Zobrazeno 1 - 10
of 70
pro vyhledávání: '"Koutarou, Suzuki"'
Publikováno v:
IEEE Access, Vol 11, Pp 24203-24215 (2023)
This study investigates two-sided matching and considers dynamic preference. In a stable matching problem, dynamic preference is a situation that often happens in real-world situations where the agent cannot express their preference with certainty. T
Externí odkaz:
https://doaj.org/article/ba62ff7451c74fc4adfc615e30af76e3
Publikováno v:
Nonlinear Theory and Its Applications, IEICE. 14:491-499
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :58-68
Publikováno v:
Information Security and Cryptology – ICISC 2021 ISBN: 9783031088957
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7a053ab05ddef6bea403fe7d0e14993d
https://doi.org/10.1007/978-3-031-08896-4_1
https://doi.org/10.1007/978-3-031-08896-4_1
Publikováno v:
2021 8th International Conference on Advanced Informatics: Concepts, Theory and Applications (ICAICTA).
Autor:
Masakiyo Sakano, Koutarou Suzuki
Publikováno v:
2020 7th International Conference on Advance Informatics: Concepts, Theory and Applications (ICAICTA).
Garbled circuit is the main tool to realize 2 party computation. Garbled circuit computes the output C (x, y) of the circuit C while hiding the inputs x, y. For 2 valued logic, there were many studies about the garbled circuit for Boolean circuit. Re
Autor:
Kai Kinoshita, Koutarou Suzuki
Publikováno v:
2020 7th International Conference on Advance Informatics: Concepts, Theory and Applications (ICAICTA).
A pairing is a bilinear map from two rational points on an elliptic curve to an element on a finite field. Pairing is necessary to construct the next generation cryptography including ID-based encryption, functional encryption etc. Many researchers h
Autor:
Ganma Kato, Koutarou Suzuki
Publikováno v:
2020 7th International Conference on Advance Informatics: Concepts, Theory and Applications (ICAICTA).
Isogeny-based cryptography is a promising candidate for post-quantum cryptography. CSIDH is a Diffie-Hellman key exchange protocol based on isogeny with a small public key size and is secure against a quantum computer. However, one of the problems is
Publikováno v:
Hinyokika kiyo. Acta urologica Japonica. 66(3)
A 75-year-old woman visited our hospital with left lumber pain and fever. Symptoms, and computed tomography imaging revealed left pyelonephritis. Then she was admitted to our hospital for treatment. She improved with tazobactam and piperacillin PIPC
Autor:
Kai Kinoshita, Koutarou Suzuki
Publikováno v:
Advances in Information and Computer Security ISBN: 9783030582074
IWSEC
IWSEC
In this paper, we present the efficient computation methods of \(\beta \) Weil pairing with the precomputation and multi-pairing techniques. We use the following two ideas to facilitate applying those techniques to \(\beta \) Weil pairing.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e20ee97d4a343f42982404fb7c9342c6
https://doi.org/10.1007/978-3-030-58208-1_15
https://doi.org/10.1007/978-3-030-58208-1_15