| Publication | Date of Publication | Type |
|---|
Experiment artifacts for ASIACCS 2025 submission #175 | 2025-01-10 | Dataset |
Conflict optimization for binary CSP applied to minimum partition into plane subgraphs and graph coloring ACM Journal of Experimental Algorithmics | 2024-07-26 | Paper |
Practical construction for secure trick-taking games even with cards set aside | 2024-07-17 | Paper |
Beedroids: how luminous autonomous swarms of UAVs can save the world? | 2024-05-16 | Paper |
Local search with weighting schemes for the CG:SHOP 2022 competition (CG challenge) | 2024-05-14 | Paper |
Secure Multiparty Matrix Multiplication Based on Strassen-Winograd Algorithm | 2024-03-14 | Paper |
Perpetual torus exploration by myopic luminous robots Theoretical Computer Science | 2023-10-17 | Paper |
Optimal exclusive perpetual grid exploration by luminous myopic opaque robots with common chirality Theoretical Computer Science | 2023-10-17 | Paper |
Physical ZKP protocols for Nurimisaki and Kurodoko Theoretical Computer Science | 2023-09-07 | Paper |
Protego: efficient, revocable and auditable anonymous credentials with applications to hyperledger fabric Lecture Notes in Computer Science | 2023-08-14 | Paper |
Hide a liar: card-based ZKP protocol for Usowan Lecture Notes in Computer Science | 2023-08-04 | Paper |
Physical zero-knowledge proof for Makaro Lecture Notes in Computer Science | 2023-08-02 | Paper |
Unlinkable and strongly accountable sanitizable signatures from verifiable ring signatures Cryptology and Network Security | 2023-08-02 | Paper |
Shadoks Approach to Low-Makespan Coordinated Motion Planning ACM Journal of Experimental Algorithmics | 2023-06-26 | Paper |
Perpetual torus exploration by myopic luminous robots Lecture Notes in Computer Science | 2023-06-12 | Paper |
Card-based ZKP protocol for Nurimisaki Lecture Notes in Computer Science | 2023-06-12 | Paper |
Physical Zero-Knowledge Proof for Suguru Puzzle | 2023-03-21 | Paper |
Secure cumulative reward maximization in linear stochastic bandits | 2023-03-21 | Paper |
Card-based ZKP protocols for Takuzu and Juosan | 2023-02-07 | Paper |
Finding water on Poleless using melomaniac myopic chameleon robots | 2023-02-07 | Paper |
A physical ZKP for Slitherlink: how to perform physical topology-preserving computation | 2022-08-30 | Paper |
Secure best arm identification in multi-armed bandits | 2022-08-30 | Paper |
Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes Public-Key Cryptography – PKC 2022 | 2022-07-08 | Paper |
Generic plaintext equality and inequality proofs | 2022-06-17 | Paper |
Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle Information and Computation | 2022-06-08 | Paper |
SAMBA: A Generic Framework for Secure Federated Multi-Armed Bandits Journal of Artificial Intelligence Research | 2022-05-16 | Paper |
Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori | 2022-03-22 | Paper |
How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition Theoretical Computer Science | 2021-09-27 | Paper |
A faster cryptographer's Conspiracy Santa Theoretical Computer Science | 2020-09-03 | Paper |
A cryptographer's Conspiracy Santa | 2020-08-11 | Paper |
About blockchain interoperability Information Processing Letters | 2020-08-04 | Paper |
Optimal Threshold Padlock Systems | 2020-04-24 | Paper |
Infinite grid exploration by disoriented robots | 2020-03-03 | Paper |
Interactive physical zero-knowledge proof for Norinori | 2020-02-24 | Paper |
Efficient invisible and unlinkable sanitizable signatures | 2020-01-28 | Paper |
Computing AES related-key differential characteristics with constraint programming Artificial Intelligence | 2020-01-20 | Paper |
DABSTERS: a privacy preserving e-voting protocol for permissioned blockchain | 2019-12-12 | Paper |
Anonymizable ring signature without pairing | 2018-12-07 | Paper |
Verifiable private polynomial evaluation | 2018-11-07 | Paper |
Revisiting AES related-key differential attacks with constraint programming Information Processing Letters | 2018-10-19 | Paper |
Formal analysis and offline monitoring of electronic exams Formal Methods in System Design | 2017-09-08 | Paper |
Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen | 2017-07-17 | Paper |
Formal verification of mobile robot protocols Distributed Computing | 2017-06-22 | Paper |
Related-Key Cryptanalysis of Midori Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Automated proofs of block cipher modes of operation Journal of Automated Reasoning | 2016-05-26 | Paper |
On the existence and decidability of unique decompositions of processes in the applied \(\pi\)-calculus Theoretical Computer Science | 2015-12-15 | Paper |
Comparison of mean hitting times for a degree-biased random walk Discrete Applied Mathematics | 2014-05-06 | Paper |
Formal verification of e-auction protocols Lecture Notes in Computer Science | 2013-08-06 | Paper |
Brandt's fully private auction protocol revisited Progress in Cryptology – AFRICACRYPT 2013 | 2013-06-07 | Paper |
On unique decomposition of processes in the applied \(\pi\)-calculus Lecture Notes in Computer Science | 2013-03-18 | Paper |
Analysis of random walks using tabu lists Structural Information and Communication Complexity | 2012-09-26 | Paper |
Automated verification of block cipher modes of operation, an improved method Foundations and Practice of Security | 2012-06-08 | Paper |
Vote-independence: a powerful privacy notion for voting protocols Foundations and Practice of Security | 2012-06-08 | Paper |
Benaloh's dense probabilistic encryption revisited Lecture Notes in Computer Science | 2011-06-29 | Paper |
Automated proofs for asymmetric encryption Journal of Automated Reasoning | 2011-06-03 | Paper |
Automated proofs for asymmetric encryption Concurrency, Compositionality, and Correctness | 2010-03-09 | Paper |
Automated security proof for symmetric encryption modes Advances in Computer Science - ASIAN 2009. Information Security and Privacy | 2010-01-14 | Paper |
Comparing State Spaces in Automatic Security Protocol Analysis Formal to Practical Security | 2009-06-09 | Paper |
Symbolic protocol analysis for monoidal equational theories Information and Computation | 2008-04-16 | Paper |
Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or Automata, Languages and Programming | 2007-09-11 | Paper |
Intruder deduction for the equational theory of abelian groups with distributive encryption Information and Computation | 2007-04-16 | Paper |
Term Rewriting and Applications Lecture Notes in Computer Science | 2005-11-11 | Paper |