Eiichiro Fujisaki

From MaRDI portal
Person:1747664


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Improved lattice enumeration algorithms by primal and dual reordering methods
 
2022-12-07Paper
A constant-size signature scheme with tighter reduction from CDH assumption
Lecture Notes in Computer Science
2022-11-02Paper
All-but-many encryption
Journal of Cryptology
2018-04-26Paper
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Improving practical UC-secure commitments based on the DDH assumption
Lecture Notes in Computer Science
2016-10-21Paper
Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
All-but-many encryption. A new framework for fully-equipped UC commitments
Lecture Notes in Computer Science
2015-01-06Paper
Secure integration of asymmetric and symmetric encryption schemes
Journal of Cryptology
2013-04-15Paper
New constructions of efficient simulation-sound commitments using encryption and their applications
Lecture Notes in Computer Science
2012-06-08Paper
Sub-linear size traceable ring signatures without random oracles
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
A multi-trapdoor commitment scheme from the RSA assumption
Information Security and Privacy
2010-10-25Paper
Efficient non-interactive universally composable string-commitment schemes
Provable Security
2009-12-11Paper
On the insecurity of the Fiat-Shamir signatures with iterative hash functions
Provable Security
2009-12-11Paper
Formal Security Treatments for Signatures from Identity-Based Encryption
Provable Security
2008-06-10Paper
Traceable Ring Signature
Public Key Cryptography – PKC 2007
2007-09-04Paper
RSA-OAEP is secure under the RSA assumption
Journal of Cryptology
2004-09-27Paper
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1842496 (Why is no real title available?)
 
2002-12-08Paper
scientific article; zbMATH DE number 1759330 (Why is no real title available?)
 
2002-10-13Paper
Secure integration of asymmetric and symmetric encryption schemes
 
2000-08-27Paper
scientific article; zbMATH DE number 1341866 (Why is no real title available?)
 
1999-09-22Paper
A practical and provably secure scheme for publicly verifiable secret sharing and its applications
Lecture Notes in Computer Science
1999-09-09Paper
scientific article; zbMATH DE number 1088224 (Why is no real title available?)
 
1998-02-10Paper
scientific article; zbMATH DE number 708799 (Why is no real title available?)
 
1995-02-16Paper


Research outcomes over time


This page was built for person: Eiichiro Fujisaki