Toshiyuki Isshiki
From MaRDI portal
Person:2807193
List of research outcomes
This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!
| Publication | Date of Publication | Type |
|---|---|---|
| Threshold fully homomorphic encryption over the torus | 2024-06-05 | Paper |
| Privacy-preserving fingerprint authentication resistant to hill-climbing attacks Lecture Notes in Computer Science | 2016-05-19 | Paper |
| Attacks to the proxy re-encryption schemes from IWSEC2011 Advances in Information and Computer Security | 2014-09-15 | Paper |
| Factoring-based proxy re-encryption schemes Provable Security | 2013-10-23 | Paper |
| Controlled joining on encrypted relational database Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
| Proxy re-encryption in a stronger security model extended from CT-RSA2012 Topics in Cryptology – CT-RSA 2013 | 2013-03-18 | Paper |
| Security of Digital Signature Schemes in Weakened Random Oracle Models Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
| Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Research outcomes over time
This page was built for person: Toshiyuki Isshiki