Shinsaku Kiyomoto

From MaRDI portal
Person:1736053


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Compact accountable ring signatures in the plain model
 
2024-07-17Paper
Compact ring signatures with post-quantum security in standard model
 
2024-07-17Paper
Spherical Gaussian leftover hash lemma via the Rényi divergence
 
2023-11-09Paper
Trapdoor sanitizable and redactable signatures with unlinkability, invisibility and strong context-hiding
Lecture Notes in Computer Science
2023-08-21Paper
Efficient unique ring signatures from lattices
Computer Security – ESORICS 2022
2023-07-28Paper
Zero-knowledge range arguments for signed fractional numbers from lattices
Provable and Practical Security
2023-07-21Paper
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness
Information Security Practice and Experience
2023-06-30Paper
Efficient Unique Ring Signature for Blockchain Privacy Protection
 
2023-04-13Paper
Time-Specific Signatures
 
2023-03-21Paper
Integerwise Functional Bootstrapping on TFHE
 
2023-03-21Paper
A Compact Digital Signature Scheme Based on the Module-LWR Problem
1515.94104
2022-12-21Paper
Single-trace side-channel analysis on polynomial-based MAC schemes
 
2022-12-16Paper
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model
Theoretical Computer Science
2022-08-25Paper
Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem
 
2022-04-22Paper
Chosen-ciphertext lattice-based public key encryption with equality test in standard model
Theoretical Computer Science
2022-02-01Paper
A lattice-based public key encryption with equality test in standard model
 
2020-05-27Paper
On the complexity of the LWR-solving BKW algorithm
 
2019-03-29Paper
Parallel Gauss sieve algorithm: solving the SVP challenge over a 128-dimensional ideal lattice
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Analysis of message injection in stream cipher-based hash functions
Applied Cryptography and Network Security
2011-06-28Paper
Ternary Subset Difference Method and Its Quantitative Analysis
Information Security Applications
2009-02-24Paper
A New (k,n)-Threshold Secret Sharing Scheme and Its Extension
Lecture Notes in Computer Science
2008-11-20Paper


Research outcomes over time


This page was built for person: Shinsaku Kiyomoto