Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Keisuke Tanaka
@inproceedings{DBLP:conf/acns/WangSLT24, author = {Pengfei Wang and Xiangyu Su and Mario Larangeira and Keisuke Tanaka}, editor = {Christina P{\"{o}}pper and Lejla Batina}, title = {Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing}, booktitle = {Applied Cryptography and Network Security - 22nd International Conference, {ACNS} 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14583}, pages = {88--118}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-54770-6\_4}, doi = {10.1007/978-3-031-54770-6\_4}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/WangSLT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2404-00602, author = {Masayuki Tezuka and Keisuke Tanaka}, title = {1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost}, journal = {CoRR}, volume = {abs/2404.00602}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2404.00602}, doi = {10.48550/ARXIV.2404.00602}, eprinttype = {arXiv}, eprint = {2404.00602}, timestamp = {Wed, 08 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2404-00602.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/YamamuroHTYT23, author = {Hiroki Yamamuro and Keisuke Hara and Masayuki Tezuka and Yusuke Yoshida and Keisuke Tanaka}, title = {Forward Secure Message Franking with Updatable Reporting Tags}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {9}, pages = {1164--1176}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022dmp0004}, doi = {10.1587/TRANSFUN.2022DMP0004}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/YamamuroHTYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TezukaT23, author = {Masayuki Tezuka and Keisuke Tanaka}, editor = {Hwajeong Seo and Suhri Kim}, title = {1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost}, booktitle = {Information Security and Cryptology - {ICISC} 2023 - 26th International Conference on Information Security and Cryptology, {ICISC} 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14561}, pages = {261--281}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1235-9\_14}, doi = {10.1007/978-981-97-1235-9\_14}, timestamp = {Wed, 13 Mar 2024 19:10:54 +0100}, biburl = {https://dblp.org/rec/conf/icisc/TezukaT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SuLT23, author = {Xiangyu Su and Mario Larangeira and Keisuke Tanaka}, editor = {Shujun Li and Mark Manulis and Atsuko Miyaji}, title = {Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning}, booktitle = {Network and System Security - 17th International Conference, {NSS} 2023, Canterbury, UK, August 14-16, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13983}, pages = {114--136}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-39828-5\_7}, doi = {10.1007/978-3-031-39828-5\_7}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/SuLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-00265, author = {Masayuki Tezuka and Keisuke Tanaka}, title = {Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature}, journal = {CoRR}, volume = {abs/2304.00265}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.00265}, doi = {10.48550/ARXIV.2304.00265}, eprinttype = {arXiv}, eprint = {2304.00265}, timestamp = {Mon, 17 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-00265.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuLT23, author = {Xiangyu Su and Mario Larangeira and Keisuke Tanaka}, title = {Provably Secure Blockchain Protocols from Distributed Proof-of-Deep-Learning}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1059}, year = {2023}, url = {https://eprint.iacr.org/2023/1059}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangSLT23, author = {Pengfei Wang and Xiangyu Su and Mario Larangeira and Keisuke Tanaka}, title = {Auditable Attribute-Based Credentials Scheme and Its Applications in Contact Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1060}, year = {2023}, url = {https://eprint.iacr.org/2023/1060}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangSLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SuLT22, author = {Xiangyu Su and Mario Larangeira and Keisuke Tanaka}, title = {How to Prove Work: With Time or Memory}, journal = {{IEEE} Access}, volume = {10}, pages = {1192--1201}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2021.3138497}, doi = {10.1109/ACCESS.2021.3138497}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SuLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangSJJLT22, author = {Pengfei Wang and Xiangyu Su and Maxim Jourenko and Zixian Jiang and Mario Larangeira and Keisuke Tanaka}, title = {Environmental Adaptive Privacy Preserving Contact Tracing System: {A} Construction From Public Key Rerandomizable {BLS} Signatures}, journal = {{IEEE} Access}, volume = {10}, pages = {37181--37199}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3164186}, doi = {10.1109/ACCESS.2022.3164186}, timestamp = {Wed, 27 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangSJJLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/LuHT22, author = {Yi Lu and Keisuke Hara and Keisuke Tanaka}, title = {Multikey Verifiable Homomorphic Encryption}, journal = {{IEEE} Access}, volume = {10}, pages = {84761--84775}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3197634}, doi = {10.1109/ACCESS.2022.3197634}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/LuHT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/HaraMHT22, author = {Keisuke Hara and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {Generic transformation from broadcast encryption to round-optimal deniable ring authentication}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {2}, pages = {277--316}, year = {2022}, url = {https://doi.org/10.1007/s10623-021-00975-4}, doi = {10.1007/S10623-021-00975-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/HaraMHT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/HaraMT22, author = {Keisuke Hara and Takahiro Matsuda and Keisuke Tanaka}, title = {Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {3}, pages = {160--172}, year = {2022}, url = {https://doi.org/10.1587/transfun.2021cip0006}, doi = {10.1587/TRANSFUN.2021CIP0006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/HaraMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KitagawaMT22, author = {Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka}, title = {{CCA} Security and Trapdoor Functions via Key-Dependent-Message Security}, journal = {J. Cryptol.}, volume = {35}, number = {2}, pages = {9}, year = {2022}, url = {https://doi.org/10.1007/s00145-022-09420-8}, doi = {10.1007/S00145-022-09420-8}, timestamp = {Mon, 21 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/KitagawaMT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KitagawaNT22, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Obfustopia Built on Secret-Key Functional Encryption}, journal = {J. Cryptol.}, volume = {35}, number = {3}, pages = {19}, year = {2022}, url = {https://doi.org/10.1007/s00145-022-09429-z}, doi = {10.1007/S00145-022-09429-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KitagawaNT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/LuHOST22, author = {Yi Lu and Keisuke Hara and Kazuma Ohara and Jacob C. N. Schuldt and Keisuke Tanaka}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Efficient Two-Party Exponentiation from Quotient Transfer}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {643--662}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_32}, doi = {10.1007/978-3-031-09234-3\_32}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/LuHOST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TezukaT22, author = {Masayuki Tezuka and Keisuke Tanaka}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {317--336}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_16}, doi = {10.1007/978-3-031-29371-9\_16}, timestamp = {Thu, 06 Apr 2023 10:01:46 +0200}, biburl = {https://dblp.org/rec/conf/icisc/TezukaT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/IwataYT22, author = {Ichiro Iwata and Yusuke Yoshida and Keisuke Tanaka}, editor = {Seung{-}Hyun Seo and Hwajeong Seo}, title = {Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary Fields}, booktitle = {Information Security and Cryptology - {ICISC} 2022 - 25th International Conference, {ICISC} 2022, Seoul, South Korea, November 30 - December 2, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13849}, pages = {435--449}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-29371-9\_21}, doi = {10.1007/978-3-031-29371-9\_21}, timestamp = {Thu, 06 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/IwataYT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/marble/JourenkoLT22, author = {Maxim Jourenko and Mario Larangeira and Keisuke Tanaka}, editor = {Panos M. Pardalos and Ilias S. Kotsireas and Yike Guo and William J. Knottenbelt}, title = {Interhead Hydra: Two Heads are Better than One}, booktitle = {3rd International Conference on Mathematical Research for Blockchain Economy, {MARBLE} 2022, Vilamoura, Portugal, July 12-14, 2022}, series = {Lecture Notes in Operations Research}, pages = {187--212}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-18679-0\_11}, doi = {10.1007/978-3-031-18679-0\_11}, timestamp = {Tue, 11 Jul 2023 16:47:12 +0200}, biburl = {https://dblp.org/rec/conf/marble/JourenkoLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-09799, author = {Masayuki Tezuka and Keisuke Tanaka}, title = {Redactable Signature with Compactness from Set-Commitment}, journal = {CoRR}, volume = {abs/2202.09799}, year = {2022}, url = {https://arxiv.org/abs/2202.09799}, eprinttype = {arXiv}, eprint = {2202.09799}, timestamp = {Tue, 01 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-09799.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-09807, author = {Masayuki Tezuka and Xiangyu Su and Keisuke Tanaka}, title = {A t-out-of-n Redactable Signature Scheme}, journal = {CoRR}, volume = {abs/2202.09807}, year = {2022}, url = {https://arxiv.org/abs/2202.09807}, eprinttype = {arXiv}, eprint = {2202.09807}, timestamp = {Tue, 01 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-09807.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2202-09808, author = {Masayuki Tezuka and Keisuke Tanaka}, title = {Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme}, journal = {CoRR}, volume = {abs/2202.09808}, year = {2022}, url = {https://arxiv.org/abs/2202.09808}, eprinttype = {arXiv}, eprint = {2202.09808}, timestamp = {Tue, 01 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2202-09808.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuDLMOOTT22, author = {Xiangyu Su and Xavier D{\'{e}}fago and Mario Larangeira and Kazuyuki Mori and Takuya Oda and Yuta Okumura and Yasumasa Tamura and Keisuke Tanaka}, title = {Bid-Matching Problem and Score-Based Consensus for Peer-to-Peer Energy Trading}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1471}, year = {2022}, url = {https://eprint.iacr.org/2022/1471}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SuDLMOOTT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HaraT21, author = {Keisuke Hara and Keisuke Tanaka}, title = {Ring Signature With Unconditional Anonymity in the Plain Model}, journal = {{IEEE} Access}, volume = {9}, pages = {7762--7774}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3049240}, doi = {10.1109/ACCESS.2021.3049240}, timestamp = {Wed, 20 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HaraT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/alr/TanakaU21, author = {Keisuke Tanaka and Masafumi Uchida}, title = {Evaluation of handwriting task difficulty based on detrended fluctuation analysis}, journal = {Artif. Life Robotics}, volume = {26}, number = {2}, pages = {169--175}, year = {2021}, url = {https://doi.org/10.1007/s10015-020-00672-w}, doi = {10.1007/S10015-020-00672-W}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/alr/TanakaU21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/TezukaT21, author = {Masayuki Tezuka and Keisuke Tanaka}, title = {Redactable Signature with Compactness from Set-Commitment}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {9}, pages = {1175--1187}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020dmp0013}, doi = {10.1587/TRANSFUN.2020DMP0013}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/TezukaT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/LuHT21, author = {Yi Lu and Keisuke Hara and Keisuke Tanaka}, title = {Receiver Selective Opening {CCA} Secure Public Key Encryption from Various Assumptions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {9}, pages = {1206--1218}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020dmp0009}, doi = {10.1587/TRANSFUN.2020DMP0009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/LuHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/SudoHTYT21, author = {Kyohei Sudo and Keisuke Hara and Masayuki Tezuka and Yusuke Yoshida and Keisuke Tanaka}, title = {Watermarkable Signature with Computational Function Preserving}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {9}, pages = {1255--1270}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020dmp0022}, doi = {10.1587/TRANSFUN.2020DMP0022}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/SudoHTYT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/EgashiraWT21, author = {Shohei Egashira and Yuyu Wang and Keisuke Tanaka}, title = {Fine-Grained Cryptography Revisited}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {23}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09390-3}, doi = {10.1007/S00145-021-09390-3}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/EgashiraWT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KitagawaNT21, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Simple and Generic Constructions of Succinct Functional Encryption}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {25}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09396-x}, doi = {10.1007/S00145-021-09396-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KitagawaNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/HaraT21, author = {Keisuke Hara and Keisuke Tanaka}, title = {Tightly secure ring signatures in the standard model}, journal = {Theor. Comput. Sci.}, volume = {892}, pages = {208--237}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.09.022}, doi = {10.1016/J.TCS.2021.09.022}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/HaraT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HaraMT21, author = {Keisuke Hara and Takahiro Matsuda and Keisuke Tanaka}, editor = {Keita Emura and Yuntao Wang}, title = {Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {51--59}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458294}, doi = {10.1145/3457338.3458294}, timestamp = {Wed, 16 Jun 2021 07:21:06 +0200}, biburl = {https://dblp.org/rec/conf/ccs/HaraMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/WangSJJLT21, author = {Pengfei Wang and Xiangyu Su and Maxim Jourenko and Zixian Jiang and Mario Larangeira and Keisuke Tanaka}, editor = {Weizhi Meng and Mauro Conti}, title = {Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Diseases}, booktitle = {Cyberspace Safety and Security - 13th International Symposium, {CSS} 2021, Virtual Event, November 9-11, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13172}, pages = {131--144}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-94029-4\_10}, doi = {10.1007/978-3-030-94029-4\_10}, timestamp = {Fri, 14 Jan 2022 10:25:28 +0100}, biburl = {https://dblp.org/rec/conf/css/WangSJJLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/JourenkoLT21, author = {Maxim Jourenko and Mario Larangeira and Keisuke Tanaka}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Payment Trees: Low Collateral Payments for Payment Channel Networks}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12675}, pages = {189--208}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64331-0\_10}, doi = {10.1007/978-3-662-64331-0\_10}, timestamp = {Thu, 16 Mar 2023 14:52:53 +0100}, biburl = {https://dblp.org/rec/conf/fc/JourenkoLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icbc2/SuLT21, author = {Xiangyu Su and Mario Larangeira and Keisuke Tanaka}, title = {How to Prove Work: With Time or Memory}, booktitle = {{IEEE} International Conference on Blockchain and Cryptocurrency, {ICBC} 2021, Sydney, Australia, May 3-6, 2021}, pages = {1--3}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ICBC51069.2021.9461131}, doi = {10.1109/ICBC51069.2021.9461131}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icbc2/SuLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YamamuroHTYT21, author = {Hiroki Yamamuro and Keisuke Hara and Masayuki Tezuka and Yusuke Yoshida and Keisuke Tanaka}, editor = {Jong Hwan Park and Seung{-}Hyun Seo}, title = {Forward Secure Message Franking}, booktitle = {Information Security and Cryptology - {ICISC} 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13218}, pages = {339--358}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-08896-4\_18}, doi = {10.1007/978-3-031-08896-4\_18}, timestamp = {Wed, 27 Jul 2022 22:15:46 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YamamuroHTYT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Wang0HT21, author = {Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Juan A. Garay}, title = {Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {389--420}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_15}, doi = {10.1007/978-3-030-75245-3\_15}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Wang0HT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/BrunettaLLMT21, author = {Carlo Brunetta and Mario Larangeira and Bei Liang and Aikaterini Mitrokotsa and Keisuke Tanaka}, editor = {Qiong Huang and Yu Yu}, title = {Turn-Based Communication Channels}, booktitle = {Provable and Practical Security - 15th International Conference, ProvSec 2021, Guangzhou, China, November 5-8, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13059}, pages = {376--392}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90402-9\_21}, doi = {10.1007/978-3-030-90402-9\_21}, timestamp = {Fri, 05 Nov 2021 15:08:15 +0100}, biburl = {https://dblp.org/rec/conf/provsec/BrunettaLLMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-05411, author = {Masayuki Tezuka and Yusuke Yoshida and Keisuke Tanaka}, title = {Weakened Random Oracle Models with Target Prefix}, journal = {CoRR}, volume = {abs/2107.05411}, year = {2021}, url = {https://arxiv.org/abs/2107.05411}, eprinttype = {arXiv}, eprint = {2107.05411}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-05411.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaSEHT21, author = {Ai Kitagawa and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka}, title = {Fully Anonymous Group Signature with Verifier-Local Revocation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {170}, year = {2021}, url = {https://eprint.iacr.org/2021/170}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaSEHT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT21, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Obfustopia Built on Secret-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1018}, year = {2021}, url = {https://eprint.iacr.org/2021/1018}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BrunettaLLMT21, author = {Carlo Brunetta and Mario Larangeira and Bei Liang and Aikaterini Mitrokotsa and Keisuke Tanaka}, title = {Turn-Based Communication Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1126}, year = {2021}, url = {https://eprint.iacr.org/2021/1126}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BrunettaLLMT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JourenkoLT21, author = {Maxim Jourenko and Mario Larangeira and Keisuke Tanaka}, title = {Interhead Hydra Two Heads are Better than One}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1188}, year = {2021}, url = {https://eprint.iacr.org/2021/1188}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JourenkoLT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/alr/TanakaAU20, author = {Keisuke Tanaka and Ken Arai and Masafumi Uchida}, title = {Evaluation of task difficulty based on fluctuation characteristics in writing task}, journal = {Artif. Life Robotics}, volume = {25}, number = {1}, pages = {17--23}, year = {2020}, url = {https://doi.org/10.1007/s10015-019-00570-w}, doi = {10.1007/S10015-019-00570-W}, timestamp = {Tue, 17 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/alr/TanakaAU20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TezukaT20, author = {Masayuki Tezuka and Keisuke Tanaka}, editor = {Joseph K. Liu and Hui Cui}, title = {Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {225--243}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_12}, doi = {10.1007/978-3-030-55304-3\_12}, timestamp = {Wed, 17 Aug 2022 14:32:12 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TezukaT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YoshidaKXT20, author = {Yusuke Yoshida and Fuyuki Kitagawa and Keita Xagawa and Keisuke Tanaka}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {36--65}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_2}, doi = {10.1007/978-3-030-64834-3\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/YoshidaKXT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/JourenkoLT20, author = {Maxim Jourenko and Mario Larangeira and Keisuke Tanaka}, editor = {Stephan Krenn and Haya Schulmann and Serge Vaudenay}, title = {Lightweight Virtual Payment Channels}, booktitle = {Cryptology and Network Security - 19th International Conference, {CANS} 2020, Vienna, Austria, December 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12579}, pages = {365--384}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65411-5\_18}, doi = {10.1007/978-3-030-65411-5\_18}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/cans/JourenkoLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HiragaHTYT20, author = {Daiki Hiraga and Keisuke Hara and Masayuki Tezuka and Yusuke Yoshida and Keisuke Tanaka}, editor = {Deukjo Hong}, title = {Security Definitions on Time-Lock Puzzles}, booktitle = {Information Security and Cryptology - {ICISC} 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12593}, pages = {3--15}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68890-5\_1}, doi = {10.1007/978-3-030-68890-5\_1}, timestamp = {Thu, 11 Feb 2021 16:04:17 +0100}, biburl = {https://dblp.org/rec/conf/icisc/HiragaHTYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NaritaKYT20, author = {Tasuku Narita and Fuyuki Kitagawa and Yusuke Yoshida and Keisuke Tanaka}, editor = {Deukjo Hong}, title = {Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleability}, booktitle = {Information Security and Cryptology - {ICISC} 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12593}, pages = {16--39}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68890-5\_2}, doi = {10.1007/978-3-030-68890-5\_2}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/NaritaKYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/SudoTHYT20, author = {Kyohei Sudo and Masayuki Tezuka and Keisuke Hara and Yusuke Yoshida and Keisuke Tanaka}, editor = {Khoa Nguyen and Wenling Wu and Kwok{-}Yan Lam and Huaxiong Wang}, title = {Watermarkable Signature with Computational Function Preserving}, booktitle = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12505}, pages = {124--144}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62576-4\_7}, doi = {10.1007/978-3-030-62576-4\_7}, timestamp = {Sat, 17 Dec 2022 21:30:21 +0100}, biburl = {https://dblp.org/rec/conf/provsec/SudoTHYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LuHT20, author = {Yi Lu and Keisuke Hara and Keisuke Tanaka}, editor = {Khoa Nguyen and Wenling Wu and Kwok{-}Yan Lam and Huaxiong Wang}, title = {Receiver Selective Opening {CCA} Secure Public Key Encryption from Various Assumptions}, booktitle = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12505}, pages = {213--233}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62576-4\_11}, doi = {10.1007/978-3-030-62576-4\_11}, timestamp = {Mon, 23 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/provsec/LuHT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JourenkoLT20, author = {Maxim Jourenko and Mario Larangeira and Keisuke Tanaka}, title = {Lightweight Virtual Payment Channels}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {998}, year = {2020}, url = {https://eprint.iacr.org/2020/998}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JourenkoLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoshidaKXT20, author = {Yusuke Yoshida and Fuyuki Kitagawa and Keita Xagawa and Keisuke Tanaka}, title = {Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1210}, year = {2020}, url = {https://eprint.iacr.org/2020/1210}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YoshidaKXT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JourenkoLT20a, author = {Maxim Jourenko and Mario Larangeira and Keisuke Tanaka}, title = {Payment Trees: Low Collateral Payments for Payment Channel Networks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1313}, year = {2020}, url = {https://eprint.iacr.org/2020/1313}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/JourenkoLT20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/HaraKMHT19, author = {Keisuke Hara and Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {Simulation-based receiver selective opening {CCA} secure {PKE} from standard computational assumptions}, journal = {Theor. Comput. Sci.}, volume = {795}, pages = {570--597}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2019.08.016}, doi = {10.1016/J.TCS.2019.08.016}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/HaraKMHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Kitagawa0T19, author = {Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Simple and Efficient {KDM-CCA} Secure Public Key Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {97--127}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_4}, doi = {10.1007/978-3-030-34618-8\_4}, timestamp = {Fri, 22 Nov 2019 13:53:07 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Kitagawa0T19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YoshidaKT19, author = {Yusuke Yoshida and Fuyuki Kitagawa and Keisuke Tanaka}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the {DDH} Problem}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {128--158}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_5}, doi = {10.1007/978-3-030-34618-8\_5}, timestamp = {Fri, 22 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/YoshidaKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/EgashiraWT19, author = {Shohei Egashira and Yuyu Wang and Keisuke Tanaka}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Fine-Grained Cryptography Revisited}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, pages = {637--666}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8\_22}, doi = {10.1007/978-3-030-34618-8\_22}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/EgashiraWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/TezukaST19, author = {Masayuki Tezuka and Xiangyu Su and Keisuke Tanaka}, editor = {Yi Mu and Robert H. Deng and Xinyi Huang}, title = {A t-out-of-n Redactable Signature Scheme}, booktitle = {Cryptology and Network Security - 18th International Conference, {CANS} 2019, Fuzhou, China, October 25-27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11829}, pages = {470--489}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31578-8\_26}, doi = {10.1007/978-3-030-31578-8\_26}, timestamp = {Thu, 17 Mar 2022 14:41:28 +0100}, biburl = {https://dblp.org/rec/conf/cans/TezukaST19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Ishida0EHT19, author = {Ai Ishida and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Proper Usage of the Group Signature Scheme in {ISO/IEC} 20008-2}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {515--528}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329824}, doi = {10.1145/3321705.3329824}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Ishida0EHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kitagawa0T19, author = {Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {{CCA} Security and Trapdoor Functions via Key-Dependent-Message Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {33--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_2}, doi = {10.1007/978-3-030-26954-8\_2}, timestamp = {Fri, 09 Aug 2019 14:27:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kitagawa0T19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KitagawaNTY19, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka and Takashi Yamakawa}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {521--551}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_17}, doi = {10.1007/978-3-030-26954-8\_17}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KitagawaNTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshidaSEHT19, author = {Ai Ishida and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka}, title = {Proper Usage of the Group Signature Scheme in {ISO/IEC} 20008-2}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {284}, year = {2019}, url = {https://eprint.iacr.org/2019/284}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshidaSEHT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaMT19, author = {Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka}, title = {{CCA} Security and Trapdoor Functions via Key-Dependent-Message Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {291}, year = {2019}, url = {https://eprint.iacr.org/2019/291}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaMT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JourenkoKLT19, author = {Maxim Jourenko and Kanta Kurazumi and Mario Larangeira and Keisuke Tanaka}, title = {SoK: {A} Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2019}, url = {https://eprint.iacr.org/2019/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JourenkoKLT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaMT19a, author = {Fuyuki Kitagawa and Takahiro Matsuda and Keisuke Tanaka}, title = {Simple and Efficient {KDM-CCA} Secure Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2019}, url = {https://eprint.iacr.org/2019/1012}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaMT19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoshidaKT19, author = {Yusuke Yoshida and Fuyuki Kitagawa and Keisuke Tanaka}, title = {Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the {DDH} Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1151}, year = {2019}, url = {https://eprint.iacr.org/2019/1151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoshidaKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EgashiraWT19, author = {Shohei Egashira and Yuyu Wang and Keisuke Tanaka}, title = {Fine-Grained Cryptography Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1488}, year = {2019}, url = {https://eprint.iacr.org/2019/1488}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EgashiraWT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YamadaAEHT18, author = {Kotoko Yamada and Nuttapong Attrapadung and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka}, title = {Generic Constructions for Fully Secure Revocable Attribute-Based Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {9}, pages = {1456--1472}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.1456}, doi = {10.1587/TRANSFUN.E101.A.1456}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YamadaAEHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ThanhTDTN18, author = {Ta Minh Thanh and Keisuke Tanaka and Luu Hong Dung and Nguyen Tuan Tai and Hai Nguyen Nam}, title = {Performance analysis of robust watermarking using linear and nonlinear feature matching}, journal = {Multim. Tools Appl.}, volume = {77}, number = {2}, pages = {2901--2920}, year = {2018}, url = {https://doi.org/10.1007/s11042-017-4435-1}, doi = {10.1007/S11042-017-4435-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ThanhTDTN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KitagawaT18, author = {Fuyuki Kitagawa and Keisuke Tanaka}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {A Framework for Achieving {KDM-CCA} Secure Public-Key Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, pages = {127--157}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3\_5}, doi = {10.1007/978-3-030-03329-3\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KitagawaT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Wang0HT18, author = {Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Memory Lower Bounds of Reductions Revisited}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10820}, pages = {61--90}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78381-9\_3}, doi = {10.1007/978-3-319-78381-9\_3}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Wang0HT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KitagawaNT18, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Obfustopia Built on Secret-Key Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {603--648}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_20}, doi = {10.1007/978-3-319-78375-8\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KitagawaNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KitagawaT18, author = {Fuyuki Kitagawa and Keisuke Tanaka}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10769}, pages = {32--61}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76578-5\_2}, doi = {10.1007/978-3-319-76578-5\_2}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KitagawaT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KitagawaNT18, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Simple and Generic Constructions of Succinct Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {187--217}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_7}, doi = {10.1007/978-3-319-76581-5\_7}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KitagawaNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Ishida0EHT18, author = {Ai Ishida and Yusuke Sakai and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Dario Catalano and Roberto De Prisco}, title = {Fully Anonymous Group Signature with Verifier-Local Revocation}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {23--42}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_2}, doi = {10.1007/978-3-319-98113-0\_2}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/Ishida0EHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/HaraK0HT18, author = {Keisuke Hara and Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Dario Catalano and Roberto De Prisco}, title = {Simulation-Based Receiver Selective Opening {CCA} Secure {PKE} from Standard Computational Assumptions}, booktitle = {Security and Cryptography for Networks - 11th International Conference, {SCN} 2018, Amalfi, Italy, September 5-7, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11035}, pages = {140--159}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98113-0\_8}, doi = {10.1007/978-3-319-98113-0\_8}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/HaraK0HT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/TezukaYT18, author = {Masayuki Tezuka and Yusuke Yoshida and Keisuke Tanaka}, editor = {Jean{-}Louis Lanet and Cristian Toma}, title = {Weakened Random Oracle Models with Target Prefix}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 11th International Conference, SecITC 2018, Bucharest, Romania, November 8-9, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11359}, pages = {344--357}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12942-2\_26}, doi = {10.1007/978-3-030-12942-2\_26}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/secitc/TezukaYT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Wang0HT18, author = {Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {Memory Lower Bounds of Reductions Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2018}, url = {http://eprint.iacr.org/2018/155}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Wang0HT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangMHT18, author = {Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {Impossibility on Tamper-Resilient Cryptography with Uniqueness Properties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {564}, year = {2018}, url = {https://eprint.iacr.org/2018/564}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangMHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaT18, author = {Fuyuki Kitagawa and Keisuke Tanaka}, title = {A Framework for Achieving {KDM-CCA} Secure Public-Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {845}, year = {2018}, url = {https://eprint.iacr.org/2018/845}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNTY18, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka and Takashi Yamakawa}, title = {Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2018}, url = {https://eprint.iacr.org/2018/974}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HaraKMHT18, author = {Keisuke Hara and Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {Simulation-based Receiver Selective Opening {CCA} Secure {PKE} from Standard Computational Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1091}, year = {2018}, url = {https://eprint.iacr.org/2018/1091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HaraKMHT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/KawachiOTY17, author = {Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga}, title = {General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction}, journal = {Comput. J.}, volume = {60}, number = {5}, pages = {711--728}, year = {2017}, url = {https://doi.org/10.1093/comjnl/bxw094}, doi = {10.1093/COMJNL/BXW094}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/KawachiOTY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IshidaEH0T17, author = {Ai Ishida and Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Keisuke Tanaka}, title = {Group Signature with Deniability: How to Disavow a Signature}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1825--1837}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1825}, doi = {10.1587/TRANSFUN.E100.A.1825}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IshidaEH0T17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangT17, author = {Yuyu Wang and Keisuke Tanaka}, title = {Generic Transformation for Signatures in the Continual Leakage Model}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1857--1869}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1857}, doi = {10.1587/TRANSFUN.E100.A.1857}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ThanhT17, author = {Ta Minh Thanh and Keisuke Tanaka}, title = {An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information}, journal = {Multim. Tools Appl.}, volume = {76}, number = {11}, pages = {13455--13471}, year = {2017}, url = {https://doi.org/10.1007/s11042-016-3750-2}, doi = {10.1007/S11042-016-3750-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ThanhT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YamadaAEHT17, author = {Kotoko Yamada and Nuttapong Attrapadung and Keita Emura and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Simon N. Foley and Dieter Gollmann and Einar Snekkenes}, title = {Generic Constructions for Fully Secure Revocable Attribute-Based Encryption}, booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10493}, pages = {532--551}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66399-9\_29}, doi = {10.1007/978-3-319-66399-9\_29}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/YamadaAEHT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/PagninMT17, author = {Elena Pagnin and Aikaterini Mitrokotsa and Keisuke Tanaka}, editor = {Tanja Lange and Orr Dunkelman}, title = {Anonymous Single-Round Server-Aided Verification}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11368}, pages = {23--43}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-25283-0\_2}, doi = {10.1007/978-3-030-25283-0\_2}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/PagninMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/YoshidaMT17, author = {Yusuke Yoshida and Kirill Morozov and Keisuke Tanaka}, editor = {Tanja Lange and Tsuyoshi Takagi}, title = {{CCA2} Key-Privacy for Code-Based Encryption in the Standard Model}, booktitle = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10346}, pages = {35--50}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59879-6\_3}, doi = {10.1007/978-3-319-59879-6\_3}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/YoshidaMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/WangT17, author = {Yuyu Wang and Keisuke Tanaka}, editor = {Tsuyoshi Takagi and Masato Wakayama and Keisuke Tanaka and Noboru Kunihiro and Kazufumi Kimoto and Dung Hoang Duong}, title = {How to Strengthen the Security of Signature Schemes in the Leakage Models: {A} Survey}, booktitle = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math Project}, series = {Mathematics for Industry}, pages = {315--330}, publisher = {Springer Singapore}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5065-7\_17}, doi = {10.1007/978-981-10-5065-7\_17}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/WangT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/YasudaKT17, author = {Satoshi Yasuda and Fuyuki Kitagawa and Keisuke Tanaka}, editor = {Tsuyoshi Takagi and Masato Wakayama and Keisuke Tanaka and Noboru Kunihiro and Kazufumi Kimoto and Dung Hoang Duong}, title = {Constructions for the {IND-CCA1} Secure Fully Homomorphic Encryption}, booktitle = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math Project}, series = {Mathematics for Industry}, pages = {331--347}, publisher = {Springer Singapore}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5065-7\_18}, doi = {10.1007/978-981-10-5065-7\_18}, timestamp = {Tue, 18 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/YasudaKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/17/TWTK2017, editor = {Tsuyoshi Takagi and Masato Wakayama and Keisuke Tanaka and Noboru Kunihiro and Kazufumi Kimoto and Dung Hoang Duong}, title = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math Project}, series = {Mathematics for Industry}, publisher = {Springer Singapore}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5065-7}, doi = {10.1007/978-981-10-5065-7}, isbn = {978-981-10-5064-0}, timestamp = {Tue, 18 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/TWTK2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT17, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2017}, url = {http://eprint.iacr.org/2017/275}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT17a, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2017}, url = {http://eprint.iacr.org/2017/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT17b, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {638}, year = {2017}, url = {http://eprint.iacr.org/2017/638}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PagninMT17, author = {Elena Pagnin and Aikaterini Mitrokotsa and Keisuke Tanaka}, title = {Anonymous Single-Round Server-Aided Verification}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2017}, url = {http://eprint.iacr.org/2017/794}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PagninMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaT17, author = {Fuyuki Kitagawa and Keisuke Tanaka}, title = {Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {987}, year = {2017}, url = {http://eprint.iacr.org/2017/987}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Tanaka16, author = {Keisuke Tanaka}, title = {Foreword}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {99-D}, number = {3}, pages = {558}, year = {2016}, url = {https://doi.org/10.1587/transinf.2015FCF0001}, doi = {10.1587/TRANSINF.2015FCF0001}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Tanaka16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Tanaka16a, author = {Keisuke Tanaka}, title = {Foreword}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {99-A}, number = {6}, pages = {1011}, year = {2016}, url = {https://doi.org/10.1587/transfun.E99.A.1011}, doi = {10.1587/TRANSFUN.E99.A.1011}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Tanaka16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/WangT16, author = {Yuyu Wang and Keisuke Tanaka}, title = {Strongly simulation-extractable leakage-resilient {NIZK}}, journal = {Int. J. Inf. Sec.}, volume = {15}, number = {1}, pages = {67--79}, year = {2016}, url = {https://doi.org/10.1007/s10207-015-0291-z}, doi = {10.1007/S10207-015-0291-Z}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/WangT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mta/ThanhT16, author = {Ta Minh Thanh and Keisuke Tanaka}, title = {The novel and robust watermarking method based on q-logarithm frequency domain}, journal = {Multim. Tools Appl.}, volume = {75}, number = {18}, pages = {11097--11125}, year = {2016}, url = {https://doi.org/10.1007/s11042-015-2836-6}, doi = {10.1007/S11042-015-2836-6}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mta/ThanhT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangT16, author = {Yuyu Wang and Keisuke Tanaka}, title = {Generic transformations for existentially unforgeable signature schemes in the bounded leakage model}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1829--1842}, year = {2016}, url = {https://doi.org/10.1002/sec.1436}, doi = {10.1002/SEC.1436}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/WangZ0HT16, author = {Yuyu Wang and Zongyang Zhang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {465--495}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_16}, doi = {10.1007/978-3-662-53890-6\_16}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/WangZ0HT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/IshidaEHST16, author = {Ai Ishida and Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Keisuke Tanaka}, editor = {Sara Foresti and Giuseppe Persiano}, title = {Group Signature with Deniability: How to Disavow a Signature}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {228--244}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_14}, doi = {10.1007/978-3-319-48965-0\_14}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/IshidaEHST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KawachiTT16, author = {Akinori Kawachi and Hirotoshi Takebe and Keisuke Tanaka}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {195--211}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_12}, doi = {10.1007/978-3-319-44524-3\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KawachiTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kitagawa0HT16, author = {Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9614}, pages = {99--129}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49384-7\_5}, doi = {10.1007/978-3-662-49384-7\_5}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Kitagawa0HT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Wang0HT16, author = {Yuyu Wang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Vassilis Zikas and Roberto De Prisco}, title = {Signatures Resilient to Uninvertible Leakage}, booktitle = {Security and Cryptography for Networks - 10th International Conference, {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9841}, pages = {372--390}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44618-9\_20}, doi = {10.1007/978-3-319-44618-9\_20}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/Wang0HT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kitagawa0HT16, author = {Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2016}, url = {http://eprint.iacr.org/2016/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kitagawa0HT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WangZ0HT16, author = {Yuyu Wang and Zongyang Zhang and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, title = {How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {877}, year = {2016}, url = {http://eprint.iacr.org/2016/877}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WangZ0HT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HigoTYY16, author = {Haruna Higo and Keisuke Tanaka and Akihiro Yamada and Kenji Yasunaga}, title = {Game-Theoretic Security for Two-Party Protocols}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1072}, year = {2016}, url = {http://eprint.iacr.org/2016/1072}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HigoTYY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FujisakiKNTY15, author = {Eiichiro Fujisaki and Akinori Kawachi and Ryo Nishimaki and Keisuke Tanaka and Kenji Yasunaga}, title = {Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {3}, pages = {853--862}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.853}, doi = {10.1587/TRANSFUN.E98.A.853}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FujisakiKNTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IshidaEHST15, author = {Ai Ishida and Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Keisuke Tanaka}, title = {Disavowable Public Key Encryption with Non-Interactive Opening}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {12}, pages = {2446--2455}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.2446}, doi = {10.1587/TRANSFUN.E98.A.2446}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IshidaEHST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangT15, author = {Yuyu Wang and Keisuke Tanaka}, editor = {Ernest Foo and Douglas Stebila}, title = {Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {213--229}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_13}, doi = {10.1007/978-3-319-19962-7\_13}, timestamp = {Tue, 07 May 2024 20:09:57 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/IshidaEHST15, author = {Ai Ishida and Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Keisuke Tanaka}, editor = {Feng Bao and Steven Miller and Jianying Zhou and Gail{-}Joon Ahn}, title = {Disavowable Public Key Encryption with Non-interactive Opening}, booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17, 2015}, pages = {667}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2714576.2714642}, doi = {10.1145/2714576.2714642}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/IshidaEHST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Kitagawa0HT15, author = {Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Kaisa Nyberg}, title = {Completeness of Single-Bit Projection-KDM Security for Public Key Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {201--219}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_11}, doi = {10.1007/978-3-319-16715-2\_11}, timestamp = {Thu, 14 Oct 2021 10:27:48 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Kitagawa0HT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kse/ThanhT15, author = {Ta Minh Thanh and Keisuke Tanaka}, editor = {Bernard M{\'{e}}rialdo and Minh Le Nguyen and Duy{-}Dinh Le and Duc Anh Duong and Satoshi Tojo}, title = {Comparison of Watermarking Schemes Using Linear and Nonlinear Feature Matching}, booktitle = {2015 Seventh International Conference on Knowledge and Systems Engineering, {KSE} 2015, Ho Chi Minh City, Vietnam, October 8-10, 2015}, pages = {262--267}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/KSE.2015.67}, doi = {10.1109/KSE.2015.67}, timestamp = {Tue, 18 Oct 2022 10:42:25 +0200}, biburl = {https://dblp.org/rec/conf/kse/ThanhT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/visapp/ThanhT15, author = {Ta Minh Thanh and Keisuke Tanaka}, editor = {Jos{\'{e}} Braz and Sebastiano Battiato and Francisco H. Imai}, title = {Blind Watermarking using {QIM} and the Quantized {SVD} Domain based on the \emph{q-}Logarithm Function}, booktitle = {{VISAPP} 2015 - Proceedings of the 10th International Conference on Computer Vision Theory and Applications, Volume 3, Berlin, Germany, 11-14 March, 2015}, pages = {14--25}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005291900140025}, doi = {10.5220/0005291900140025}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/visapp/ThanhT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2015, editor = {Keisuke Tanaka and Yuji Suga}, title = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1}, doi = {10.1007/978-3-319-22425-1}, isbn = {978-3-319-22424-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshidaEHST15, author = {Ai Ishida and Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Keisuke Tanaka}, title = {Group Signature with Deniability: How to Disavow a Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {43}, year = {2015}, url = {http://eprint.iacr.org/2015/043}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshidaEHST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NamikiTY14, author = {Hitoshi Namiki and Keisuke Tanaka and Kenji Yasunaga}, title = {Randomness Leakage in the {KEM/DEM} Framework}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {1}, pages = {191--199}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.191}, doi = {10.1587/TRANSFUN.E97.A.191}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NamikiTY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangT14, author = {Yuyu Wang and Keisuke Tanaka}, editor = {Willy Susilo and Yi Mu}, title = {Strongly Simulation-Extractable Leakage-Resilient {NIZK}}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {66--81}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_5}, doi = {10.1007/978-3-319-08344-5\_5}, timestamp = {Thu, 14 Oct 2021 10:41:30 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Kitagawa0HT14, author = {Fuyuki Kitagawa and Takahiro Matsuda and Goichiro Hanaoka and Keisuke Tanaka}, editor = {Jooyoung Lee and Jongsung Kim}, title = {Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8949}, pages = {84--100}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15943-0\_6}, doi = {10.1007/978-3-319-15943-0\_6}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Kitagawa0HT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pimrc/ThanhT14, author = {Ta Minh Thanh and Keisuke Tanaka}, title = {A proposal of novel q-DWT for blind and robust image watermarking}, booktitle = {25th {IEEE} Annual International Symposium on Personal, Indoor, and Mobile Radio Communication, {PIMRC} 2014, Washington DC, USA, September 2-5, 2014}, pages = {2061--2065}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/PIMRC.2014.7136511}, doi = {10.1109/PIMRC.2014.7136511}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/pimrc/ThanhT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/WangT14, author = {Yuyu Wang and Keisuke Tanaka}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {117--129}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_9}, doi = {10.1007/978-3-319-12475-9\_9}, timestamp = {Mon, 21 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/WangT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NguyenYT13, author = {Manh Ha Nguyen and Kenji Yasunaga and Keisuke Tanaka}, title = {Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {6}, pages = {1100--1111}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.1100}, doi = {10.1587/TRANSFUN.E96.A.1100}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NguyenYT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/AkutsuFHTT13, author = {Tatsuya Akutsu and Daiji Fukagawa and Magn{\'{u}}s M. Halld{\'{o}}rsson and Atsuhiro Takasu and Keisuke Tanaka}, title = {Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees}, journal = {Theor. Comput. Sci.}, volume = {470}, pages = {10--22}, year = {2013}, url = {https://doi.org/10.1016/j.tcs.2012.11.017}, doi = {10.1016/J.TCS.2012.11.017}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/AkutsuFHTT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/IsshikiNT13, author = {Toshiyuki Isshiki and Manh Ha Nguyen and Keisuke Tanaka}, editor = {Ed Dawson}, title = {Proxy Re-Encryption in a Stronger Security Model Extended from {CT-RSA2012}}, booktitle = {Topics in Cryptology - {CT-RSA} 2013 - The Cryptographers' Track at the {RSA} Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7779}, pages = {277--292}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36095-4\_18}, doi = {10.1007/978-3-642-36095-4\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/IsshikiNT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isscc/KoyamaOTK13, author = {Shinzo Koyama and Kazutoshi Onozawa and Keisuke Tanaka and Yoshihisa Kato}, title = {A 3D vision 2.1Mpixel image sensor for single-lens camera systems}, booktitle = {2013 {IEEE} International Solid-State Circuits Conference - Digest of Technical Papers, {ISSCC} 2013, San Francisco, CA, USA, February 17-21, 2013}, pages = {492--493}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ISSCC.2013.6487829}, doi = {10.1109/ISSCC.2013.6487829}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/isscc/KoyamaOTK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IsshikiNT13, author = {Toshiyuki Isshiki and Manh Ha Nguyen and Keisuke Tanaka}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Attacks to the Proxy Re-Encryption Schemes from {IWSEC2011}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {290--302}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_19}, doi = {10.1007/978-3-642-41383-4\_19}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IsshikiNT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HigoTY13, author = {Haruna Higo and Keisuke Tanaka and Kenji Yasunaga}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Game-Theoretic Security for Bit Commitment}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {303--318}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_20}, doi = {10.1007/978-3-642-41383-4\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HigoTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/IsshikiNT13, author = {Toshiyuki Isshiki and Manh Ha Nguyen and Keisuke Tanaka}, editor = {Willy Susilo and Reza Reyhanitabar}, title = {Factoring-Based Proxy Re-Encryption Schemes}, booktitle = {Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8209}, pages = {309--329}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41227-1\_18}, doi = {10.1007/978-3-642-41227-1\_18}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/IsshikiNT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tamc/TakebeT13, author = {Hirotoshi Takebe and Keisuke Tanaka}, editor = {T.{-}H. Hubert Chan and Lap Chi Lau and Luca Trevisan}, title = {Grey-Box Public-Key Steganography}, booktitle = {Theory and Applications of Models of Computation, 10th International Conference, {TAMC} 2013, Hong Kong, China, May 20-22, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7876}, pages = {294--305}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38236-9\_27}, doi = {10.1007/978-3-642-38236-9\_27}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/tamc/TakebeT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawachiOTY13, author = {Akinori Kawachi and Yoshio Okamoto and Keisuke Tanaka and Kenji Yasunaga}, title = {General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {874}, year = {2013}, url = {http://eprint.iacr.org/2013/874}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawachiOTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishimakiFT12, author = {Ryo Nishimaki and Eiichiro Fujisaki and Keisuke Tanaka}, title = {An Efficient Non-interactive Universally Composable String-Commitment Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {167--175}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.167}, doi = {10.1587/TRANSFUN.E95.A.167}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishimakiFT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishimakiFT12a, author = {Ryo Nishimaki and Eiichiro Fujisaki and Keisuke Tanaka}, title = {A Multi-Trapdoor Commitment Scheme from the {RSA} Assumption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {176--184}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.176}, doi = {10.1587/TRANSFUN.E95.A.176}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishimakiFT12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HigoTYY12, author = {Haruna Higo and Keisuke Tanaka and Akihiro Yamada and Kenji Yasunaga}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {A Game-Theoretic Perspective on Oblivious Transfer}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {29--42}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_3}, doi = {10.1007/978-3-642-31448-3\_3}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HigoTYY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NguyenTY12, author = {Manh Ha Nguyen and Keisuke Tanaka and Kenji Yasunaga}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {208--222}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_16}, doi = {10.1007/978-3-642-31448-3\_16}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NguyenTY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KawachiTT12, author = {Akinori Kawachi and Hirotoshi Takebe and Keisuke Tanaka}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {123--137}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_8}, doi = {10.1007/978-3-642-34117-5\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KawachiTT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LarangeiraT12, author = {Mario Larangeira and Keisuke Tanaka}, editor = {Dong Hoon Lee and Moti Yung}, title = {Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {124--143}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_10}, doi = {10.1007/978-3-642-35416-8\_10}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LarangeiraT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/PortmannT11, author = {Christopher Portmann and Keisuke Tanaka}, title = {Information-Theoretic Secrecy with Access to Decryption Oracles}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {7}, pages = {1585--1590}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1585}, doi = {10.1587/TRANSFUN.E94.A.1585}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/PortmannT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LarangeiraT11, author = {Mario Larangeira and Keisuke Tanaka}, title = {Programmability in the Generic Ring and Group Models}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {2/3}, pages = {57--73}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.08.31.057}, doi = {10.22667/JISIS.2011.08.31.057}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/LarangeiraT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KawachiPT11, author = {Akinori Kawachi and Christopher Portmann and Keisuke Tanaka}, editor = {Serge Fehr}, title = {Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {6--24}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_2}, doi = {10.1007/978-3-642-20728-0\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/KawachiPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TanakaYY11, author = {Keisuke Tanaka and Akihiro Yamada and Kenji Yasunaga}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Weak Oblivious Transfer from Strong One-Way Functions}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {34--51}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_5}, doi = {10.1007/978-3-642-24316-5\_5}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/TanakaYY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NamikiTY11, author = {Hitoshi Namiki and Keisuke Tanaka and Kenji Yasunaga}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Randomness Leakage in the {KEM/DEM} Framework}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {309--323}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_22}, doi = {10.1007/978-3-642-24316-5\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NamikiTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawachiPT11, author = {Akinori Kawachi and Christopher Portmann and Keisuke Tanaka}, title = {Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2011}, url = {http://eprint.iacr.org/2011/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawachiPT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IsshikiWT10, author = {Toshiyuki Isshiki and Koichiro Wada and Keisuke Tanaka}, title = {A Rational Secret-Sharing Scheme Based on {RSA-OAEP}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {1}, pages = {42--49}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.42}, doi = {10.1587/TRANSFUN.E93.A.42}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IsshikiWT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HiranoT10, author = {Takato Hirano and Keisuke Tanaka}, title = {Key Generation for Fast Inversion of the Paillier Encryption Function}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {6}, pages = {1111--1121}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1111}, doi = {10.1587/TRANSFUN.E93.A.1111}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HiranoT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NishimakiFT10, author = {Ryo Nishimaki and Eiichiro Fujisaki and Keisuke Tanaka}, editor = {Ron Steinfeld and Philip Hawkes}, title = {A Multi-trapdoor Commitment Scheme from the {RSA} Assumption}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {182--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_12}, doi = {10.1007/978-3-642-14081-5\_12}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NishimakiFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MatsudaNT10, author = {Toshihide Matsuda and Ryo Nishimaki and Keisuke Tanaka}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {{CCA} Proxy Re-Encryption without Bilinear Maps in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {261--278}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_16}, doi = {10.1007/978-3-642-13013-7\_16}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MatsudaNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KawachiNTX10, author = {Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Security of Encryption Schemes in Weakened Random Oracle Models}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {403--419}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_24}, doi = {10.1007/978-3-642-13013-7\_24}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KawachiNTX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawachiNTX10, author = {Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa}, title = {Security of Encryption Schemes in Weakened Random Oracle Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2010}, url = {http://eprint.iacr.org/2010/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawachiNTX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/InoueT09, author = {Daisuke Inoue and Keisuke Tanaka}, title = {Symmetricity of the Protocols Related to Oblivious Transfer}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {217--221}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.217}, doi = {10.1587/TRANSFUN.E92.A.217}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/InoueT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HiranoWT09, author = {Takato Hirano and Koichiro Wada and Keisuke Tanaka}, title = {Primitive Power Roots of Unity and Its Application to Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {8}, pages = {1836--1844}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1836}, doi = {10.1587/TRANSFUN.E92.A.1836}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HiranoWT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NumayamaT09, author = {Akira Numayama and Keisuke Tanaka}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {On the Weak Ideal Compression Functions}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {232--248}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_16}, doi = {10.1007/978-3-642-02620-1\_16}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NumayamaT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HiwatariTAS09, author = {Harunaga Hiwatari and Keisuke Tanaka and Tomoyuki Asano and Koichi Sakumoto}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Multi-recipient Public-Key Encryption from Simulators in Security Proofs}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {293--308}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_21}, doi = {10.1007/978-3-642-02620-1\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HiwatariTAS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MatsudaNNT09, author = {Toshihide Matsuda and Ryo Nishimaki and Akira Numayama and Keisuke Tanaka}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Security on Hybrid Encryption with the Tag-KEM/DEM Framework}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {343--359}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_24}, doi = {10.1007/978-3-642-02620-1\_24}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MatsudaNNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/StehleSTX09, author = {Damien Stehl{\'{e}} and Ron Steinfeld and Keisuke Tanaka and Keita Xagawa}, editor = {Mitsuru Matsui}, title = {Efficient Public Key Encryption Based on Ideal Lattices}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {617--635}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_36}, doi = {10.1007/978-3-642-10366-7\_36}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/StehleSTX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NishimakiFT09, author = {Ryo Nishimaki and Eiichiro Fujisaki and Keisuke Tanaka}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Efficient Non-interactive Universally Composable String-Commitment Schemes}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {3--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_3}, doi = {10.1007/978-3-642-04642-1\_3}, timestamp = {Sun, 02 Jun 2019 21:26:38 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NishimakiFT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/FujisakiNT09, author = {Eiichiro Fujisaki and Ryo Nishimaki and Keisuke Tanaka}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {118--128}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_11}, doi = {10.1007/978-3-642-04642-1\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/FujisakiNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/XagawaT09, author = {Keita Xagawa and Keisuke Tanaka}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Zero-Knowledge Protocols for {NTRU:} Application to Identification and Proof of Plaintext Knowledge}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {198--213}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_17}, doi = {10.1007/978-3-642-04642-1\_17}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/XagawaT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StehleSTX09, author = {Damien Stehl{\'{e}} and Ron Steinfeld and Keisuke Tanaka and Keita Xagawa}, title = {Efficient Public Key Encryption Based on Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2009}, url = {http://eprint.iacr.org/2009/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StehleSTX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/InoueT08, author = {Daisuke Inoue and Keisuke Tanaka}, title = {Conditional Converge Cast}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {6}, pages = {1537--1540}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.6.1537}, doi = {10.1093/IETFEC/E91-A.6.1537}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/InoueT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HiranoWT08, author = {Takato Hirano and Koichiro Wada and Keisuke Tanaka}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Public-Key Cryptosystems with Primitive Power Roots of Unity}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {98--112}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_8}, doi = {10.1007/978-3-540-70500-0\_8}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HiranoWT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KawachiTX08, author = {Akinori Kawachi and Keisuke Tanaka and Keita Xagawa}, editor = {Josef Pieprzyk}, title = {Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {372--389}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_23}, doi = {10.1007/978-3-540-89255-7\_23}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KawachiTX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NumayamaIT08, author = {Akira Numayama and Toshiyuki Isshiki and Keisuke Tanaka}, editor = {Ronald Cramer}, title = {Security of Digital Signature Schemes in Weakened Random Oracle Models}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {268--287}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_16}, doi = {10.1007/978-3-540-78440-1\_16}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NumayamaIT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HayashiT07, author = {Ryotaro Hayashi and Keisuke Tanaka}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Anonymity on Paillier's Trap-Door Permutation}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {200--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_16}, doi = {10.1007/978-3-540-73458-1\_16}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HayashiT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KawachiTX07, author = {Akinori Kawachi and Keisuke Tanaka and Keita Xagawa}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Multi-bit Cryptosystems Based on Lattice Problems}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {315--329}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_21}, doi = {10.1007/978-3-540-71677-8\_21}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KawachiTX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vr/KitamuraNTJ07, author = {Yoshifumi Kitamura and Takashi Nakashima and Keisuke Tanaka and Takeshi Johkoh}, editor = {William R. Sherman and Ming C. Lin and Anthony Steed}, title = {The IllusionHole for Medical Applications}, booktitle = {{IEEE} Virtual Reality Conference, {VR} 2007, 10-14 March 2007, Charlotte, NC, USA, Proceedings}, pages = {231--234}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/VR.2007.352488}, doi = {10.1109/VR.2007.352488}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vr/KitamuraNTJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HayashiT06, author = {Ryotaro Hayashi and Keisuke Tanaka}, title = {Schemes for Encryption with Anonymity and Ring Signature}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {66--73}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.66}, doi = {10.1093/IETFEC/E89-A.1.66}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HayashiT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HiwatariT06, author = {Harunaga Hiwatari and Keisuke Tanaka}, title = {A Cramer-Shoup Variant Related to the Quadratic Residuosity Problem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {203--205}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.203}, doi = {10.1093/IETFEC/E89-A.1.203}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HiwatariT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HayashiT06, author = {Ryotaro Hayashi and Keisuke Tanaka}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {{PA} in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {271--282}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_23}, doi = {10.1007/11780656\_23}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HayashiT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YamashitaT06, author = {Naoyuki Yamashita and Keisuke Tanaka}, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Secret Handshake with Multiple Groups}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, pages = {339--348}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_26}, doi = {10.1007/978-3-540-71093-6\_26}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YamashitaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OnoderaT05, author = {Takao Onodera and Keisuke Tanaka}, title = {Shufle for Paillier's Encryption Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {5}, pages = {1241--1248}, year = {2005}, url = {https://doi.org/10.1093/ietfec/e88-a.5.1241}, doi = {10.1093/IETFEC/E88-A.5.1241}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OnoderaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IsshikiT05, author = {Toshiyuki Isshiki and Keisuke Tanaka}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {An (n-t)-out-of-n Threshold Ring Signature Scheme}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {406--416}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_34}, doi = {10.1007/11506157\_34}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IsshikiT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HayashiT05, author = {Ryotaro Hayashi and Keisuke Tanaka}, editor = {Bimal K. Roy}, title = {Universally Anonymizable Public-Key Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3788}, pages = {293--312}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11593447\_16}, doi = {10.1007/11593447\_16}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HayashiT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icita/HadaT05, author = {Hiroki Hada and Keisuke Tanaka}, title = {Security for Authenticated Key Exchange Based on Non-Malleability}, booktitle = {Third International Conference on Information Technology and Applications {(ICITA} 2005), 4-7 July 2005, Sydney, Australia}, pages = {508--513}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICITA.2005.249}, doi = {10.1109/ICITA.2005.249}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icita/HadaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icita/MiharaT05, author = {Akihiro Mihara and Keisuke Tanaka}, title = {Universal Designated-Verifier Signature with Aggregation}, booktitle = {Third International Conference on Information Technology and Applications {(ICITA} 2005), 4-7 July 2005, Sydney, Australia}, pages = {514--519}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://doi.org/10.1109/ICITA.2005.293}, doi = {10.1109/ICITA.2005.293}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icita/MiharaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HayashiT05, author = {Ryotaro Hayashi and Keisuke Tanaka}, editor = {Serge Vaudenay}, title = {The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {216--233}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_15}, doi = {10.1007/978-3-540-30580-4\_15}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HayashiT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/SungT04, author = {Shao Chin Sung and Keisuke Tanaka}, title = {Limiting negations in bounded-depth circuits: An extension of Markov's theorem}, journal = {Inf. Process. Lett.}, volume = {90}, number = {1}, pages = {15--20}, year = {2004}, url = {https://doi.org/10.1016/j.ipl.2004.01.003}, doi = {10.1016/J.IPL.2004.01.003}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/SungT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HayashiOT04, author = {Ryotaro Hayashi and Tatsuaki Okamoto and Keisuke Tanaka}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {An {RSA} Family of Trap-Door Permutations with a Common Domain and Its Applications}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {291--304}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_21}, doi = {10.1007/978-3-540-24632-9\_21}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HayashiOT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/Tanaka03, author = {Keisuke Tanaka}, title = {Quantum Bit-commitment for Small Storage Based on Quantum One-way Permutations}, journal = {New Gener. Comput.}, volume = {21}, number = {4}, pages = {339--345}, year = {2003}, url = {https://doi.org/10.1007/BF03037308}, doi = {10.1007/BF03037308}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/Tanaka03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gameon/ThawonmasHT03, author = {Ruck Thawonmas and Hiroki Hassaku and Keisuke Tanaka}, editor = {Quasim H. Mehdi and Norman E. Gough and St{\'{e}}phane Natkin}, title = {Mimicry: Another Approach for Interactive Comedy}, booktitle = {4th International Conference on Intelligent Games and Simulation {(GAME-ON} 2003), 19-21 November 2003, London, {UK}}, pages = {47}, publisher = {{EUROSIS}}, year = {2003}, timestamp = {Sun, 04 Nov 2012 15:01:41 +0100}, biburl = {https://dblp.org/rec/conf/gameon/ThawonmasHT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/SungT03, author = {Shao Chin Sung and Keisuke Tanaka}, editor = {Toshihide Ibaraki and Naoki Katoh and Hirotaka Ono}, title = {Limiting Negations in Bounded-Depth Circuits: An Extension of Markov's Theorem}, booktitle = {Algorithms and Computation, 14th International Symposium, {ISAAC} 2003, Kyoto, Japan, December 15-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2906}, pages = {108--116}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24587-2\_13}, doi = {10.1007/978-3-540-24587-2\_13}, timestamp = {Fri, 29 Dec 2023 12:40:31 +0100}, biburl = {https://dblp.org/rec/conf/isaac/SungT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/prima/ThawonmasTH03, author = {Ruck Thawonmas and Keisuke Tanaka and Hiroki Hassaku}, editor = {Jaeho Lee and Mike Barley}, title = {Extended Hierarchical Task Network Planning for Interactive Comedy}, booktitle = {Intelligent Agents and Multi-Agent Systems, 6th Pacific Rim International Workshop on Multi-Agents, {PRIMA} 2003, Seoul, Korea, November 7-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2891}, pages = {205--213}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39896-7\_18}, doi = {10.1007/978-3-540-39896-7\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/prima/ThawonmasTH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/SungT02, author = {Shao Chin Sung and Keisuke Tanaka}, title = {An exponential gap with the removal of one negation gate}, journal = {Inf. Process. Lett.}, volume = {82}, number = {3}, pages = {155--157}, year = {2002}, url = {https://doi.org/10.1016/S0020-0190(01)00264-2}, doi = {10.1016/S0020-0190(01)00264-2}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/SungT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoTU00, author = {Tatsuaki Okamoto and Keisuke Tanaka and Shigenori Uchiyama}, editor = {Mihir Bellare}, title = {Quantum Public-Key Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1880}, pages = {147--165}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44598-6\_9}, doi = {10.1007/3-540-44598-6\_9}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoTU00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/anor/TanakaV99, author = {Keisuke Tanaka and Milan Vlach}, title = {Minimizing maximum absolute lateness and range of lateness under generalizeddue dates on a single machine}, journal = {Ann. Oper. Res.}, volume = {86}, pages = {507--526}, year = {1999}, url = {https://doi.org/10.1023/A\%3A1018987625819}, doi = {10.1023/A\%3A1018987625819}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/anor/TanakaV99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/BealsNT98, author = {Robert Beals and Tetsuro Nishino and Keisuke Tanaka}, title = {On the Complexity of Negation-Limited Boolean Networks}, journal = {{SIAM} J. Comput.}, volume = {27}, number = {5}, pages = {1334--1347}, year = {1998}, url = {https://doi.org/10.1137/S0097539794275136}, doi = {10.1137/S0097539794275136}, timestamp = {Thu, 08 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/BealsNT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/TanakaNB96, author = {Keisuke Tanaka and Tetsuro Nishino and Robert Beals}, title = {Negation-Limited Circuit Complexity of Symmetric Functions}, journal = {Inf. Process. Lett.}, volume = {59}, number = {5}, pages = {273--279}, year = {1996}, url = {https://doi.org/10.1016/0020-0190(96)00115-9}, doi = {10.1016/0020-0190(96)00115-9}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/TanakaNB96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/HalldorssonT96, author = {Magn{\'{u}}s M. Halld{\'{o}}rsson and Keisuke Tanaka}, editor = {Tetsuo Asano and Yoshihide Igarashi and Hiroshi Nagamochi and Satoru Miyano and Subhash Suri}, title = {Approximation and Special Cases of Common Subtrees and Editing Distance}, booktitle = {Algorithms and Computation, 7th International Symposium, {ISAAC} '96, Osaka, Japan, December 16-18, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1178}, pages = {75--84}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0009483}, doi = {10.1007/BFB0009483}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/HalldorssonT96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishinoT95, author = {Tetsuro Nishino and Keisuke Tanaka}, title = {On the Negation-Limited Circuit Complexity of Clique Functions}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {78-D}, number = {1}, pages = {86--89}, year = {1995}, url = {http://search.ieice.org/bin/summary.php?id=e78-d\_1\_86}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishinoT95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BealsNT95, author = {Robert Beals and Tetsuro Nishino and Keisuke Tanaka}, editor = {Frank Thomson Leighton and Allan Borodin}, title = {More on the complexity of negation-limited circuits}, booktitle = {Proceedings of the Twenty-Seventh Annual {ACM} Symposium on Theory of Computing, 29 May-1 June 1995, Las Vegas, Nevada, {USA}}, pages = {585--595}, publisher = {{ACM}}, year = {1995}, url = {https://doi.org/10.1145/225058.225276}, doi = {10.1145/225058.225276}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/BealsNT95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/TanakaN94, author = {Keisuke Tanaka and Tetsuro Nishino}, editor = {Frank Thomson Leighton and Michael T. Goodrich}, title = {On the complexity of negation-limited Boolean networks}, booktitle = {Proceedings of the Twenty-Sixth Annual {ACM} Symposium on Theory of Computing, 23-25 May 1994, Montr{\'{e}}al, Qu{\'{e}}bec, Canada}, pages = {38--47}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/195058.195099}, doi = {10.1145/195058.195099}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/TanakaN94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.