Publication: Publication Date: 2022/03/01 Vol. E105-ANo. 3pp. 173-181 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: twin-DH hashed ElGamal, multi-user setting,
Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing Kota SASAKIKoji NUIDA
Publication: Publication Date: 2022/03/01 Vol. E105-ANo. 3pp. 231-241 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: secure multiparty computation, floating-point numbers, secret sharing,
Publication: Publication Date: 2018/09/01 Vol. E101-ANo. 9pp. 1512-1524 Type of Manuscript: Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: card-based protocol, permutation,
Publication: Publication Date: 2018/09/01 Vol. E101-ANo. 9pp. 1503-1511 Type of Manuscript: Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: card-based protocol, permutation without fixed points,
Publication: Publication Date: 2017/09/01 Vol. E100-ANo. 9pp. 1900-1909 Type of Manuscript: Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: card-based protocol, regular polygon cards,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2016/06/01 Vol. E99-ANo. 6pp. 1122-1131 Type of Manuscript: Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: card-based protocols, polarizing cards, secure computation, boolean circuits, recreational cryptography,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2009/01/01 Vol. E92-ANo. 1pp. 197-206 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Application Keyword: fingerprint, c-secure code, collusion attack, security analysis, watermark, DRM,