The following pages link to Koutarou Suzuki (Q494582):
Displaying 31 items.
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- Accelerating beta Weil pairing with precomputation and multi-pairing techniques (Q1995514) (← links)
- Revocable hierarchical identity-based authenticated key exchange (Q2104408) (← links)
- Strongly secure identity-based key exchange with single pairing operation (Q2167783) (← links)
- Secure distributed constraint satisfaction: reaching agreement without revealing private information (Q2457708) (← links)
- (Q2725568) (← links)
- (Q2762902) (← links)
- Garbling Scheme for Formulas with Constant Size of Garbled Gates (Q2811155) (← links)
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices (Q2900236) (← links)
- Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange (Q2907356) (← links)
- How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes (Q2953802) (← links)
- Secure Combinatorial Auctions by Dynamic Programming with Polynomial Secret Sharing (Q2995361) (← links)
- (Q3043931) (← links)
- Anonymizable Signature and Its Construction from Pairings (Q3059641) (← links)
- Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys (Q3059650) (← links)
- Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys (Q3073703) (← links)
- ON THE TURAEV-VIRO-OCNEANU INVARIANT OF 3-MANIFOLDS DERIVED FROMTHE E6-SUBFACTOR (Q3146485) (← links)
- Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys (Q3166840) (← links)
- Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange (Q3578257) (← links)
- Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts (Q3617523) (← links)
- Relinkable Ring Signature (Q3648488) (← links)
- (Q4408434) (← links)
- 1-out-of-n Signatures from a Variety of Keys (Q4412812) (← links)
- Financial Cryptography (Q4680923) (← links)
- (Q4703648) (← links)
- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum (Q4981774) (← links)
- Secure Multi-Party Computation for Elliptic Curves (Q5253630) (← links)
- Converting PKI-Based Authenticated Key Exchange to Identity-Based (Q5498722) (← links)
- Financial Cryptography and Data Security (Q5712260) (← links)
- Traceable Ring Signature (Q5756531) (← links)
- Computer Aided Verification (Q5900594) (← links)