The following pages link to Hideaki Sone (Q820564):
Displaying 31 items.
- How to construct physical zero-knowledge proofs for puzzles with a ``single loop'' condition (Q820565) (← links)
- A one-round secure message broadcasting protocol through a key sharing tree (Q989505) (← links)
- Secret key amplification from uniformly leaked key exchange complete graph (Q1641090) (← links)
- The minimum number of cards in practical card-based protocols (Q1701439) (← links)
- Card-based protocols using unequal division shuffles (Q1797742) (← links)
- Analyzing execution time of card-based protocols (Q1799370) (← links)
- A secure three-input and protocol with a standard deck of minimal cards (Q2117094) (← links)
- A physical ZKP for Slitherlink: how to perform physical topology-preserving computation (Q2169919) (← links)
- Card-based secure ranking computations (Q2180177) (← links)
- Efficient card-based zero-knowledge proof for Sudoku (Q2196568) (← links)
- Card-based protocols for secure ranking computations (Q2207500) (← links)
- Efficient generation of a card-based uniformly distributed random derangement (Q2232235) (← links)
- Practical card-based implementations of Yao's millionaire protocol (Q2283025) (← links)
- Interactive physical zero-knowledge proof for Norinori (Q2300037) (← links)
- Practical and easy-to-understand card-based implementation of Yao's millionaire protocol (Q2327115) (← links)
- Necessary and sufficient numbers of cards for securely computing two-bit output functions (Q2412227) (← links)
- Minimizing ESCT forms for two-variable multiple-valued input binary output functions (Q2449071) (← links)
- Card-Based Protocols for Any Boolean Function (Q2948458) (← links)
- AN APPLICATION OF ST-NUMBERING TO SECRET KEY AGREEMENT (Q3173946) (← links)
- Card-Based Zero-Knowledge Proof for Sudoku (Q3301020) (← links)
- (Q3412148) (← links)
- Secure Multiparty Computations Using the 15 Puzzle (Q3611979) (← links)
- The Five-Card Trick Can Be Done with Four Cards (Q4911610) (← links)
- Voting with a Logarithmic Number of Cards (Q5300921) (← links)
- Six-Card Secure AND and Four-Card Secure XOR (Q5321728) (← links)
- Secure Multiparty Computations Using a Dial Lock (Q5425461) (← links)
- Theory and Applications of Models of Computation (Q5898908) (← links)
- Committed-format AND protocol using only random cuts (Q6095508) (← links)
- Actively revealing card attack on card-based protocols (Q6136456) (← links)
- Card-based ZKP protocols for Takuzu and Juosan (Q6487593) (← links)
- Card-based protocol against actively revealing card attack (Q6536365) (← links)