Toshiyuki Isshiki

From MaRDI portal
Person:2807193



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Threshold fully homomorphic encryption over the torus2024-06-05Paper
Privacy-preserving fingerprint authentication resistant to hill-climbing attacks
Lecture Notes in Computer Science
2016-05-19Paper
Attacks to the proxy re-encryption schemes from IWSEC2011
Advances in Information and Computer Security
2014-09-15Paper
Factoring-based proxy re-encryption schemes
Provable Security
2013-10-23Paper
Controlled joining on encrypted relational database
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Proxy re-encryption in a stronger security model extended from CT-RSA2012
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Security of Digital Signature Schemes in Weakened Random Oracle Models
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper


Research outcomes over time


This page was built for person: Toshiyuki Isshiki