Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Tadanori Teruya"'
Autor:
Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka
Publikováno v:
IEEE Access, Vol 7, Pp 139021-139034 (2019)
A privacy-preserving framework in which a computational resource provider receives encrypted data from a client and returns prediction results without decrypting the data, i.e., oblivious neural network or encrypted prediction, has been studied in ma
Externí odkaz:
https://doaj.org/article/0b6f5f7b90144a00be9f62d9ecbb6ace
Autor:
Tadanori Teruya
Publikováno v:
PLoS ONE, Vol 14, Iss 2, p e0212310 (2019)
Wang et al. proposed a method for obtaining elliptic curves with embedding degree 1 for securing critical infrastructures, and presented several elliptic curves generated by their method with torsion points of 160 bits and 189 bits orders. They also
Externí odkaz:
https://doaj.org/article/fa4de95c80404c4ba94eb68aa76a2f49
Autor:
Ryu ISHII, Kyosuke YAMASHITA, Yusuke SAKAI, Tadanori TERUYA, Takahiro MATSUDA, Goichiro HANAOKA, Kanta MATSUURA, Tsutomu MATSUMOTO
Publikováno v:
IEICE Transactions on Information and Systems. :1845-1856
Autor:
Kyosuke YAMASHITA, Ryu ISHII, Yusuke SAKAI, Tadanori TERUYA, Takahiro MATSUDA, Goichiro HANAOKA, Kanta MATSUURA, Tsutomu MATSUMOTO
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.
Autor:
Tadanori Teruya
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :104-120
Autor:
Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Oba Tatsumi, Nuttapong Attrapadung, Naohisa Nishida, Yuji Unagami, Jason Paul Cruz, Naoto Yanai
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1367-1380
Autor:
Tadanori Teruya, Nuttapong Attrapadung, Koji Nuida, Goichiro Hanaoka, Satsuya Ohata, Hiraku Morita
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :21-32
Autor:
Ryu Ishii, Kyosuke Yamashita, Zihao Song, Yusuke Sakai, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto
Publikováno v:
Attacks and Defenses for the Internet-of-Things ISBN: 9783031213106
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ac8be9a8a67e969413d3c8486e9bb841
https://doi.org/10.1007/978-3-031-21311-3_3
https://doi.org/10.1007/978-3-031-21311-3_3
Autor:
Hiraku Morita, Goichiro Hanaoaka, Nuttapong Attrapadung, Kazunari Tozawa, Takahiro Matsuda, Tadanori Teruya, Kazuma Ohara, Jacob C. N. Schuldt
Publikováno v:
CCS
In this paper we propose efficient two-party protocols for obliviously applying a (possibly random) linear group action to a data set. Our protocols capture various applications such as oblivious shuffles, circular shifts, matrix multiplications, to
Autor:
Takahiro Matsuda, Tadanori Teruya, Kanta Matsuura, Kyosuke Yamashita, Yusuke Sakai, Tsutomu Matsumoto, Goichiro Hanaoka, Ryu Ishii
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030816445
ACNS Workshops
ACNS Workshops
Aggregate signature schemes enable us to aggregate multiple signatures into a single short signature. One of its typical applications is sensor networks, where a large number of users and devices measure their environments, create signatures to ensur
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::afe9e1d63b313ca325ddde04524d860f
https://doi.org/10.1007/978-3-030-81645-2_22
https://doi.org/10.1007/978-3-030-81645-2_22