| Publication | Date of Publication | Type |
|---|
| Efficient AND protocols resistant to maliciously revealing a single card | 2026-03-20 | Paper |
| How to play Old Maid with virtual players | 2025-04-29 | Paper |
How to play Old Maid with virtual players Theory of Computing Systems | 2025-04-08 | Paper |
| Card-based cryptography meets 3D printer | 2025-03-12 | Paper |
| Upper bounds on the number of shuffles for two-helping-card multi-input AND protocols | 2024-06-05 | Paper |
| Two UNO decks efficiently perform zero-knowledge proof for Sudoku | 2024-05-29 | Paper |
| Card-based protocol against actively revealing card attack | 2024-04-19 | Paper |
Single-shuffle card-based protocol with eight cards per gate Unconventional Computation and Natural Computation | 2024-01-12 | Paper |
Multi-party computation based on physical coins Theory and Practice of Natural Computing | 2023-10-16 | Paper |
Committed-format AND protocol using only random cuts Natural Computing | 2023-09-08 | Paper |
Physical ZKP protocols for Nurimisaki and Kurodoko Theoretical Computer Science | 2023-09-07 | Paper |
Actively revealing card attack on card-based protocols Natural Computing | 2023-08-31 | Paper |
Physical zero-knowledge proof protocol for Topswops Information Security Practice and Experience | 2023-08-04 | Paper |
Hide a liar: card-based ZKP protocol for Usowan Lecture Notes in Computer Science | 2023-08-04 | Paper |
Secure computations through checking suits of playing cards Frontiers of Algorithmic Wisdom | 2023-08-03 | Paper |
Physical zero-knowledge proof for Makaro Lecture Notes in Computer Science | 2023-08-02 | Paper |
Card-minimal protocols for symmetric Boolean functions of more than seven inputs Lecture Notes in Computer Science | 2023-07-28 | Paper |
Card-based ZKP protocol for Nurimisaki Lecture Notes in Computer Science | 2023-06-12 | Paper |
Card-minimal protocols for three-input functions with standard playing cards Progress in Cryptology - AFRICACRYPT 2022 | 2023-06-02 | Paper |
Another use of the five-card trick: card-minimal secure three-input majority function evaluation Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Card-based zero-knowledge proof protocols for graph problems and their computational model | 2023-04-13 | Paper |
| A card-minimal three-input and protocol using two shuffles | 2023-03-30 | Paper |
| Physical Zero-Knowledge Proof for Suguru Puzzle | 2023-03-21 | Paper |
| Public-PEZ Cryptography | 2023-03-21 | Paper |
| Card-based ZKP protocols for Takuzu and Juosan | 2023-02-07 | Paper |
| Card-Based Secure Sorting Protocol | 2023-01-18 | Paper |
| A physical ZKP for Slitherlink: how to perform physical topology-preserving computation | 2022-08-30 | Paper |
| Zero-knowledge proof protocol for cryptarithmetic using dihedral cards | 2022-07-06 | Paper |
Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle Information and Computation | 2022-06-08 | Paper |
Information leakage due to operative errors in card-based protocols Information and Computation | 2022-06-08 | Paper |
| Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori | 2022-03-22 | Paper |
| A secure three-input and protocol with a standard deck of minimal cards | 2022-03-21 | Paper |
| Efficient generation of a card-based uniformly distributed random derangement | 2021-10-04 | Paper |
How to construct physical zero-knowledge proofs for puzzles with a ``single loop'' condition Theoretical Computer Science | 2021-09-27 | Paper |
| How to implement a non-uniform or non-closed shuffle | 2021-07-06 | Paper |
Card-based protocols for secure ranking computations Theoretical Computer Science | 2020-10-22 | Paper |
Efficient card-based zero-knowledge proof for Sudoku Theoretical Computer Science | 2020-09-03 | Paper |
| Card-based protocols using triangle cards | 2020-08-11 | Paper |
| Card-based zero-knowledge proof for Sudoku | 2020-08-11 | Paper |
| Card-based secure ranking computations | 2020-05-13 | Paper |
| Interactive physical zero-knowledge proof for Norinori | 2020-02-24 | Paper |
Practical card-based implementations of Yao's millionaire protocol Theoretical Computer Science | 2019-12-27 | Paper |
| Secure computation of any Boolean function based on any deck of cards | 2019-10-11 | Paper |
| Practical and easy-to-understand card-based implementation of Yao's millionaire protocol | 2019-10-11 | Paper |
| The six-card trick: secure computation of three-input equality | 2019-03-29 | Paper |
| Efficient and secure multiparty computations using a standard deck of playing cards | 2018-10-26 | Paper |
| Secure multi-party computation using polarizing cards | 2018-10-24 | Paper |
Card-based protocols using unequal division shuffles Soft Computing | 2018-10-22 | Paper |
| Analyzing execution time of card-based protocols | 2018-10-18 | Paper |
| Analysis of information leakage due to operative errors in card-based protocols | 2018-09-06 | Paper |
| Secret key amplification from uniformly leaked key exchange complete graph | 2018-06-15 | Paper |
| The minimum number of cards in practical card-based protocols | 2018-02-23 | Paper |
| Necessary and sufficient numbers of cards for securely computing two-bit output functions | 2017-10-23 | Paper |
Card-based protocols for securely computing the conjunction of multiple variables Theoretical Computer Science | 2016-02-26 | Paper |
Multi-party computation with small shuffle complexity using regular polygon cards Provable Security | 2016-01-27 | Paper |
Card-based protocols for any Boolean function Lecture Notes in Computer Science | 2015-09-30 | Paper |
Efficient card-based protocols for generating a hidden random permutation without fixed points Unconventional Computation and Natural Computation | 2015-09-14 | Paper |
Minimizing ESCT forms for two-variable multiple-valued input binary output functions Discrete Applied Mathematics | 2014-05-06 | Paper |
Voting with a Logarithmic Number of Cards Unconventional Computation and Natural Computation | 2013-06-28 | Paper |
The five-card trick can be done with four cards Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Absolutely secure message transmission using a key sharing graph Discrete Mathematics, Algorithms and Applications | 2013-01-24 | Paper |
| Minimizing AND-EXOR expressions for two-variable multiple-valued input binary output functions | 2012-04-26 | Paper |
An application of st-numbering to secret key agreement International Journal of Foundations of Computer Science | 2011-10-10 | Paper |
A one-round secure message broadcasting protocol through a key sharing tree Information Processing Letters | 2010-08-20 | Paper |
Six-Card Secure AND and Four-Card Secure XOR Frontiers in Algorithmics | 2009-07-14 | Paper |
Minimizing AND-EXOR Expressions for Multiple-Valued Two-Input Logic Functions Lecture Notes in Computer Science | 2009-06-03 | Paper |
Secure Multiparty Computations Using the 15 Puzzle Combinatorial Optimization and Applications | 2009-03-03 | Paper |
A revised transformation protocol for unconditionally secure secret key exchange Theory of Computing Systems | 2008-04-03 | Paper |
Secure Multiparty Computations Using a Dial Lock Lecture Notes in Computer Science | 2007-11-13 | Paper |
Theory and Applications of Models of Computation Lecture Notes in Computer Science | 2007-04-30 | Paper |
| Securely computing XOR with 10 cards | 2006-12-05 | Paper |
Computing and Combinatorics Lecture Notes in Computer Science | 2005-06-15 | Paper |
| scientific article; zbMATH DE number 2080991 (Why is no real title available?) | 2004-08-04 | Paper |
Characterization of optimal key set protocols Discrete Applied Mathematics | 2003-09-25 | Paper |
| scientific article; zbMATH DE number 1759477 (Why is no real title available?) | 2002-11-25 | Paper |
| scientific article; zbMATH DE number 1788708 (Why is no real title available?) | 2002-08-26 | Paper |
scientific article; zbMATH DE number 1925555 (Why is no real title available?) International Journal of Information Security | 2002-01-01 | Paper |
| scientific article; zbMATH DE number 1304085 (Why is no real title available?) | 2000-03-07 | Paper |
| scientific article; zbMATH DE number 1222849 (Why is no real title available?) | 1999-02-14 | Paper |