What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Tsuyoshi Takagi
Google Scholar
103
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/acisp
Revisiting the Security of Fiat-Shamir Signature Schemes Under Superposition Attacks.
Quan Yuan
Chao Sun
Tsuyoshi Takagi
2024
conf/provsec
Consecutive Adaptor Signature Scheme: From Two-Party to N-Party Settings.
Kaisei Kajita
Go Ohtake
Tsuyoshi Takagi
2024
conf/provsec
Tightly Secure Identity-Based Signature from Cryptographic Group Actions.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Hyungrok Jo
Tsuyoshi Takagi
2024
conf/esorics
Review the Cuckoo Hash-Based Unbalanced Private Set Union: Leakage, Fix, and Optimization.
Keyang Liu
Xingxin Li
Tsuyoshi Takagi
2024
conf/iwsec
Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments.
Naoki Yoshiguchi
Yusuke Aikawa
Tsuyoshi Takagi
2023
conf/acisp
Memory-Efficient Quantum Information Set Decoding Algorithm.
Naoto Kimura
Atsushi Takayasu
Tsuyoshi Takagi
2023
conf/acns
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence.
Hiroki Okada
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2023
conf/iwsec
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors.
Haiming Zhu
Shoichi Kamada
Momonari Kudo
Tsuyoshi Takagi
2022
conf/iwsec
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values.
Taku Kato
Yutaro Kiyomura
Tsuyoshi Takagi
2021
conf/iwsec
(Short Paper) Simple Matrix Signature Scheme.
Changze Yin
Yacheng Wang
Tsuyoshi Takagi
2021
conf/iwsec
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem.
Shusaku Uemura
Kazuhide Fukushima
Shinsaku Kiyomoto
Momonari Kudo
Tsuyoshi Takagi
2021
conf/asiacrypt
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV.
Hiroki Furue
Yasuhiko Ikematsu
Yutaro Kiyomura
Tsuyoshi Takagi
2020
conf/ccs
Cryptanalysis of GiophantusTM Schemes against Hybrid Attack.
Yuntao Wang
Yasuhiko Ikematsu
Koichiro Akiyama
Tsuyoshi Takagi
2020
conf/acisp
Improving Key Mismatch Attack on NewHope with Fewer Queries.
Satoshi Okada
Yuntao Wang
Tsuyoshi Takagi
2020
conf/icisc
An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH.
Tomoki Kawashima
Katsuyuki Takashima
Yusuke Aikawa
Tsuyoshi Takagi
2020
conf/provsec
Short Lattice Signatures in the Standard Model with Efficient Tag Generation.
Kaisei Kajita
Kazuto Ogawa
Koji Nuida
Tsuyoshi Takagi
2020
conf/wisa
Revisiting the Minrank Problem on Multivariate Cryptography.
Yacheng Wang
Yasuhiko Ikematsu
Shuhei Nakamura
Tsuyoshi Takagi
2020
conf/icics
A Compact Digital Signature Scheme Based on the Module-LWR Problem.
Hiroki Okada
Atsushi Takayasu
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2020
conf/ctrsa
How to Construct CSIDH on Edwards Curves.
Tomoki Moriya
Hiroshi Onuki
Tsuyoshi Takagi
2020
conf/iwsec
On Collisions Related to an Ideal Class of Order 3 in CSIDH.
Hiroshi Onuki
Tsuyoshi Takagi
2020
conf/asiacrypt
SiGamal: A Supersingular Isogeny-Based PKE and Its Application to a PRF.
Tomoki Moriya
Hiroshi Onuki
Tsuyoshi Takagi
2019
conf/acns
One Sample Ring-LWE with Rounding and Its Application to Key Exchange.
Jintai Ding
Xinwei Gao
Tsuyoshi Takagi
Yuntao Wang
2019
conf/ctrsa
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model.
Taiga Mizuide
Atsushi Takayasu
Tsuyoshi Takagi
2019
conf/iwsec
(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points.
Hiroshi Onuki
Yusuke Aikawa
Tsutomu Yamazaki
Tsuyoshi Takagi
2018
conf/acisp
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes.
Yacheng Wang
Yasuhiko Ikematsu
Dung Hoang Duong
Tsuyoshi Takagi
2018
conf/acisp
Improving the BKZ Reduction Algorithm by Quick Reordering Technique.
Yuntao Wang
Tsuyoshi Takagi
2018
conf/icisc
On the Complexity of the LWR-Solving BKW Algorithm.
Hiroki Okada
Atsushi Takayasu
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2018
conf/iwsec
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques.
Weiyao Wang
Yuntao Wang
Atsushi Takayasu
Tsuyoshi Takagi
2018
conf/iwsec
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017.
Yasufumi Hashimoto
Yasuhiko Ikematsu
Tsuyoshi Takagi
2017
journals/compsec
Efficient outsourcing of secure k-nearest neighbour query over encrypted database.
Rui Xu
Kirill Morozov
Yanjiang Yang
Jianying Zhou
Tsuyoshi Takagi
2017
conf/acns
Secure and Efficient Pairing at 256-Bit Security Level.
Yutaro Kiyomura
Akiko Inoue
Yuto Kawahara
Masaya Yasuda
Tsuyoshi Takagi
Tetsutaro Kobayashi
2017
conf/acns
An Experimental Study of the BDD Approach for the Search LWE Problem.
Rui Xu
Sze Ling Yeo
Kazuhide Fukushima
Tsuyoshi Takagi
Hwajung Seo
Shinsaku Kiyomoto
Matt Henricksen
2017
conf/host
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Ye Yuan
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2017
conf/icics
An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem.
Yuntao Wang
Yoshinori Aono
Tsuyoshi Takagi
2017
conf/iwsec
The Beauty and the Beasts - The Hard Cases in LLL Reduction.
Saed Alsayigh
Jintai Ding
Tsuyoshi Takagi
Yuntao Wang
2017
conf/sacrypt
A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations.
Koichiro Akiyama
Yasuhiro Goto
Shinya Okumura
Tsuyoshi Takagi
Koji Nuida
Goichiro Hanaoka
2016
journals/tifs
Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding.
Chi Cheng
Jemin Lee
Tao Jiang
Tsuyoshi Takagi
2016
journals/tifs
Efficient Deniably Authenticated Encryption and Its Application to E-Mail.
Fagen Li
Di Zhong
Tsuyoshi Takagi
2016
conf/acisp
Reducing the Key Size of the SRP Encryption Scheme.
Dung Hoang Duong
Albrecht Petzoldt
Tsuyoshi Takagi
2016
conf/acisp
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.
Rui Xu
Kirill Morozov
Yanjiang Yang
Jianying Zhou
Tsuyoshi Takagi
2016
conf/icisc
Revisiting the Cubic UOV Signature Scheme.
Dung Hoang Duong
Albrecht Petzoldt
Yacheng Wang
Tsuyoshi Takagi
2016
conf/iwsec
Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction.
Jintai Ding
Momonari Kudo
Shinya Okumura
Tsuyoshi Takagi
Chengdong Tao
2016
conf/eurocrypt
Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator.
Yoshinori Aono
Yuntao Wang
Takuya Hayashi
Tsuyoshi Takagi
2014
conf/pkc
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice.
Tsukasa Ishiguro
Shinsaku Kiyomoto
Yutaka Miyake
Tsuyoshi Takagi
2014
conf/iwsec
Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication.
Rui Xu
Kirill Morozov
Tsuyoshi Takagi
2013
conf/ccs
A variant of rainbow with shorter secret key and faster signature generation.
Takanori Yasuda
Jintai Ding
Tsuyoshi Takagi
Kouichi Sakurai
2013
conf/ccs
Proof of plaintext knowledge for code-based public-key encryption revisited.
Rong Hu
Kirill Morozov
Tsuyoshi Takagi
2013
conf/ccs
Secure k-NN computation on encrypted cloud data without sharing key with query users.
Youwen Zhu
Rui Xu
Tsuyoshi Takagi
2013
conf/acisp
Attacks on Multi-Prime RSA with Small Prime Difference.
Hui Zhang
Tsuyoshi Takagi
2013
conf/asiajcis
On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding.
Rong Hu
Kirill Morozov
Tsuyoshi Takagi
2013
conf/iwsec
Improvement of Faugère et al.'s Method to Solve ECDLP.
Yun-Ju Huang
Christophe Petit
Naoyuki Shinohara
Tsuyoshi Takagi
2013
conf/iwsec
Efficient Algorithm for Tate Pairing of Composite Order.
Yutaro Kiyomura
Tsuyoshi Takagi
2013
conf/iwsec
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary.
Rui Xu
Kirill Morozov
Tsuyoshi Takagi
2012
conf/acisp
Zero-Knowledge Protocols for the McEliece Encryption.
Kirill Morozov
Tsuyoshi Takagi
2012
conf/icisc
Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures.
Keisuke Hakuta
Yosuke Katoh
Hisayoshi Sato
Tsuyoshi Takagi
2012
conf/ctrsa
Reducing the Key Size of Rainbow Using Non-commutative Rings.
Takanori Yasuda
Kouichi Sakurai
Tsuyoshi Takagi
2012
conf/iwsec
Efficient Secure Primitive for Privacy Preserving Distributed Computations.
Youwen Zhu
Tsuyoshi Takagi
Liusheng Huang
2012
conf/iwsec
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.
Takanori Yasuda
Tsuyoshi Takagi
Kouichi Sakurai
2012
conf/asiacrypt
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397).
Takuya Hayashi
Takeshi Shimoyama
Naoyuki Shinohara
Tsuyoshi Takagi
2011
conf/acisp
GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems.
Mingwu Zhang
Tsuyoshi Takagi
2011
conf/provsec
Anonymous Encryption with Partial-Order Subset Delegation Functionality.
Mingwu Zhang
Takashi Nishide
Bo Yang
Tsuyoshi Takagi
2011
conf/provsec
Efficient Identity-Based Signcryption in the Standard Model.
Fagen Li
Fahad Bin Muhaya
Mingwu Zhang
Tsuyoshi Takagi
2010
conf/pkc
</sup>).
Takuya Hayashi
Naoyuki Shinohara
Lihua Wang
Shin'ichiro Matsuo
Masaaki Shirase
Tsuyoshi Takagi
2010
conf/iwsec
Efficient Implementation of Pairing on BREW Mobile Phones.
Tadashi Iyama
Shinsaku Kiyomoto
Kazuhide Fukushima
Toshiaki Tanaka
Tsuyoshi Takagi
2009
conf/sacrypt
</sub> Pairing over F<sub>3<sup>m</sup></sub>.
Yuta Sasaki
Satsuki Nishina
Masaaki Shirase
Tsuyoshi Takagi
2008
conf/cans
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06.
Fagen Li
Masaaki Shirase
Tsuyoshi Takagi
2007
conf/acns
Compressed XTR.
Masaaki Shirase
Dong-Guk Han
Yasushi Hibino
Ho Won Kim
Tsuyoshi Takagi
2007
conf/wisa
<sub>T</sub> Pairing Algorithm over Arbitrary Extension Degree.
Masaaki Shirase
Yuto Kawahara
Tsuyoshi Takagi
Eiji Okamoto
2007
conf/wisa
Efficient Implementation of the Pairing on Mobilephones Using BREW.
Motoi Yoshitomi
Tsuyoshi Takagi
Shinsaku Kiyomoto
Toshiaki Tanaka
2007
conf/iwsec
Reduction Optimal Trinomials for Efficient Software Implementation of the eta<sub>T</sub> Pairing.
Toshiya Nakajima
Tetsuya Izu
Tsuyoshi Takagi
2006
conf/asiacrypt
New Approach for Selectively Convertible Undeniable Signature Schemes.
Kaoru Kurosawa
Tsuyoshi Takagi
2006
conf/cans
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
Tae Hyun Kim
Tsuyoshi Takagi
Dong-Guk Han
Ho Won Kim
Jongin Lim
2005
conf/acisp
Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks.
Katsuyuki Okeya
Tsuyoshi Takagi
Camille Vuillaume
2005
conf/acisp
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two.
Izuru Kitamura
Masanobu Katagi
Tsuyoshi Takagi
2005
conf/ches
Short Memory Scalar Multiplication on Koblitz Curves.
Katsuyuki Okeya
Tsuyoshi Takagi
Camille Vuillaume
2004
conf/acisp
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks.
Katsuyuki Okeya
Tsuyoshi Takagi
Camille Vuillaume
2004
conf/crypto
Signed Binary Representations Revisited.
Katsuyuki Okeya
Katja Schmidt-Samoa
Christian Spahn
Tsuyoshi Takagi
2004
conf/acns
Security Analysis of CRT-Based Cryptosystems.
Katsuyuki Okeya
Tsuyoshi Takagi
2004
conf/icisc
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.
Masanobu Katagi
Toru Akishita
Izuru Kitamura
Tsuyoshi Takagi
2004
conf/wisa
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.
Masanobu Katagi
Izuru Kitamura
Toru Akishita
Tsuyoshi Takagi
2004
conf/pkc
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny.
Toru Akishita
Tsuyoshi Takagi
2003
conf/ches
A More Flexible Countermeasure against Side Channel Attacks Using Window Method.
Katsuyuki Okeya
Tsuyoshi Takagi
2003
conf/pkc
Exceptional Procedure Attack on Elliptic Curve Cryptosystems.
Tetsuya Izu
Tsuyoshi Takagi
2003
conf/ctrsa
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks.
Katsuyuki Okeya
Tsuyoshi Takagi
2003
conf/asiacrypt
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
Kaoru Kurosawa
Katja Schmidt-Samoa
Tsuyoshi Takagi
2003
conf/asiacrypt
Generalized Powering Functions and Their Application to Digital Signatures.
Hisayoshi Sato
Tsuyoshi Takagi
Satoru Tezuka
Kazuo Takaragi
2003
conf/asiacrypt
Some RSA-Based Encryption Schemes with Tight Security Reduction.
Kaoru Kurosawa
Tsuyoshi Takagi
2002
conf/acisp
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields.
Ingrid Biehl
Tsuyoshi Takagi
2002
conf/acisp
On the Security of a Modified Paillier Public-Key Primitive.
Kouichi Sakurai
Tsuyoshi Takagi
2002
conf/icisc
A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem.
Kouichi Sakurai
Tsuyoshi Takagi
2002
conf/icisc
Efficient Computations of the Tate Pairingfor the Large MOV Degrees.
Tetsuya Izu
Tsuyoshi Takagi
2002
conf/pkc
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive.
Kouichi Sakurai
Tsuyoshi Takagi
2002
conf/pkc
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks.
Tetsuya Izu
Tsuyoshi Takagi
2002
conf/icics
Fast Elliptic Curve Multiplications with SIMD Operations.
Tetsuya Izu
Tsuyoshi Takagi
2001
conf/icisc
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
Johannes Buchmann
Kouichi Sakurai
Tsuyoshi Takagi
2000
journals/joc
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time.
Sachar Paulus
Tsuyoshi Takagi
1999
conf/ches
NICE - New Ideal Coset Encryption.
Michael Hartmann
Sachar Paulus
Tsuyoshi Takagi
1999
conf/asiacrypt
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
Detlef Hühnlein
Tsuyoshi Takagi
1998
conf/crypto
Fast RSA-Type Cryptosystem Modulo p<sup>k</sup>q.
Tsuyoshi Takagi
1998
conf/icisc
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
Sachar Paulus
Tsuyoshi Takagi
1998
conf/icisc
Rabin and RSA analogues based on non-maximal imaginary quadratic orders.
Detlef Hühnlein
Andreas Meyer
Tsuyoshi Takagi
1998
conf/eurocrypt
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption.
Detlef Hühnlein
Michael J. Jacobson Jr.
Sachar Paulus
Tsuyoshi Takagi
1997
conf/crypto
Fast RSA-Type Cryptosystems Using N-Adic Expansion.
Tsuyoshi Takagi
Coauthors
Akiko Inoue
(1)
Albrecht Petzoldt
(2)
Andreas Meyer
(1)
Atsushi Takayasu
(5)
Bo Yang
(1)
Camille Vuillaume
(3)
Changze Yin
(1)
Chao Sun
(1)
Chengdong Tao
(1)
Chi Cheng
(1)
Christian Spahn
(1)
Christophe Petit
(1)
Detlef Hühnlein
(3)
Di Zhong
(1)
Dong-Guk Han
(2)
Dung Hoang Duong
(4)
Eiji Okamoto
(1)
Fagen Li
(3)
Fahad Bin Muhaya
(1)
Fuchun Guo
(1)
Go Ohtake
(1)
Goichiro Hanaoka
(1)
Haiming Zhu
(1)
Hiroki Furue
(1)
Hiroki Okada
(3)
Hiroshi Onuki
(4)
Hisayoshi Sato
(2)
Ho Won Kim
(2)
Hui Zhang
(1)
Hwajung Seo
(1)
Hyungrok Jo
(1)
Ingrid Biehl
(1)
Izuru Kitamura
(3)
Jemin Lee
(1)
Jianying Zhou
(2)
Jintai Ding
(4)
Johannes Buchmann
(1)
Jongin Lim
(1)
Kaisei Kajita
(2)
Kaoru Kurosawa
(3)
Katja Schmidt-Samoa
(2)
Katsuyuki Okeya
(7)
Katsuyuki Takashima
(1)
Kazuhide Fukushima
(7)
Kazuo Takaragi
(1)
Kazuto Ogawa
(1)
Keisuke Hakuta
(1)
Keyang Liu
(1)
Kirill Morozov
(7)
Koichiro Akiyama
(2)
Koji Nuida
(2)
Kouichi Sakurai
(7)
Lihua Wang
(1)
Liusheng Huang
(1)
Masaaki Shirase
(5)
Masanobu Katagi
(3)
Masaya Yasuda
(1)
Matt Henricksen
(1)
Michael Hartmann
(1)
Michael J. Jacobson Jr.
(1)
Mingwu Zhang
(3)
Momonari Kudo
(3)
Motoi Yoshitomi
(1)
Naoki Yoshiguchi
(1)
Naoto Kimura
(1)
Naoyuki Shinohara
(3)
Quan Yuan
(1)
Rong Hu
(2)
Rui Xu
(6)
Sachar Paulus
(4)
Saed Alsayigh
(1)
Satoru Tezuka
(1)
Satoshi Okada
(1)
Satsuki Nishina
(1)
Shin'ichiro Matsuo
(1)
Shinsaku Kiyomoto
(9)
Shinya Okumura
(2)
Shoichi Kamada
(1)
Shuhei Nakamura
(1)
Shusaku Uemura
(1)
Sze Ling Yeo
(1)
Tadashi Iyama
(1)
Tae Hyun Kim
(1)
Taiga Mizuide
(1)
Takanori Yasuda
(3)
Takashi Nishide
(1)
Takeshi Shimoyama
(1)
Taku Kato
(1)
Takuya Hayashi
(3)
Tao Jiang
(1)
Tetsutaro Kobayashi
(1)
Tetsuya Izu
(5)
Thanh Xuan Khuc
(1)
Tomoki Kawashima
(1)
Tomoki Moriya
(2)
Toru Akishita
(3)
Toshiaki Tanaka
(2)
Toshiya Nakajima
(1)
Tsukasa Ishiguro
(1)
Tsutomu Yamazaki
(1)
Tsuyoshi Takagi
(103)
Weiyao Wang
(1)
Willy Susilo
(1)
Xingxin Li
(1)
Xinwei Gao
(1)
Yacheng Wang
(4)
Yanjiang Yang
(2)
Yasufumi Hashimoto
(1)
Yasuhiko Ikematsu
(5)
Yasuhiro Goto
(1)
Yasushi Hibino
(1)
Ye Yuan
(1)
Yoshinori Aono
(2)
Yosuke Katoh
(1)
Youwen Zhu
(2)
Yun-Ju Huang
(1)
Yuntao Wang
(8)
Yusuke Aikawa
(3)
Yuta Sasaki
(1)
Yutaka Miyake
(1)
Yutaro Kiyomura
(4)
Yuto Kawahara
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to