Zobrazeno 1 - 10
of 84
pro vyhledávání: '"Kazuhide Fukushima"'
Publikováno v:
IEEE Access, Vol 11, Pp 99836-99846 (2023)
This paper introduces CompSkipDSGD, a new algorithm for distributed stochastic gradient descent that aims to improve communication efficiency by compressing and selectively skipping communication. In addition to compression, CompSkipDSGD allows both
Externí odkaz:
https://doaj.org/article/87a21c388206409fb328945e05797623
Publikováno v:
IET Information Security, Vol 15, Iss 4, Pp 267-281 (2021)
Abstract The lattice‐based encryption scheme has high efficiency and reliability, and it can be run on small devices with limited memory capacity and computational resources such as sensor nodes or smart cards. The first implementation is presented
Externí odkaz:
https://doaj.org/article/5727eae73af24b4ca236c06072b6ec53
Autor:
Huy Quoc Le, Bay Vo, Dung Hoang Duong, Willy Susilo, Ngoc T. Le, Kazuhide Fukushima, Shinsaku Kiyomoto
Publikováno v:
IEEE Access, Vol 9, Pp 84739-84755 (2021)
Linkable ring signatures is a useful cryptographic tool for constructing applications such as ones relative to electronic voting (e-voting), digital cashes (e-cashes) as well as cloud computing. Equipped with linkable ring signatures, e-voting, e-cas
Externí odkaz:
https://doaj.org/article/39d12e7cca6a4f8bb8968e65d133b19a
Autor:
Chihiro Tomita, Makoto Takita, Kazuhide Fukushima, Yuto Nakano, Yoshiaki Shiraishi, Masakatu Morii
Publikováno v:
Sensors, Vol 22, Iss 9, p 3586 (2022)
Concomitant with the increasing density of semiconductors, various attacks that threaten the integrity and security of dynamic random access memory (DRAM) have been devised. Among these, a side-channel attack called RAMBleed is a prolific one that ut
Externí odkaz:
https://doaj.org/article/073fc9d866ab4c33a095dbd64b686cf6
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :241-252
Autor:
Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa
Publikováno v:
IEEE Transactions on Computers. :1-13
In the fourth industrial revolution, securing the protection of the supply chain has become an ever-growing concern. One such cyber threat is a hardware Trojan (HT), a malicious modification to an IC. HTs are often identified in the hardware manufact
Autor:
Partha Sarathi Roy, Dung Hoang Duong, Willy Susilo, Arnaud Sipasseuth, Kazuhide Fukushima, Shinsaku Kiyomoto
Publikováno v:
Theoretical Computer Science. 929:124-139
Public key encryption with equality test (PKEET) supports to check whether two ciphertexts encrypted under different public keys contain the same message or not. PKEET has many interesting applications such as keyword search on encrypted data, encryp
Autor:
Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth
Publikováno v:
Theoretical Computer Science. 905:31-53
Publikováno v:
Journal of Cryptographic Engineering
Journal of Cryptographic Engineering, 2023, Journal of Cryptographic Engineering (2023), ⟨10.1007/s13389-023-00309-1⟩
Journal of Cryptographic Engineering, 2023, Journal of Cryptographic Engineering (2023), ⟨10.1007/s13389-023-00309-1⟩
International audience; A recent work of Sipasseuth, Plantard and Susilo proposed to accelerate lattice-based signature verifications and compress public key storage at the cost of a precomputation on a public key. This first approach, which focused
Publikováno v:
Proceedings of the 15th International Conference on Agents and Artificial Intelligence.