  booktitle    = {Cyberspace Safety and Security - 13th International Symposium, {CSS}
                  2021, Virtual Event, November 9-11, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13172},
  pages        = {131--144},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-94029-4\_10},
  doi          = {10.1007/978-3-030-94029-4\_10},
  timestamp    = {Fri, 14 Jan 2022 10:25:28 +0100},
  biburl       = {https://dblp.org/rec/conf/css/WangSJJLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/JourenkoLT21,
  author       = {Maxim Jourenko and
                  Mario Larangeira and
                  Keisuke Tanaka},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Payment Trees: Low Collateral Payments for Payment Channel Networks},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12675},
  pages        = {189--208},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64331-0\_10},
  doi          = {10.1007/978-3-662-64331-0\_10},
  timestamp    = {Thu, 16 Mar 2023 14:52:53 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/JourenkoLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icbc2/SuLT21,
  author       = {Xiangyu Su and
                  Mario Larangeira and
                  Keisuke Tanaka},
  title        = {How to Prove Work: With Time or Memory},
  booktitle    = {{IEEE} International Conference on Blockchain and Cryptocurrency,
                  {ICBC} 2021, Sydney, Australia, May 3-6, 2021},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ICBC51069.2021.9461131},
  doi          = {10.1109/ICBC51069.2021.9461131},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icbc2/SuLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YamamuroHTYT21,
  author       = {Hiroki Yamamuro and
                  Keisuke Hara and
                  Masayuki Tezuka and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  editor       = {Jong Hwan Park and
                  Seung{-}Hyun Seo},
  title        = {Forward Secure Message Franking},
  booktitle    = {Information Security and Cryptology - {ICISC} 2021 - 24th International
                  Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13218},
  pages        = {339--358},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-08896-4\_18},
  doi          = {10.1007/978-3-031-08896-4\_18},
  timestamp    = {Wed, 27 Jul 2022 22:15:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YamamuroHTYT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Wang0HT21,
  author       = {Yuyu Wang and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Juan A. Garay},
  title        = {Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {389--420},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_15},
  doi          = {10.1007/978-3-030-75245-3\_15},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Wang0HT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/BrunettaLLMT21,
  author       = {Carlo Brunetta and
                  Mario Larangeira and
                  Bei Liang and
                  Aikaterini Mitrokotsa and
                  Keisuke Tanaka},
  editor       = {Qiong Huang and
                  Yu Yu},
  title        = {Turn-Based Communication Channels},
  booktitle    = {Provable and Practical Security - 15th International Conference, ProvSec
                  2021, Guangzhou, China, November 5-8, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13059},
  pages        = {376--392},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90402-9\_21},
  doi          = {10.1007/978-3-030-90402-9\_21},
  timestamp    = {Fri, 05 Nov 2021 15:08:15 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/BrunettaLLMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-05411,
  author       = {Masayuki Tezuka and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  title        = {Weakened Random Oracle Models with Target Prefix},
  journal      = {CoRR},
  volume       = {abs/2107.05411},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.05411},
  eprinttype    = {arXiv},
  eprint       = {2107.05411},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-05411.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaSEHT21,
  author       = {Ai Kitagawa and
                  Yusuke Sakai and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {Fully Anonymous Group Signature with Verifier-Local Revocation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {170},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/170},
  timestamp    = {Tue, 02 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaSEHT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT21,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Obfustopia Built on Secret-Key Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1018},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1018},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrunettaLLMT21,
  author       = {Carlo Brunetta and
                  Mario Larangeira and
                  Bei Liang and
                  Aikaterini Mitrokotsa and
                  Keisuke Tanaka},
  title        = {Turn-Based Communication Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1126},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1126},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BrunettaLLMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JourenkoLT21,
  author       = {Maxim Jourenko and
                  Mario Larangeira and
                  Keisuke Tanaka},
  title        = {Interhead Hydra Two Heads are Better than One},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1188},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1188},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JourenkoLT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/alr/TanakaAU20,
  author       = {Keisuke Tanaka and
                  Ken Arai and
                  Masafumi Uchida},
  title        = {Evaluation of task difficulty based on fluctuation characteristics
                  in writing task},
  journal      = {Artif. Life Robotics},
  volume       = {25},
  number       = {1},
  pages        = {17--23},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10015-019-00570-w},
  doi          = {10.1007/S10015-019-00570-W},
  timestamp    = {Tue, 17 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/alr/TanakaAU20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TezukaT20,
  author       = {Masayuki Tezuka and
                  Keisuke Tanaka},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based
                  Synchronized Aggregate Signature Scheme},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {225--243},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_12},
  doi          = {10.1007/978-3-030-55304-3\_12},
  timestamp    = {Wed, 17 Aug 2022 14:32:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TezukaT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YoshidaKXT20,
  author       = {Yusuke Yoshida and
                  Fuyuki Kitagawa and
                  Keita Xagawa and
                  Keisuke Tanaka},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Non-committing Encryption with Constant Ciphertext Expansion from
                  Standard Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {36--65},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_2},
  doi          = {10.1007/978-3-030-64834-3\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YoshidaKXT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/JourenkoLT20,
  author       = {Maxim Jourenko and
                  Mario Larangeira and
                  Keisuke Tanaka},
  editor       = {Stephan Krenn and
                  Haya Schulmann and
                  Serge Vaudenay},
  title        = {Lightweight Virtual Payment Channels},
  booktitle    = {Cryptology and Network Security - 19th International Conference, {CANS}
                  2020, Vienna, Austria, December 14-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12579},
  pages        = {365--384},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65411-5\_18},
  doi          = {10.1007/978-3-030-65411-5\_18},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/JourenkoLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HiragaHTYT20,
  author       = {Daiki Hiraga and
                  Keisuke Hara and
                  Masayuki Tezuka and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  editor       = {Deukjo Hong},
  title        = {Security Definitions on Time-Lock Puzzles},
  booktitle    = {Information Security and Cryptology - {ICISC} 2020 - 23rd International
                  Conference, Seoul, South Korea, December 2-4, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12593},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68890-5\_1},
  doi          = {10.1007/978-3-030-68890-5\_1},
  timestamp    = {Thu, 11 Feb 2021 16:04:17 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/HiragaHTYT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NaritaKYT20,
  author       = {Tasuku Narita and
                  Fuyuki Kitagawa and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  editor       = {Deukjo Hong},
  title        = {Secret Sharing with Statistical Privacy and Computational Relaxed
                  Non-malleability},
  booktitle    = {Information Security and Cryptology - {ICISC} 2020 - 23rd International
                  Conference, Seoul, South Korea, December 2-4, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12593},
  pages        = {16--39},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68890-5\_2},
  doi          = {10.1007/978-3-030-68890-5\_2},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/NaritaKYT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/SudoTHYT20,
  author       = {Kyohei Sudo and
                  Masayuki Tezuka and
                  Keisuke Hara and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  editor       = {Khoa Nguyen and
                  Wenling Wu and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang},
  title        = {Watermarkable Signature with Computational Function Preserving},
  booktitle    = {Provable and Practical Security - 14th International Conference, ProvSec
                  2020, Singapore, November 29 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  pages        = {124--144},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62576-4\_7},
  doi          = {10.1007/978-3-030-62576-4\_7},
  timestamp    = {Sat, 17 Dec 2022 21:30:21 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/SudoTHYT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LuHT20,
  author       = {Yi Lu and
                  Keisuke Hara and
                  Keisuke Tanaka},
  editor       = {Khoa Nguyen and
                  Wenling Wu and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang},
  title        = {Receiver Selective Opening {CCA} Secure Public Key Encryption from
                  Various Assumptions},
  booktitle    = {Provable and Practical Security - 14th International Conference, ProvSec
                  2020, Singapore, November 29 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  pages        = {213--233},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62576-4\_11},
  doi          = {10.1007/978-3-030-62576-4\_11},
  timestamp    = {Mon, 23 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/LuHT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JourenkoLT20,
  author       = {Maxim Jourenko and
                  Mario Larangeira and
                  Keisuke Tanaka},
  title        = {Lightweight Virtual Payment Channels},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {998},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/998},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JourenkoLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoshidaKXT20,
  author       = {Yusuke Yoshida and
                  Fuyuki Kitagawa and
                  Keita Xagawa and
                  Keisuke Tanaka},
  title        = {Non-Committing Encryption with Constant Ciphertext Expansion from
                  Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1210},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1210},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YoshidaKXT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JourenkoLT20a,
  author       = {Maxim Jourenko and
                  Mario Larangeira and
                  Keisuke Tanaka},
  title        = {Payment Trees: Low Collateral Payments for Payment Channel Networks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1313},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1313},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/JourenkoLT20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/HaraKMHT19,
  author       = {Keisuke Hara and
                  Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {Simulation-based receiver selective opening {CCA} secure {PKE} from
                  standard computational assumptions},
  journal      = {Theor. Comput. Sci.},
  volume       = {795},
  pages        = {570--597},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2019.08.016},
  doi          = {10.1016/J.TCS.2019.08.016},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/HaraKMHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Kitagawa0T19,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Keisuke Tanaka},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Simple and Efficient {KDM-CCA} Secure Public Key Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {97--127},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_4},
  doi          = {10.1007/978-3-030-34618-8\_4},
  timestamp    = {Fri, 22 Nov 2019 13:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Kitagawa0T19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YoshidaKT19,
  author       = {Yusuke Yoshida and
                  Fuyuki Kitagawa and
                  Keisuke Tanaka},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based
                  on the {DDH} Problem},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {128--158},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_5},
  doi          = {10.1007/978-3-030-34618-8\_5},
  timestamp    = {Fri, 22 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YoshidaKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/EgashiraWT19,
  author       = {Shohei Egashira and
                  Yuyu Wang and
                  Keisuke Tanaka},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Fine-Grained Cryptography Revisited},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  pages        = {637--666},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8\_22},
  doi          = {10.1007/978-3-030-34618-8\_22},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/EgashiraWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/TezukaST19,
  author       = {Masayuki Tezuka and
                  Xiangyu Su and
                  Keisuke Tanaka},
  editor       = {Yi Mu and
                  Robert H. Deng and
                  Xinyi Huang},
  title        = {A t-out-of-n Redactable Signature Scheme},
  booktitle    = {Cryptology and Network Security - 18th International Conference, {CANS}
                  2019, Fuzhou, China, October 25-27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11829},
  pages        = {470--489},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31578-8\_26},
  doi          = {10.1007/978-3-030-31578-8\_26},
  timestamp    = {Thu, 17 Mar 2022 14:41:28 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/TezukaST19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Ishida0EHT19,
  author       = {Ai Ishida and
                  Yusuke Sakai and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Proper Usage of the Group Signature Scheme in {ISO/IEC} 20008-2},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {515--528},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329824},
  doi          = {10.1145/3321705.3329824},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Ishida0EHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kitagawa0T19,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Keisuke Tanaka},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {{CCA} Security and Trapdoor Functions via Key-Dependent-Message Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {33--64},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_2},
  doi          = {10.1007/978-3-030-26954-8\_2},
  timestamp    = {Fri, 09 Aug 2019 14:27:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kitagawa0T19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KitagawaNTY19,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka and
                  Takashi Yamakawa},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Adaptively Secure and Succinct Functional Encryption: Improving Security
                  and Efficiency, Simultaneously},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {521--551},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_17},
  doi          = {10.1007/978-3-030-26954-8\_17},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KitagawaNTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshidaSEHT19,
  author       = {Ai Ishida and
                  Yusuke Sakai and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {Proper Usage of the Group Signature Scheme in {ISO/IEC} 20008-2},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {284},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/284},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshidaSEHT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaMT19,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Keisuke Tanaka},
  title        = {{CCA} Security and Trapdoor Functions via Key-Dependent-Message Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {291},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/291},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaMT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JourenkoKLT19,
  author       = {Maxim Jourenko and
                  Kanta Kurazumi and
                  Mario Larangeira and
                  Keisuke Tanaka},
  title        = {SoK: {A} Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {352},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/352},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JourenkoKLT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaMT19a,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Keisuke Tanaka},
  title        = {Simple and Efficient {KDM-CCA} Secure Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1012},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaMT19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoshidaKT19,
  author       = {Yusuke Yoshida and
                  Fuyuki Kitagawa and
                  Keisuke Tanaka},
  title        = {Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based
                  on the {DDH} Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1151},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoshidaKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EgashiraWT19,
  author       = {Shohei Egashira and
                  Yuyu Wang and
                  Keisuke Tanaka},
  title        = {Fine-Grained Cryptography Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1488},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1488},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EgashiraWT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YamadaAEHT18,
  author       = {Kotoko Yamada and
                  Nuttapong Attrapadung and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {Generic Constructions for Fully Secure Revocable Attribute-Based Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {9},
  pages        = {1456--1472},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.1456},
  doi          = {10.1587/TRANSFUN.E101.A.1456},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YamadaAEHT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ThanhTDTN18,
  author       = {Ta Minh Thanh and
                  Keisuke Tanaka and
                  Luu Hong Dung and
                  Nguyen Tuan Tai and
                  Hai Nguyen Nam},
  title        = {Performance analysis of robust watermarking using linear and nonlinear
                  feature matching},
  journal      = {Multim. Tools Appl.},
  volume       = {77},
  number       = {2},
  pages        = {2901--2920},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11042-017-4435-1},
  doi          = {10.1007/S11042-017-4435-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ThanhTDTN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KitagawaT18,
  author       = {Fuyuki Kitagawa and
                  Keisuke Tanaka},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {A Framework for Achieving {KDM-CCA} Secure Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  pages        = {127--157},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3\_5},
  doi          = {10.1007/978-3-030-03329-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KitagawaT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Wang0HT18,
  author       = {Yuyu Wang and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Memory Lower Bounds of Reductions Revisited},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10820},
  pages        = {61--90},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78381-9\_3},
  doi          = {10.1007/978-3-319-78381-9\_3},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Wang0HT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KitagawaNT18,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Obfustopia Built on Secret-Key Functional Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {603--648},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_20},
  doi          = {10.1007/978-3-319-78375-8\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KitagawaNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KitagawaT18,
  author       = {Fuyuki Kitagawa and
                  Keisuke Tanaka},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Key Dependent Message Security and Receiver Selective Opening Security
                  for Identity-Based Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10769},
  pages        = {32--61},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76578-5\_2},
  doi          = {10.1007/978-3-319-76578-5\_2},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KitagawaT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KitagawaNT18,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Simple and Generic Constructions of Succinct Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {187--217},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_7},
  doi          = {10.1007/978-3-319-76581-5\_7},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KitagawaNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Ishida0EHT18,
  author       = {Ai Ishida and
                  Yusuke Sakai and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Fully Anonymous Group Signature with Verifier-Local Revocation},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {23--42},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_2},
  doi          = {10.1007/978-3-319-98113-0\_2},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Ishida0EHT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/HaraK0HT18,
  author       = {Keisuke Hara and
                  Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Dario Catalano and
                  Roberto De Prisco},
  title        = {Simulation-Based Receiver Selective Opening {CCA} Secure {PKE} from
                  Standard Computational Assumptions},
  booktitle    = {Security and Cryptography for Networks - 11th International Conference,
                  {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11035},
  pages        = {140--159},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98113-0\_8},
  doi          = {10.1007/978-3-319-98113-0\_8},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/HaraK0HT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/TezukaYT18,
  author       = {Masayuki Tezuka and
                  Yusuke Yoshida and
                  Keisuke Tanaka},
  editor       = {Jean{-}Louis Lanet and
                  Cristian Toma},
  title        = {Weakened Random Oracle Models with Target Prefix},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 11th International Conference, SecITC 2018, Bucharest, Romania,
                  November 8-9, 2018, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11359},
  pages        = {344--357},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12942-2\_26},
  doi          = {10.1007/978-3-030-12942-2\_26},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/TezukaYT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Wang0HT18,
  author       = {Yuyu Wang and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {Memory Lower Bounds of Reductions Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/155},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Wang0HT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangMHT18,
  author       = {Yuyu Wang and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {564},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/564},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangMHT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaT18,
  author       = {Fuyuki Kitagawa and
                  Keisuke Tanaka},
  title        = {A Framework for Achieving {KDM-CCA} Secure Public-Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {845},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/845},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNTY18,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka and
                  Takashi Yamakawa},
  title        = {Adaptively Secure and Succinct Functional Encryption: Improving Security
                  and Efficiency, Simultaneously},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {974},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/974},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HaraKMHT18,
  author       = {Keisuke Hara and
                  Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {Simulation-based Receiver Selective Opening {CCA} Secure {PKE} from
                  Standard Computational Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1091},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1091},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HaraKMHT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/KawachiOTY17,
  author       = {Akinori Kawachi and
                  Yoshio Okamoto and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  title        = {General Constructions of Rational Secret Sharing with Expected Constant-Round
                  Reconstruction},
  journal      = {Comput. J.},
  volume       = {60},
  number       = {5},
  pages        = {711--728},
  year         = {2017},
  url          = {https://doi.org/10.1093/comjnl/bxw094},
  doi          = {10.1093/COMJNL/BXW094},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/KawachiOTY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IshidaEH0T17,
  author       = {Ai Ishida and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai and
                  Keisuke Tanaka},
  title        = {Group Signature with Deniability: How to Disavow a Signature},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1825--1837},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1825},
  doi          = {10.1587/TRANSFUN.E100.A.1825},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IshidaEH0T17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangT17,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  title        = {Generic Transformation for Signatures in the Continual Leakage Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1857--1869},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1857},
  doi          = {10.1587/TRANSFUN.E100.A.1857},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ThanhT17,
  author       = {Ta Minh Thanh and
                  Keisuke Tanaka},
  title        = {An image zero-watermarking algorithm based on the encryption of visual
                  map feature with watermark information},
  journal      = {Multim. Tools Appl.},
  volume       = {76},
  number       = {11},
  pages        = {13455--13471},
  year         = {2017},
  url          = {https://doi.org/10.1007/s11042-016-3750-2},
  doi          = {10.1007/S11042-016-3750-2},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ThanhT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YamadaAEHT17,
  author       = {Kotoko Yamada and
                  Nuttapong Attrapadung and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Simon N. Foley and
                  Dieter Gollmann and
                  Einar Snekkenes},
  title        = {Generic Constructions for Fully Secure Revocable Attribute-Based Encryption},
  booktitle    = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
                  in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10493},
  pages        = {532--551},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66399-9\_29},
  doi          = {10.1007/978-3-319-66399-9\_29},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/YamadaAEHT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/PagninMT17,
  author       = {Elena Pagnin and
                  Aikaterini Mitrokotsa and
                  Keisuke Tanaka},
  editor       = {Tanja Lange and
                  Orr Dunkelman},
  title        = {Anonymous Single-Round Server-Aided Verification},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference
                  on Cryptology and Information Security in Latin America, Havana, Cuba,
                  September 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11368},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-25283-0\_2},
  doi          = {10.1007/978-3-030-25283-0\_2},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/PagninMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/YoshidaMT17,
  author       = {Yusuke Yoshida and
                  Kirill Morozov and
                  Keisuke Tanaka},
  editor       = {Tanja Lange and
                  Tsuyoshi Takagi},
  title        = {{CCA2} Key-Privacy for Code-Based Encryption in the Standard Model},
  booktitle    = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
                  Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10346},
  pages        = {35--50},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59879-6\_3},
  doi          = {10.1007/978-3-319-59879-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/YoshidaMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/WangT17,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  editor       = {Tsuyoshi Takagi and
                  Masato Wakayama and
                  Keisuke Tanaka and
                  Noboru Kunihiro and
                  Kazufumi Kimoto and
                  Dung Hoang Duong},
  title        = {How to Strengthen the Security of Signature Schemes in the Leakage
                  Models: {A} Survey},
  booktitle    = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math
                  Project},
  series       = {Mathematics for Industry},
  pages        = {315--330},
  publisher    = {Springer Singapore},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5065-7\_17},
  doi          = {10.1007/978-981-10-5065-7\_17},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/WangT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/YasudaKT17,
  author       = {Satoshi Yasuda and
                  Fuyuki Kitagawa and
                  Keisuke Tanaka},
  editor       = {Tsuyoshi Takagi and
                  Masato Wakayama and
                  Keisuke Tanaka and
                  Noboru Kunihiro and
                  Kazufumi Kimoto and
                  Dung Hoang Duong},
  title        = {Constructions for the {IND-CCA1} Secure Fully Homomorphic Encryption},
  booktitle    = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math
                  Project},
  series       = {Mathematics for Industry},
  pages        = {331--347},
  publisher    = {Springer Singapore},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5065-7\_18},
  doi          = {10.1007/978-981-10-5065-7\_18},
  timestamp    = {Tue, 18 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/YasudaKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/17/TWTK2017,
  editor       = {Tsuyoshi Takagi and
                  Masato Wakayama and
                  Keisuke Tanaka and
                  Noboru Kunihiro and
                  Kazufumi Kimoto and
                  Dung Hoang Duong},
  title        = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math
                  Project},
  series       = {Mathematics for Industry},
  publisher    = {Springer Singapore},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5065-7},
  doi          = {10.1007/978-981-10-5065-7},
  isbn         = {978-981-10-5064-0},
  timestamp    = {Tue, 18 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/TWTK2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Indistinguishability Obfuscation: Simpler Constructions using Secret-Key
                  Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17a,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Indistinguishability Obfuscation for All Circuits from Secret-Key
                  Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17b,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {From Single-Key to Collusion-Resistant Secret-Key Functional Encryption
                  by Leveraging Succinctness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {638},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/638},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PagninMT17,
  author       = {Elena Pagnin and
                  Aikaterini Mitrokotsa and
                  Keisuke Tanaka},
  title        = {Anonymous Single-Round Server-Aided Verification},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/794},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PagninMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaT17,
  author       = {Fuyuki Kitagawa and
                  Keisuke Tanaka},
  title        = {Key Dependent Message Security and Receiver Selective Opening Security
                  for Identity-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {987},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/987},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Tanaka16,
  author       = {Keisuke Tanaka},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {3},
  pages        = {558},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015FCF0001},
  doi          = {10.1587/TRANSINF.2015FCF0001},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Tanaka16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Tanaka16a,
  author       = {Keisuke Tanaka},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {99-A},
  number       = {6},
  pages        = {1011},
  year         = {2016},
  url          = {https://doi.org/10.1587/transfun.E99.A.1011},
  doi          = {10.1587/TRANSFUN.E99.A.1011},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Tanaka16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WangT16,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  title        = {Strongly simulation-extractable leakage-resilient {NIZK}},
  journal      = {Int. J. Inf. Sec.},
  volume       = {15},
  number       = {1},
  pages        = {67--79},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10207-015-0291-z},
  doi          = {10.1007/S10207-015-0291-Z},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/WangT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mta/ThanhT16,
  author       = {Ta Minh Thanh and
                  Keisuke Tanaka},
  title        = {The novel and robust watermarking method based on q-logarithm frequency
                  domain},
  journal      = {Multim. Tools Appl.},
  volume       = {75},
  number       = {18},
  pages        = {11097--11125},
  year         = {2016},
  url          = {https://doi.org/10.1007/s11042-015-2836-6},
  doi          = {10.1007/S11042-015-2836-6},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mta/ThanhT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangT16,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  title        = {Generic transformations for existentially unforgeable signature schemes
                  in the bounded leakage model},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1829--1842},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1436},
  doi          = {10.1002/SEC.1436},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/WangZ0HT16,
  author       = {Yuyu Wang and
                  Zongyang Zhang and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {How to Obtain Fully Structure-Preserving (Automorphic) Signatures
                  from Structure-Preserving Ones},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  pages        = {465--495},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6\_16},
  doi          = {10.1007/978-3-662-53890-6\_16},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/WangZ0HT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/IshidaEHST16,
  author       = {Ai Ishida and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai and
                  Keisuke Tanaka},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Group Signature with Deniability: How to Disavow a Signature},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {228--244},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_14},
  doi          = {10.1007/978-3-319-48965-0\_14},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/IshidaEHST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KawachiTT16,
  author       = {Akinori Kawachi and
                  Hirotoshi Takebe and
                  Keisuke Tanaka},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Lower Bounds for Key Length of k-wise Almost Independent Permutations
                  and Certain Symmetric-Key Encryption Schemes},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {195--211},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_12},
  doi          = {10.1007/978-3-319-44524-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KawachiTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kitagawa0HT16,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9614},
  pages        = {99--129},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49384-7\_5},
  doi          = {10.1007/978-3-662-49384-7\_5},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Kitagawa0HT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Wang0HT16,
  author       = {Yuyu Wang and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Signatures Resilient to Uninvertible Leakage},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {372--390},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_20},
  doi          = {10.1007/978-3-319-44618-9\_20},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Wang0HT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kitagawa0HT16,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/243},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kitagawa0HT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WangZ0HT16,
  author       = {Yuyu Wang and
                  Zongyang Zhang and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  title        = {How to Obtain Fully Structure-Preserving (Automorphic) Signatures
                  from Structure-Preserving Ones},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {877},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/877},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WangZ0HT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HigoTYY16,
  author       = {Haruna Higo and
                  Keisuke Tanaka and
                  Akihiro Yamada and
                  Kenji Yasunaga},
  title        = {Game-Theoretic Security for Two-Party Protocols},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1072},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1072},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HigoTYY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujisakiKNTY15,
  author       = {Eiichiro Fujisaki and
                  Akinori Kawachi and
                  Ryo Nishimaki and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  title        = {Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split
                  State Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {3},
  pages        = {853--862},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.853},
  doi          = {10.1587/TRANSFUN.E98.A.853},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujisakiKNTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IshidaEHST15,
  author       = {Ai Ishida and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai and
                  Keisuke Tanaka},
  title        = {Disavowable Public Key Encryption with Non-Interactive Opening},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {12},
  pages        = {2446--2455},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.2446},
  doi          = {10.1587/TRANSFUN.E98.A.2446},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IshidaEHST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangT15,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Generic Transformation to Strongly Existentially Unforgeable Signature
                  Schemes with Continuous Leakage Resiliency},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {213--229},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_13},
  doi          = {10.1007/978-3-319-19962-7\_13},
  timestamp    = {Tue, 07 May 2024 20:09:57 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/IshidaEHST15,
  author       = {Ai Ishida and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai and
                  Keisuke Tanaka},
  editor       = {Feng Bao and
                  Steven Miller and
                  Jianying Zhou and
                  Gail{-}Joon Ahn},
  title        = {Disavowable Public Key Encryption with Non-interactive Opening},
  booktitle    = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
                  2015},
  pages        = {667},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2714576.2714642},
  doi          = {10.1145/2714576.2714642},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/IshidaEHST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Kitagawa0HT15,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Kaisa Nyberg},
  title        = {Completeness of Single-Bit Projection-KDM Security for Public Key
                  Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {201--219},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_11},
  doi          = {10.1007/978-3-319-16715-2\_11},
  timestamp    = {Thu, 14 Oct 2021 10:27:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Kitagawa0HT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kse/ThanhT15,
  author       = {Ta Minh Thanh and
                  Keisuke Tanaka},
  editor       = {Bernard M{\'{e}}rialdo and
                  Minh Le Nguyen and
                  Duy{-}Dinh Le and
                  Duc Anh Duong and
                  Satoshi Tojo},
  title        = {Comparison of Watermarking Schemes Using Linear and Nonlinear Feature
                  Matching},
  booktitle    = {2015 Seventh International Conference on Knowledge and Systems Engineering,
                  {KSE} 2015, Ho Chi Minh City, Vietnam, October 8-10, 2015},
  pages        = {262--267},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/KSE.2015.67},
  doi          = {10.1109/KSE.2015.67},
  timestamp    = {Tue, 18 Oct 2022 10:42:25 +0200},
  biburl       = {https://dblp.org/rec/conf/kse/ThanhT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/visapp/ThanhT15,
  author       = {Ta Minh Thanh and
                  Keisuke Tanaka},
  editor       = {Jos{\'{e}} Braz and
                  Sebastiano Battiato and
                  Francisco H. Imai},
  title        = {Blind Watermarking using {QIM} and the Quantized {SVD} Domain based
                  on the \emph{q-}Logarithm Function},
  booktitle    = {{VISAPP} 2015 - Proceedings of the 10th International Conference on
                  Computer Vision Theory and Applications, Volume 3, Berlin, Germany,
                  11-14 March, 2015},
  pages        = {14--25},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005291900140025},
  doi          = {10.5220/0005291900140025},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/visapp/ThanhT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2015,
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1},
  doi          = {10.1007/978-3-319-22425-1},
  isbn         = {978-3-319-22424-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshidaEHST15,
  author       = {Ai Ishida and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai and
                  Keisuke Tanaka},
  title        = {Group Signature with Deniability: How to Disavow a Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {43},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/043},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshidaEHST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NamikiTY14,
  author       = {Hitoshi Namiki and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  title        = {Randomness Leakage in the {KEM/DEM} Framework},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {1},
  pages        = {191--199},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.191},
  doi          = {10.1587/TRANSFUN.E97.A.191},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NamikiTY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangT14,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Strongly Simulation-Extractable Leakage-Resilient {NIZK}},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_5},
  doi          = {10.1007/978-3-319-08344-5\_5},
  timestamp    = {Thu, 14 Oct 2021 10:41:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Kitagawa0HT14,
  author       = {Fuyuki Kitagawa and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Keisuke Tanaka},
  editor       = {Jooyoung Lee and
                  Jongsung Kim},
  title        = {Efficient Key Dependent Message Security Amplification Against Chosen
                  Ciphertext Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2014 - 17th International
                  Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8949},
  pages        = {84--100},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15943-0\_6},
  doi          = {10.1007/978-3-319-15943-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Kitagawa0HT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pimrc/ThanhT14,
  author       = {Ta Minh Thanh and
                  Keisuke Tanaka},
  title        = {A proposal of novel q-DWT for blind and robust image watermarking},
  booktitle    = {25th {IEEE} Annual International Symposium on Personal, Indoor, and
                  Mobile Radio Communication, {PIMRC} 2014, Washington DC, USA, September
                  2-5, 2014},
  pages        = {2061--2065},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/PIMRC.2014.7136511},
  doi          = {10.1109/PIMRC.2014.7136511},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pimrc/ThanhT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/WangT14,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Generic Transformation to Strongly Existentially Unforgeable Signature
                  Schemes with Leakage Resiliency},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {117--129},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_9},
  doi          = {10.1007/978-3-319-12475-9\_9},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/WangT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NguyenYT13,
  author       = {Manh Ha Nguyen and
                  Kenji Yasunaga and
                  Keisuke Tanaka},
  title        = {Leakage-Resilience of Stateless/Stateful Public-Key Encryption from
                  Hash Proofs},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {6},
  pages        = {1100--1111},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.1100},
  doi          = {10.1587/TRANSFUN.E96.A.1100},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NguyenYT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/AkutsuFHTT13,
  author       = {Tatsuya Akutsu and
                  Daiji Fukagawa and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Atsuhiro Takasu and
                  Keisuke Tanaka},
  title        = {Approximation and parameterized algorithms for common subtrees and
                  edit distance between unordered trees},
  journal      = {Theor. Comput. Sci.},
  volume       = {470},
  pages        = {10--22},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.tcs.2012.11.017},
  doi          = {10.1016/J.TCS.2012.11.017},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/AkutsuFHTT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/IsshikiNT13,
  author       = {Toshiyuki Isshiki and
                  Manh Ha Nguyen and
                  Keisuke Tanaka},
  editor       = {Ed Dawson},
  title        = {Proxy Re-Encryption in a Stronger Security Model Extended from {CT-RSA2012}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at
                  the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March
                  1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7779},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36095-4\_18},
  doi          = {10.1007/978-3-642-36095-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/IsshikiNT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isscc/KoyamaOTK13,
  author       = {Shinzo Koyama and
                  Kazutoshi Onozawa and
                  Keisuke Tanaka and
                  Yoshihisa Kato},
  title        = {A 3D vision 2.1Mpixel image sensor for single-lens camera systems},
  booktitle    = {2013 {IEEE} International Solid-State Circuits Conference - Digest
                  of Technical Papers, {ISSCC} 2013, San Francisco, CA, USA, February
                  17-21, 2013},
  pages        = {492--493},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ISSCC.2013.6487829},
  doi          = {10.1109/ISSCC.2013.6487829},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/isscc/KoyamaOTK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IsshikiNT13,
  author       = {Toshiyuki Isshiki and
                  Manh Ha Nguyen and
                  Keisuke Tanaka},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Attacks to the Proxy Re-Encryption Schemes from {IWSEC2011}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {290--302},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_19},
  doi          = {10.1007/978-3-642-41383-4\_19},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IsshikiNT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HigoTY13,
  author       = {Haruna Higo and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Game-Theoretic Security for Bit Commitment},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {303--318},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_20},
  doi          = {10.1007/978-3-642-41383-4\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HigoTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/IsshikiNT13,
  author       = {Toshiyuki Isshiki and
                  Manh Ha Nguyen and
                  Keisuke Tanaka},
  editor       = {Willy Susilo and
                  Reza Reyhanitabar},
  title        = {Factoring-Based Proxy Re-Encryption Schemes},
  booktitle    = {Provable Security - 7th International Conference, ProvSec 2013, Melaka,
                  Malaysia, October 23-25, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8209},
  pages        = {309--329},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41227-1\_18},
  doi          = {10.1007/978-3-642-41227-1\_18},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/IsshikiNT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tamc/TakebeT13,
  author       = {Hirotoshi Takebe and
                  Keisuke Tanaka},
  editor       = {T.{-}H. Hubert Chan and
                  Lap Chi Lau and
                  Luca Trevisan},
  title        = {Grey-Box Public-Key Steganography},
  booktitle    = {Theory and Applications of Models of Computation, 10th International
                  Conference, {TAMC} 2013, Hong Kong, China, May 20-22, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7876},
  pages        = {294--305},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38236-9\_27},
  doi          = {10.1007/978-3-642-38236-9\_27},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/tamc/TakebeT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawachiOTY13,
  author       = {Akinori Kawachi and
                  Yoshio Okamoto and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  title        = {General Constructions of Rational Secret Sharing with Expected Constant-Round
                  Reconstruction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {874},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/874},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawachiOTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiFT12,
  author       = {Ryo Nishimaki and
                  Eiichiro Fujisaki and
                  Keisuke Tanaka},
  title        = {An Efficient Non-interactive Universally Composable String-Commitment
                  Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {167--175},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.167},
  doi          = {10.1587/TRANSFUN.E95.A.167},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishimakiFT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiFT12a,
  author       = {Ryo Nishimaki and
                  Eiichiro Fujisaki and
                  Keisuke Tanaka},
  title        = {A Multi-Trapdoor Commitment Scheme from the {RSA} Assumption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {176--184},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.176},
  doi          = {10.1587/TRANSFUN.E95.A.176},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishimakiFT12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HigoTYY12,
  author       = {Haruna Higo and
                  Keisuke Tanaka and
                  Akihiro Yamada and
                  Kenji Yasunaga},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {A Game-Theoretic Perspective on Oblivious Transfer},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {29--42},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_3},
  doi          = {10.1007/978-3-642-31448-3\_3},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HigoTYY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NguyenTY12,
  author       = {Manh Ha Nguyen and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Leakage-Resilience of Stateless/Stateful Public-Key Encryption from
                  Hash Proofs},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {208--222},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_16},
  doi          = {10.1007/978-3-642-31448-3\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NguyenTY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KawachiTT12,
  author       = {Akinori Kawachi and
                  Hirotoshi Takebe and
                  Keisuke Tanaka},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {123--137},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_8},
  doi          = {10.1007/978-3-642-34117-5\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KawachiTT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LarangeiraT12,
  author       = {Mario Larangeira and
                  Keisuke Tanaka},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Reduction-Centric Non-programmable Security Proof for the Full Domain
                  Hash in the Random Oracle Model},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {124--143},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_10},
  doi          = {10.1007/978-3-642-35416-8\_10},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LarangeiraT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/PortmannT11,
  author       = {Christopher Portmann and
                  Keisuke Tanaka},
  title        = {Information-Theoretic Secrecy with Access to Decryption Oracles},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {7},
  pages        = {1585--1590},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1585},
  doi          = {10.1587/TRANSFUN.E94.A.1585},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/PortmannT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LarangeiraT11,
  author       = {Mario Larangeira and
                  Keisuke Tanaka},
  title        = {Programmability in the Generic Ring and Group Models},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {1},
  number       = {2/3},
  pages        = {57--73},
  year         = {2011},
  url          = {https://doi.org/10.22667/JISIS.2011.08.31.057},
  doi          = {10.22667/JISIS.2011.08.31.057},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/LarangeiraT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KawachiPT11,
  author       = {Akinori Kawachi and
                  Christopher Portmann and
                  Keisuke Tanaka},
  editor       = {Serge Fehr},
  title        = {Characterization of the Relations between Information-Theoretic Non-malleability,
                  Secrecy, and Authenticity},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {6--24},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_2},
  doi          = {10.1007/978-3-642-20728-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KawachiPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TanakaYY11,
  author       = {Keisuke Tanaka and
                  Akihiro Yamada and
                  Kenji Yasunaga},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Weak Oblivious Transfer from Strong One-Way Functions},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {34--51},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_5},
  doi          = {10.1007/978-3-642-24316-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/TanakaYY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NamikiTY11,
  author       = {Hitoshi Namiki and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Randomness Leakage in the {KEM/DEM} Framework},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_22},
  doi          = {10.1007/978-3-642-24316-5\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NamikiTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawachiPT11,
  author       = {Akinori Kawachi and
                  Christopher Portmann and
                  Keisuke Tanaka},
  title        = {Characterization of the relations between information-theoretic non-malleability,
                  secrecy, and authenticity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawachiPT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IsshikiWT10,
  author       = {Toshiyuki Isshiki and
                  Koichiro Wada and
                  Keisuke Tanaka},
  title        = {A Rational Secret-Sharing Scheme Based on {RSA-OAEP}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {42--49},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.42},
  doi          = {10.1587/TRANSFUN.E93.A.42},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IsshikiWT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiranoT10,
  author       = {Takato Hirano and
                  Keisuke Tanaka},
  title        = {Key Generation for Fast Inversion of the Paillier Encryption Function},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {6},
  pages        = {1111--1121},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1111},
  doi          = {10.1587/TRANSFUN.E93.A.1111},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HiranoT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NishimakiFT10,
  author       = {Ryo Nishimaki and
                  Eiichiro Fujisaki and
                  Keisuke Tanaka},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {A Multi-trapdoor Commitment Scheme from the {RSA} Assumption},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_12},
  doi          = {10.1007/978-3-642-14081-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NishimakiFT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MatsudaNT10,
  author       = {Toshihide Matsuda and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {{CCA} Proxy Re-Encryption without Bilinear Maps in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_16},
  doi          = {10.1007/978-3-642-13013-7\_16},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MatsudaNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KawachiNTX10,
  author       = {Akinori Kawachi and
                  Akira Numayama and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Security of Encryption Schemes in Weakened Random Oracle Models},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {403--419},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_24},
  doi          = {10.1007/978-3-642-13013-7\_24},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KawachiNTX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawachiNTX10,
  author       = {Akinori Kawachi and
                  Akira Numayama and
                  Keisuke Tanaka and
                  Keita Xagawa},
  title        = {Security of Encryption Schemes in Weakened Random Oracle Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawachiNTX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/InoueT09,
  author       = {Daisuke Inoue and
                  Keisuke Tanaka},
  title        = {Symmetricity of the Protocols Related to Oblivious Transfer},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {217--221},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.217},
  doi          = {10.1587/TRANSFUN.E92.A.217},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/InoueT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiranoWT09,
  author       = {Takato Hirano and
                  Koichiro Wada and
                  Keisuke Tanaka},
  title        = {Primitive Power Roots of Unity and Its Application to Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {8},
  pages        = {1836--1844},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1836},
  doi          = {10.1587/TRANSFUN.E92.A.1836},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HiranoWT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NumayamaT09,
  author       = {Akira Numayama and
                  Keisuke Tanaka},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {On the Weak Ideal Compression Functions},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {232--248},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_16},
  doi          = {10.1007/978-3-642-02620-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NumayamaT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HiwatariTAS09,
  author       = {Harunaga Hiwatari and
                  Keisuke Tanaka and
                  Tomoyuki Asano and
                  Koichi Sakumoto},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Multi-recipient Public-Key Encryption from Simulators in Security
                  Proofs},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_21},
  doi          = {10.1007/978-3-642-02620-1\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HiwatariTAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MatsudaNNT09,
  author       = {Toshihide Matsuda and
                  Ryo Nishimaki and
                  Akira Numayama and
                  Keisuke Tanaka},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Security on Hybrid Encryption with the Tag-KEM/DEM Framework},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {343--359},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_24},
  doi          = {10.1007/978-3-642-02620-1\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MatsudaNNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/StehleSTX09,
  author       = {Damien Stehl{\'{e}} and
                  Ron Steinfeld and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Mitsuru Matsui},
  title        = {Efficient Public Key Encryption Based on Ideal Lattices},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {617--635},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_36},
  doi          = {10.1007/978-3-642-10366-7\_36},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/StehleSTX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NishimakiFT09,
  author       = {Ryo Nishimaki and
                  Eiichiro Fujisaki and
                  Keisuke Tanaka},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Efficient Non-interactive Universally Composable String-Commitment
                  Schemes},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_3},
  doi          = {10.1007/978-3-642-04642-1\_3},
  timestamp    = {Sun, 02 Jun 2019 21:26:38 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NishimakiFT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FujisakiNT09,
  author       = {Eiichiro Fujisaki and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash
                  Functions},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {118--128},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_11},
  doi          = {10.1007/978-3-642-04642-1\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FujisakiNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/XagawaT09,
  author       = {Keita Xagawa and
                  Keisuke Tanaka},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Zero-Knowledge Protocols for {NTRU:} Application to Identification
                  and Proof of Plaintext Knowledge},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {198--213},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_17},
  doi          = {10.1007/978-3-642-04642-1\_17},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/XagawaT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StehleSTX09,
  author       = {Damien Stehl{\'{e}} and
                  Ron Steinfeld and
                  Keisuke Tanaka and
                  Keita Xagawa},
  title        = {Efficient Public Key Encryption Based on Ideal Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StehleSTX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/InoueT08,
  author       = {Daisuke Inoue and
                  Keisuke Tanaka},
  title        = {Conditional Converge Cast},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {6},
  pages        = {1537--1540},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.6.1537},
  doi          = {10.1093/IETFEC/E91-A.6.1537},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/InoueT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HiranoWT08,
  author       = {Takato Hirano and
                  Koichiro Wada and
                  Keisuke Tanaka},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Public-Key Cryptosystems with Primitive Power Roots of Unity},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_8},
  doi          = {10.1007/978-3-540-70500-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HiranoWT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KawachiTX08,
  author       = {Akinori Kawachi and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Josef Pieprzyk},
  title        = {Concurrently Secure Identification Schemes Based on the Worst-Case
                  Hardness of Lattice Problems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {372--389},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_23},
  doi          = {10.1007/978-3-540-89255-7\_23},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KawachiTX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NumayamaIT08,
  author       = {Akira Numayama and
                  Toshiyuki Isshiki and
                  Keisuke Tanaka},
  editor       = {Ronald Cramer},
  title        = {Security of Digital Signature Schemes in Weakened Random Oracle Models},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {268--287},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_16},
  doi          = {10.1007/978-3-540-78440-1\_16},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NumayamaIT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HayashiT07,
  author       = {Ryotaro Hayashi and
                  Keisuke Tanaka},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Anonymity on Paillier's Trap-Door Permutation},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {200--214},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_16},
  doi          = {10.1007/978-3-540-73458-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HayashiT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KawachiTX07,
  author       = {Akinori Kawachi and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Multi-bit Cryptosystems Based on Lattice Problems},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {315--329},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_21},
  doi          = {10.1007/978-3-540-71677-8\_21},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KawachiTX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vr/KitamuraNTJ07,
  author       = {Yoshifumi Kitamura and
                  Takashi Nakashima and
                  Keisuke Tanaka and
                  Takeshi Johkoh},
  editor       = {William R. Sherman and
                  Ming C. Lin and
                  Anthony Steed},
  title        = {The IllusionHole for Medical Applications},
  booktitle    = {{IEEE} Virtual Reality Conference, {VR} 2007, 10-14 March 2007, Charlotte,
                  NC, USA, Proceedings},
  pages        = {231--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/VR.2007.352488},
  doi          = {10.1109/VR.2007.352488},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vr/KitamuraNTJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HayashiT06,
  author       = {Ryotaro Hayashi and
                  Keisuke Tanaka},
  title        = {Schemes for Encryption with Anonymity and Ring Signature},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {66--73},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.66},
  doi          = {10.1093/IETFEC/E89-A.1.66},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HayashiT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiwatariT06,
  author       = {Harunaga Hiwatari and
                  Keisuke Tanaka},
  title        = {A Cramer-Shoup Variant Related to the Quadratic Residuosity Problem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {203--205},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.203},
  doi          = {10.1093/IETFEC/E89-A.1.203},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HiwatariT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HayashiT06,
  author       = {Ryotaro Hayashi and
                  Keisuke Tanaka},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {{PA} in the Two-Key Setting and a Generic Conversion for Encryption
                  with Anonymity},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {271--282},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_23},
  doi          = {10.1007/11780656\_23},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HayashiT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YamashitaT06,
  author       = {Naoyuki Yamashita and
                  Keisuke Tanaka},
  editor       = {Jae{-}Kwang Lee and
                  Okyeon Yi and
                  Moti Yung},
  title        = {Secret Handshake with Multiple Groups},
  booktitle    = {Information Security Applications, 7th International Workshop, {WISA}
                  2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4298},
  pages        = {339--348},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71093-6\_26},
  doi          = {10.1007/978-3-540-71093-6\_26},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YamashitaT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OnoderaT05,
  author       = {Takao Onodera and
                  Keisuke Tanaka},
  title        = {Shufle for Paillier's Encryption Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {5},
  pages        = {1241--1248},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietfec/e88-a.5.1241},
  doi          = {10.1093/IETFEC/E88-A.5.1241},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OnoderaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IsshikiT05,
  author       = {Toshiyuki Isshiki and
                  Keisuke Tanaka},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {An (n-t)-out-of-n Threshold Ring Signature Scheme},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {406--416},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_34},
  doi          = {10.1007/11506157\_34},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IsshikiT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HayashiT05,
  author       = {Ryotaro Hayashi and
                  Keisuke Tanaka},
  editor       = {Bimal K. Roy},
  title        = {Universally Anonymizable Public-Key Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Chennai, India, December 4-8, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3788},
  pages        = {293--312},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11593447\_16},
  doi          = {10.1007/11593447\_16},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HayashiT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icita/HadaT05,
  author       = {Hiroki Hada and
                  Keisuke Tanaka},
  title        = {Security for Authenticated Key Exchange Based on Non-Malleability},
  booktitle    = {Third International Conference on Information Technology and Applications
                  {(ICITA} 2005), 4-7 July 2005, Sydney, Australia},
  pages        = {508--513},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICITA.2005.249},
  doi          = {10.1109/ICITA.2005.249},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icita/HadaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icita/MiharaT05,
  author       = {Akihiro Mihara and
                  Keisuke Tanaka},
  title        = {Universal Designated-Verifier Signature with Aggregation},
  booktitle    = {Third International Conference on Information Technology and Applications
                  {(ICITA} 2005), 4-7 July 2005, Sydney, Australia},
  pages        = {514--519},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICITA.2005.293},
  doi          = {10.1109/ICITA.2005.293},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icita/MiharaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HayashiT05,
  author       = {Ryotaro Hayashi and
                  Keisuke Tanaka},
  editor       = {Serge Vaudenay},
  title        = {The Sampling Twice Technique for the RSA-Based Cryptosystems with
                  Anonymity},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {216--233},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_15},
  doi          = {10.1007/978-3-540-30580-4\_15},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HayashiT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/SungT04,
  author       = {Shao Chin Sung and
                  Keisuke Tanaka},
  title        = {Limiting negations in bounded-depth circuits: An extension of Markov's
                  theorem},
  journal      = {Inf. Process. Lett.},
  volume       = {90},
  number       = {1},
  pages        = {15--20},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.ipl.2004.01.003},
  doi          = {10.1016/J.IPL.2004.01.003},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/SungT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HayashiOT04,
  author       = {Ryotaro Hayashi and
                  Tatsuaki Okamoto and
                  Keisuke Tanaka},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {An {RSA} Family of Trap-Door Permutations with a Common Domain and
                  Its Applications},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {291--304},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_21},
  doi          = {10.1007/978-3-540-24632-9\_21},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HayashiOT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/Tanaka03,
  author       = {Keisuke Tanaka},
  title        = {Quantum Bit-commitment for Small Storage Based on Quantum One-way
                  Permutations},
  journal      = {New Gener. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {339--345},
  year         = {2003},
  url          = {https://doi.org/10.1007/BF03037308},
  doi          = {10.1007/BF03037308},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/Tanaka03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gameon/ThawonmasHT03,
  author       = {Ruck Thawonmas and
                  Hiroki Hassaku and
                  Keisuke Tanaka},
  editor       = {Quasim H. Mehdi and
                  Norman E. Gough and
                  St{\'{e}}phane Natkin},
  title        = {Mimicry: Another Approach for Interactive Comedy},
  booktitle    = {4th International Conference on Intelligent Games and Simulation {(GAME-ON}
                  2003), 19-21 November 2003, London, {UK}},
  pages        = {47},
  publisher    = {{EUROSIS}},
  year         = {2003},
  timestamp    = {Sun, 04 Nov 2012 15:01:41 +0100},
  biburl       = {https://dblp.org/rec/conf/gameon/ThawonmasHT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/SungT03,
  author       = {Shao Chin Sung and
                  Keisuke Tanaka},
  editor       = {Toshihide Ibaraki and
                  Naoki Katoh and
                  Hirotaka Ono},
  title        = {Limiting Negations in Bounded-Depth Circuits: An Extension of Markov's
                  Theorem},
  booktitle    = {Algorithms and Computation, 14th International Symposium, {ISAAC}
                  2003, Kyoto, Japan, December 15-17, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2906},
  pages        = {108--116},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24587-2\_13},
  doi          = {10.1007/978-3-540-24587-2\_13},
  timestamp    = {Fri, 29 Dec 2023 12:40:31 +0100},
  biburl       = {https://dblp.org/rec/conf/isaac/SungT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/prima/ThawonmasTH03,
  author       = {Ruck Thawonmas and
                  Keisuke Tanaka and
                  Hiroki Hassaku},
  editor       = {Jaeho Lee and
                  Mike Barley},
  title        = {Extended Hierarchical Task Network Planning for Interactive Comedy},
  booktitle    = {Intelligent Agents and Multi-Agent Systems, 6th Pacific Rim International
                  Workshop on Multi-Agents, {PRIMA} 2003, Seoul, Korea, November 7-8,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2891},
  pages        = {205--213},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39896-7\_18},
  doi          = {10.1007/978-3-540-39896-7\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/prima/ThawonmasTH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/SungT02,
  author       = {Shao Chin Sung and
                  Keisuke Tanaka},
  title        = {An exponential gap with the removal of one negation gate},
  journal      = {Inf. Process. Lett.},
  volume       = {82},
  number       = {3},
  pages        = {155--157},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0020-0190(01)00264-2},
  doi          = {10.1016/S0020-0190(01)00264-2},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/SungT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoTU00,
  author       = {Tatsuaki Okamoto and
                  Keisuke Tanaka and
                  Shigenori Uchiyama},
  editor       = {Mihir Bellare},
  title        = {Quantum Public-Key Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 20-24,
                  2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1880},
  pages        = {147--165},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44598-6\_9},
  doi          = {10.1007/3-540-44598-6\_9},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoTU00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/anor/TanakaV99,
  author       = {Keisuke Tanaka and
                  Milan Vlach},
  title        = {Minimizing maximum absolute lateness and range of lateness under generalizeddue
                  dates on a single machine},
  journal      = {Ann. Oper. Res.},
  volume       = {86},
  pages        = {507--526},
  year         = {1999},
  url          = {https://doi.org/10.1023/A\%3A1018987625819},
  doi          = {10.1023/A\%3A1018987625819},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/anor/TanakaV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/BealsNT98,
  author       = {Robert Beals and
                  Tetsuro Nishino and
                  Keisuke Tanaka},
  title        = {On the Complexity of Negation-Limited Boolean Networks},
  journal      = {{SIAM} J. Comput.},
  volume       = {27},
  number       = {5},
  pages        = {1334--1347},
  year         = {1998},
  url          = {https://doi.org/10.1137/S0097539794275136},
  doi          = {10.1137/S0097539794275136},
  timestamp    = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/BealsNT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/TanakaNB96,
  author       = {Keisuke Tanaka and
                  Tetsuro Nishino and
                  Robert Beals},
  title        = {Negation-Limited Circuit Complexity of Symmetric Functions},
  journal      = {Inf. Process. Lett.},
  volume       = {59},
  number       = {5},
  pages        = {273--279},
  year         = {1996},
  url          = {https://doi.org/10.1016/0020-0190(96)00115-9},
  doi          = {10.1016/0020-0190(96)00115-9},
  timestamp    = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/TanakaNB96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/HalldorssonT96,
  author       = {Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Keisuke Tanaka},
  editor       = {Tetsuo Asano and
                  Yoshihide Igarashi and
                  Hiroshi Nagamochi and
                  Satoru Miyano and
                  Subhash Suri},
  title        = {Approximation and Special Cases of Common Subtrees and Editing Distance},
  booktitle    = {Algorithms and Computation, 7th International Symposium, {ISAAC} '96,
                  Osaka, Japan, December 16-18, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1178},
  pages        = {75--84},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0009483},
  doi          = {10.1007/BFB0009483},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/HalldorssonT96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishinoT95,
  author       = {Tetsuro Nishino and
                  Keisuke Tanaka},
  title        = {On the Negation-Limited Circuit Complexity of Clique Functions},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {78-D},
  number       = {1},
  pages        = {86--89},
  year         = {1995},
  url          = {http://search.ieice.org/bin/summary.php?id=e78-d\_1\_86},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishinoT95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BealsNT95,
  author       = {Robert Beals and
                  Tetsuro Nishino and
                  Keisuke Tanaka},
  editor       = {Frank Thomson Leighton and
                  Allan Borodin},
  title        = {More on the complexity of negation-limited circuits},
  booktitle    = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory
                  of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}},
  pages        = {585--595},
  publisher    = {{ACM}},
  year         = {1995},
  url          = {https://doi.org/10.1145/225058.225276},
  doi          = {10.1145/225058.225276},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/BealsNT95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/TanakaN94,
  author       = {Keisuke Tanaka and
                  Tetsuro Nishino},
  editor       = {Frank Thomson Leighton and
                  Michael T. Goodrich},
  title        = {On the complexity of negation-limited Boolean networks},
  booktitle    = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of
                  Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec,
                  Canada},
  pages        = {38--47},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/195058.195099},
  doi          = {10.1145/195058.195099},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/TanakaN94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics