The following pages link to Takahiro Matsuda (Q428990):
Displaying 50 items.
- Asynchronous multiple source network coding for wireless broadcasting (Q428992) (← links)
- Memory lower bounds of reductions revisited (Q1648781) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Related randomness security for public key encryption, revisited (Q1749285) (← links)
- Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups (Q1784106) (← links)
- Efficient bit-decomposition and modulus-conversion protocols with an honest majority (Q1784437) (← links)
- NIZK from SNARG (Q2055737) (← links)
- Impossibility on tamper-resilient cryptography with uniqueness properties (Q2061927) (← links)
- Generic transformation from broadcast encryption to round-optimal deniable ring authentication (Q2115719) (← links)
- CPA-to-CCA transformation for KDM security (Q2175934) (← links)
- Simple and efficient KDM-CCA secure public key encryption (Q2178850) (← links)
- Field extension in secret-shared form and its applications to efficient secure computation (Q2183935) (← links)
- Improved security evaluation techniques for imperfect randomness from arbitrary distributions (Q2289223) (← links)
- Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) (Q2289431) (← links)
- Circular security is complete for KDM security (Q2692344) (← links)
- Maliciously circuit-private multi-key FHE and MPC based on LWE (Q2701482) (← links)
- Completeness of Single-Bit Projection-KDM Security for Public Key Encryption (Q2790040) (← links)
- Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption (Q2790055) (← links)
- A Signature Scheme with a Fuzzy Private Key (Q2794497) (← links)
- Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security (Q2798768) (← links)
- On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions (Q2798773) (← links)
- On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks (Q2806759) (← links)
- An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption (Q2811141) (← links)
- Fuzzy Signatures: Relaxing Requirements and a New Construction (Q2822668) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption (Q2890017) (← links)
- Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms (Q2900243) (← links)
- Time-Specific Encryption from Forward-Secure Encryption (Q2912795) (← links)
- On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups (Q2914302) (← links)
- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks (Q2942828) (← links)
- Anonymous Data Collection System with Mediators (Q2947112) (← links)
- How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones (Q2953786) (← links)
- On Black-Box Separations among Injective One-Way Functions (Q3000566) (← links)
- Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability (Q3059654) (← links)
- Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks (Q3084351) (← links)
- Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption (Q3190028) (← links)
- A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function (Q3503871) (← links)
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations (Q3623032) (← links)
- A Generic Construction of Timed-Release Encryption with Pre-open Capability (Q3638983) (← links)
- Efficient Constructions of Signcryption Schemes and Signcryption Composability (Q3652329) (← links)
- Group Signatures with Message-Dependent Opening (Q4912504) (← links)
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption (Q4915999) (← links)
- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited (Q4916018) (← links)
- Ciphertext Policy Multi-dimensional Range Encryption (Q4922872) (← links)
- More Constructions of Re-splittable Threshold Public Key Encryption (Q5253631) (← links)
- Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms (Q5261644) (← links)
- Wired/Wireless Internet Communications (Q5307012) (← links)
- Chosen Ciphertext Security via UCE (Q5402964) (← links)
- Chosen Ciphertext Security via Point Obfuscation (Q5746334) (← links)
- On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations (Q5746341) (← links)