What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shinsaku Kiyomoto
Google Scholar
43
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/acisp
Threshold Ring Signatures with Accountability.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/acisp
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems.
Tuong Ngoc Nguyen
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2024
conf/provsec
Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions.
Thanh Xuan Khuc
Willy Susilo
Dung Hoang Duong
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2023
conf/acns
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence.
Hiroki Okada
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2023
conf/esorics
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Ravi Anand
Subhadeep Banik
Andrea Caforio
Kazuhide Fukushima
Takanori Isobe
Shinsaku Kiyomoto
Fukang Liu
Yuto Nakano
Kosei Sakamoto
Nobuyuki Takeuchi
2022
journals/istr
Multi-dimensional sub/super-range signatures.
Masahito Ishizaka
Shinsaku Kiyomoto
2022
conf/icisc
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding.
Masahito Ishizaka
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/provsec
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices.
Priyanka Dutta
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/esorics
Efficient Unique Ring Signatures from Lattices.
Tuong Ngoc Nguyen
Anh The Ta
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Fuchun Guo
Kazuhide Fukushima
Shinsaku Kiyomoto
2022
conf/asiaccs
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Priyanka Dutta
Mei Jiang
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2021
journals/tosc
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G.
Kosei Sakamoto
Fukang Liu
Yuto Nakano
Shinsaku Kiyomoto
Takanori Isobe
2021
conf/acisp
Efficient Unique Ring Signature for Blockchain Privacy Protection.
Anh The Ta
Thanh Xuan Khuc
Tuong Ngoc Nguyen
Huy Quoc Le
Dung Hoang Duong
Willy Susilo
Kazuhide Fukushima
Shinsaku Kiyomoto
2021
conf/iwsec
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring.
Toru Nakamura
Hiroshi Ito
Shinsaku Kiyomoto
Toshihiro Yamauchi
2021
conf/iwsec
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem.
Shusaku Uemura
Kazuhide Fukushima
Shinsaku Kiyomoto
Momonari Kudo
Tsuyoshi Takagi
2021
conf/cans
Countermeasures Against Backdoor Attacks Towards Malware Detectors.
Shintaro Narisada
Yuki Matsumoto
Seira Hidano
Toshihiro Uchibayashi
Takuo Suganuma
Masahiro Hiji
Shinsaku Kiyomoto
2021
conf/cans
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training.
Kento Hasegawa
Seira Hidano
Shinsaku Kiyomoto
Nozomu Togawa
2020
journals/popets
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques.
Seira Hidano
Takao Murakami
Shuichi Katsumata
Shinsaku Kiyomoto
Goichiro Hanaoka
2020
conf/icics
A Compact Digital Signature Scheme Based on the Module-LWR Problem.
Hiroki Okada
Atsushi Takayasu
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2020
conf/cans
Stronger Targeted Poisoning Attacks Against Malware Detection.
Shintaro Narisada
Shoichiro Sasaki
Seira Hidano
Toshihiro Uchibayashi
Takuo Suganuma
Masahiro Hiji
Shinsaku Kiyomoto
2019
conf/acisp
A Lattice-Based Public Key Encryption with Equality Test in Standard Model.
Dung Hoang Duong
Kazuhide Fukushima
Shinsaku Kiyomoto
Partha Sarathi Roy
Willy Susilo
2019
conf/esorics
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists.
Kohei Nozawa
Kento Hasegawa
Seira Hidano
Shinsaku Kiyomoto
Kazuo Hashimoto
Nozomu Togawa
2019
conf/wisa
Secret Sharing on Evolving Multi-level Access Structure.
Sabyasachi Dutta
Partha Sarathi Roy
Kazuhide Fukushima
Shinsaku Kiyomoto
Kouichi Sakurai
2018
conf/icisc
On the Complexity of the LWR-Solving BKW Algorithm.
Hiroki Okada
Atsushi Takayasu
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2017
conf/acns
An Experimental Study of the BDD Approach for the Search LWE Problem.
Rui Xu
Sze Ling Yeo
Kazuhide Fukushima
Tsuyoshi Takagi
Hwajung Seo
Shinsaku Kiyomoto
Matt Henricksen
2017
conf/eurosp
Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers.
Wataru Kawai
Rei Ueno
Naofumi Homma
Takafumi Aoki
Kazuhide Fukushima
Shinsaku Kiyomoto
2017
conf/esorics
Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences.
Toru Nakamura
Welderufael B. Tesfay
Shinsaku Kiyomoto
Jetzabel M. Serna
2017
conf/host
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Ye Yuan
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2017
conf/icics
Hypercubes and Private Information Retrieval.
Anirban Basu
Rui Xu
Juan Camilo Corena
Shinsaku Kiyomoto
2017
conf/iwsec
Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation.
Rui Xu
Kirill Morozov
Anirban Basu
Mohammad Shahriar Rahman
Shinsaku Kiyomoto
2016
conf/sec
On Gender Specific Perception of Data Sharing in Japan.
Markus Tschersich
Shinsaku Kiyomoto
Sebastian Pape
Toru Nakamura
Gökhan Bal
Haruo Takasaki
Kai Rannenberg
2015
conf/ccs
Practical Private One-way Anonymous Message Routing.
Anirban Basu
Juan Camilo Corena
Jaideep Vaidya
Jon Crowcroft
Shinsaku Kiyomoto
Yung Shin Van Der Sype
Yutaka Miyake
2015
conf/wisa
On Partitioning Secret Data Based on Concept of Functional Safety.
Seira Hidano
Shinsaku Kiyomoto
2014
conf/pkc
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice.
Tsukasa Ishiguro
Shinsaku Kiyomoto
Yutaka Miyake
Tsuyoshi Takagi
2013
conf/esorics
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Limin Jia
Jassim Aljuraidan
Elli Fragkaki
Lujo Bauer
Michael Stroucken
Kazuhide Fukushima
Shinsaku Kiyomoto
Yutaka Miyake
2011
conf/acns
Analysis of Message Injection in Stream Cipher-Based Hash Functions.
Yuto Nakano
Carlos Cid
Kazuhide Fukushima
Shinsaku Kiyomoto
2011
conf/icics
Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha.
Tsukasa Ishiguro
Shinsaku Kiyomoto
Yutaka Miyake
2010
conf/acisp
Side-Channel Analysis of the K2 Stream Cipher.
Matthew Henricksen
Wun-She Yap
Chee Hoo Yian
Shinsaku Kiyomoto
Toshiaki Tanaka
2010
conf/esorics
A User-Oriented Anonymization Mechanism for Public Data.
Shinsaku Kiyomoto
Toshiaki Tanaka
2010
conf/iwsec
Efficient Implementation of Pairing on BREW Mobile Phones.
Tadashi Iyama
Shinsaku Kiyomoto
Kazuhide Fukushima
Toshiaki Tanaka
Tsuyoshi Takagi
2009
conf/sec
How to Bootstrap Security for Ad-Hoc Network: Revisited.
Wook Shin
Carl A. Gunter
Shinsaku Kiyomoto
Kazuhide Fukushima
Toshiaki Tanaka
2009
conf/icics
The rakaposhi Stream Cipher.
Carlos Cid
Shinsaku Kiyomoto
Jun Kurihara
2008
conf/wisa
Ternary Subset Difference Method and Its Quantitative Analysis.
Kazuhide Fukushima
Shinsaku Kiyomoto
Toshiaki Tanaka
Kouichi Sakurai
2007
conf/wisa
Efficient Implementation of the Pairing on Mobilephones Using BREW.
Motoi Yoshitomi
Tsuyoshi Takagi
Shinsaku Kiyomoto
Toshiaki Tanaka
Coauthors
Andrea Caforio
(1)
Anh The Ta
(2)
Anirban Basu
(3)
Atsushi Takayasu
(2)
Carl A. Gunter
(1)
Carlos Cid
(2)
Chee Hoo Yian
(1)
Dung Hoang Duong
(8)
Elli Fragkaki
(1)
Fuchun Guo
(4)
Fukang Liu
(2)
Goichiro Hanaoka
(1)
Gökhan Bal
(1)
Haruo Takasaki
(1)
Hiroki Okada
(3)
Hiroshi Ito
(1)
Huy Quoc Le
(2)
Hwajung Seo
(1)
Jaideep Vaidya
(1)
Jassim Aljuraidan
(1)
Jetzabel M. Serna
(1)
Jon Crowcroft
(1)
Juan Camilo Corena
(2)
Jun Kurihara
(1)
Kai Rannenberg
(1)
Kazuhide Fukushima
(23)
Kazuo Hashimoto
(1)
Kento Hasegawa
(2)
Kirill Morozov
(1)
Kohei Nozawa
(1)
Kosei Sakamoto
(2)
Kouichi Sakurai
(2)
Limin Jia
(1)
Lujo Bauer
(1)
Markus Tschersich
(1)
Masahiro Hiji
(2)
Masahito Ishizaka
(2)
Matt Henricksen
(1)
Matthew Henricksen
(1)
Mei Jiang
(1)
Michael Stroucken
(1)
Mohammad Shahriar Rahman
(1)
Momonari Kudo
(1)
Motoi Yoshitomi
(1)
Naofumi Homma
(1)
Nobuyuki Takeuchi
(1)
Nozomu Togawa
(2)
Partha Sarathi Roy
(2)
Priyanka Dutta
(2)
Ravi Anand
(1)
Rei Ueno
(1)
Rui Xu
(3)
Sabyasachi Dutta
(1)
Sebastian Pape
(1)
Seira Hidano
(6)
Shinsaku Kiyomoto
(43)
Shintaro Narisada
(2)
Shoichiro Sasaki
(1)
Shuichi Katsumata
(1)
Shusaku Uemura
(1)
Subhadeep Banik
(1)
Sze Ling Yeo
(1)
Tadashi Iyama
(1)
Takafumi Aoki
(1)
Takanori Isobe
(2)
Takao Murakami
(1)
Takuo Suganuma
(2)
Thanh Xuan Khuc
(3)
Toru Nakamura
(3)
Toshiaki Tanaka
(6)
Toshihiro Uchibayashi
(2)
Toshihiro Yamauchi
(1)
Tsukasa Ishiguro
(2)
Tsuyoshi Takagi
(9)
Tuong Ngoc Nguyen
(3)
Wataru Kawai
(1)
Welderufael B. Tesfay
(1)
Willy Susilo
(8)
Wook Shin
(1)
Wun-She Yap
(1)
Ye Yuan
(1)
Yuki Matsumoto
(1)
Yung Shin Van Der Sype
(1)
Yutaka Miyake
(4)
Yuto Nakano
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to