The following pages link to Keisuke Tanaka (Q671623):
Displaying 50 items.
- Negation-limited circuit complexity of symmetric functions (Q671626) (← links)
- Security definitions on time-lock puzzles (Q831622) (← links)
- Secret sharing with statistical privacy and computational relaxed non-malleability (Q831625) (← links)
- Minimizing maximum absolute lateness and range of lateness under generalized due dates on a single machine (Q1290164) (← links)
- An exponential gap with the removal of one negation gate (Q1603543) (← links)
- Memory lower bounds of reductions revisited (Q1648781) (← links)
- CCA2 key-privacy for code-based encryption in the standard model (Q1673585) (← links)
- A framework for achieving KDM-CCA secure public-key encryption (Q1710594) (← links)
- Key dependent message security and receiver selective opening security for identity-based encryption (Q1749272) (← links)
- Fully anonymous group signature with verifier-local revocation (Q1796778) (← links)
- Lower bounds for key length of \(k\)-wise almost independent permutations and certain symmetric-key encryption schemes (Q1800680) (← links)
- Group signature with deniability: how to disavow a signature (Q1801198) (← links)
- Quantum bit-commitment for small storage based on quantum one-way permutations (Q1880339) (← links)
- Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees (Q1935809) (← links)
- Improved security proof for the Camenisch-Lysyanskaya signature-based synchronized aggregate signature scheme (Q2030874) (← links)
- Impossibility on tamper-resilient cryptography with uniqueness properties (Q2061927) (← links)
- Efficient two-party exponentiation from quotient transfer (Q2096636) (← links)
- Forward secure message franking (Q2104457) (← links)
- Generic transformation from broadcast encryption to round-optimal deniable ring authentication (Q2115719) (← links)
- Payment trees: low collateral payments for payment channel networks (Q2147242) (← links)
- Generic constructions for fully secure revocable attribute-based encryption (Q2167729) (← links)
- Simple and efficient KDM-CCA secure public key encryption (Q2178850) (← links)
- Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem (Q2178851) (← links)
- Tightly secure ring signatures in the standard model (Q2235773) (← links)
- Anonymous single-round server-aided verification (Q2303093) (← links)
- Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously (Q2304931) (← links)
- Limiting negations in bounded-depth circuits: an extension of Markov's theorem (Q2390211) (← links)
- Notch effect on fatigue strength reduction of bearing steel in the very high cycle regime (Q2433342) (← links)
- Smart structure for suppression of mode I and II crack propagation in CFRP laminates by shape memory alloy TiNi actuator (Q2506563) (← links)
- Mode II fatigue crack growth from delamination in unidirectional tape and satin-woven fabric laminates of high strength GFRP (Q2506573) (← links)
- Fatigue damage evaluation in SiCp/2024 by X-ray diffraction method (Q2506640) (← links)
- Watermarkable signature with computational function preserving (Q2692314) (← links)
- Receiver selective opening CCA secure public key encryption from various assumptions (Q2692319) (← links)
- Non-committing encryption with constant ciphertext expansion from standard assumptions (Q2692376) (← links)
- Turn-based communication channels (Q2697935) (← links)
- (Q2743823) (← links)
- Completeness of Single-Bit Projection-KDM Security for Public Key Encryption (Q2790040) (← links)
- On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions (Q2798773) (← links)
- On the complexity of negation-limited Boolean networks (Q2817595) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Factoring-Based Proxy Re-Encryption Schemes (Q2856174) (← links)
- A Game-Theoretic Perspective on Oblivious Transfer (Q2907359) (← links)
- Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs (Q2907373) (← links)
- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks (Q2942828) (← links)
- Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency (Q2948143) (← links)
- How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones (Q2953786) (← links)
- Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity (Q3002097) (← links)
- Weak Oblivious Transfer from Strong One-Way Functions (Q3092347) (← links)
- Randomness Leakage in the KEM/DEM Framework (Q3092368) (← links)
- A Multi-trapdoor Commitment Scheme from the RSA Assumption (Q3163104) (← links)