|
Publication List - KEISUKE TANAKA 2015 (29 / 367 entries)
Journal Paper
-
KEISUKE TANAKA,
Ai Ishida,
Keita Emura,
Goichiro Hanaoka,
Yusuke Sakai.
Disavowable Public Key Encryption with Non-Interactive Opening,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E98-A,
No. 12,
pp. 2446-2455,
Dec. 2015.
-
KEISUKE TANAKA,
Kousuke Nagumo.
検証委託署名に対する安全性について,
電子情報通信学会論文誌A,
Vol. J98-A,
No. 6,
pp. 417-426,
June 2015.
-
Yuyu Wang,
KEISUKE TANAKA.
Strongly simulation-extractable leakage-resilient NIZK,
International Journal of Information Security,
Volume 15,
No. 1,
pp. 67–79,
May 2015.
-
KEISUKE TANAKA,
Eiichiro Fujisaki,
AKINORI KAWACHI,
Ryo Nishimaki,
Kenji Yasunaga.
Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E98-A,
No. 3,
pp. 853-862,
Mar. 2015.
International Conference (Reviewed)
-
KEISUKE TANAKA,
Thanh Minh Ta.
Comparison of Watermarking Schemes Using Linear and Nonlinear Feature Matching,
2015 Seventh International Conference on Knowledge and Systems Engineering,
pp. 262-267,
Oct. 2015.
-
Yuyu Wang,
KEISUKE TANAKA.
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency,
Australasian Conference on Information Security and Privacy,
pp. 213-229,
June 2015.
-
KEISUKE TANAKA,
Ai Ishida,
Keita EMURA,
Goichiro HANAOKA,
Yusuke SAKAI .
Disavowable Public Key Encryption with Non-interactive Opening,
10th ACM Symposium on Information, Computer and Communications Security,
page 667,
Apr. 2015.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Takahiro Matsuda,
Goichiro Hanaoka.
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks,
International Conference on Information Security and Cryptology,
Vol. 8949,
pp. 84-100,
Mar. 2015.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Takahiro Matsuda,
Goichiro Hanaoka.
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption,
The Cryptographers’ Track at the RSA Conference 2015,
Topics in Cryptology –- CT-RSA 2015,
pp. 201-219,
Mar. 2015.
-
KEISUKE TANAKA,
Thanh Minh Ta.
Blind Watermarking using QIM and the Quantized SVD Domain based on the q-Logarithm Function,
10th International Conference on Computer Vision Theory and Applications,
Proceedings of the 10th International Conference on Computer Vision Theory and Applications,
Vol. 3,
pp. 14-25,
Mar. 2015.
Domestic Conference (Not reviewed / Unknown)
-
KEISUKE TANAKA,
Ai Ishida,
江村恵太,
花岡悟一郎,
坂井祐介.
非対話否認開示機能付き公開鍵暗号,
第7回 暗号及び情報セキュリティと数学の相関ワークショップ(CRISMATH 2015),
Dec. 2015.
-
KEISUKE TANAKA,
Ai Ishida,
江村恵太,
花岡悟一郎,
坂井祐介.
否認開示機能付き公開鍵暗号,
夏のLAシンポジウム2015,
July 2015.
-
KEISUKE TANAKA,
Soki Nishiyama,
Hiroyuki Tohyama.
疑似ランダム関数をもとにした効率的な秘匿回路の構成,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Yuuki Sawai,
Ryosuke Nakata.
属性ベース暗号の秘密鍵サイズの効率化,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Hajime Mimura,
Yuuki Sawai,
Ryosuke Nakata.
代理人再暗号化におけるCCA1安全性に対する再暗号化オラクルの導入,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Tomoyuki Komatsu.
効率的な万能算術回路の構成,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
松田隆宏,
花岡悟一郎.
1ビットProjection-KDM安全性の完備性,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Akira Yasuda,
Fuyuki Kitagawa,
松田隆宏,
花岡悟一郎.
IND-CCA1安全性を満たすN-ary完全準同型暗号,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Ai Ishida,
江村恵太,
花岡悟一郎,
坂井祐介.
否定に関する非対話ゼロ知識証明とその応用,
2014年度冬のLAシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Ryosuke Nakata.
サンプリングのためのストリーミングアルゴリズムとその応用,
2014年度冬のLAシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Tomoyuki Komatsu.
秘匿算術回路について,
2014年度冬のLAシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Ta Minh Thanh.
Blind watermarking using the quantized q-logarithm SVD domain,
The 32nd Symposium on Cryptography and Information Security,
Jan. 2015.
-
KEISUKE TANAKA,
Ryosuke Nakata.
Anonymity for Fully Homomorphic Encryption,
The 32nd Symposium on Cryptography and Information Security,
Jan. 2015.
-
KEISUKE TANAKA,
Maxim Jourenko,
Ryosuke Nakata.
Streaming Algorithms for Sampling from Discrete Gaussian Distributions,
The 32nd Symposium on Cryptography and Information Security,
Jan. 2015.
-
KEISUKE TANAKA,
Maxim Jourenko,
Ryosuke Nakata.
Streaming Signature,
The 32nd Symposium on Cryptography and Information Security,
Jan. 2015.
-
KEISUKE TANAKA,
Ta Minh Thanh.
Image watermarking based on the nonlinear scale spaces feature,
The 32nd Symposium on Cryptography and Information Security,
Jan. 2015.
-
KEISUKE TANAKA,
Ai Ishida,
江村恵太,
花岡悟一郎,
坂井祐介.
否認可能グループ署名,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Hiroyuki Tohyama,
Tomoyuki Komatsu.
回路のエンコード鍵を持つ秘匿回路,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
Other Publication
[ Save as BibTeX ]
[ Paper, Presentations, Books, Others, Degrees: Save as CSV
]
[ Patents: Save as CSV
]
|