Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Takenobu Seito"'
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :394-405
Autor:
Takenobu SEITO
Publikováno v:
IEICE ESS Fundamentals Review. 16:196-204
Publikováno v:
2022 56th Annual Conference on Information Sciences and Systems (CISS).
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319968803
CRYPTO (2)
Lecture Notes in Computer Science
CRYPTO 2018, 38th Annual International Cryptology Conference
CRYPTO 2018, 38th Annual International Cryptology Conference, IACR, Aug 2018, Santa-Barbara, United States. ⟨10.1007/978-3-319-96881-0_21⟩
CRYPTO (2)
Lecture Notes in Computer Science
CRYPTO 2018, 38th Annual International Cryptology Conference
CRYPTO 2018, 38th Annual International Cryptology Conference, IACR, Aug 2018, Santa-Barbara, United States. ⟨10.1007/978-3-319-96881-0_21⟩
International audience; At Eurocrypt '10, Gama, Nguyen and Regev introduced lattice enumeration with extreme pruning: this algorithm is implemented in state-of-the-art lattice reduction software and used in challenge records. They showed that extreme
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::7796468459a73915ee7a287603e0f5da
https://doi.org/10.1007/978-3-319-96881-0_21
https://doi.org/10.1007/978-3-319-96881-0_21
Autor:
Takenobu Seito
Publikováno v:
The Role and Importance of Mathematics in Innovation ISBN: 9789811009617
Cryptographic algorithms are widely used for the purpose of ensuring security of data used in financial transactions (e.g., ATM transactions, the online banking). RSA has been one of the most widely used cryptographic algorithms. Currently, the migra
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::9e58df9fb4fdf3af4d3b589436e8a02f
https://doi.org/10.1007/978-981-10-0962-4_10
https://doi.org/10.1007/978-981-10-0962-4_10
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :2067-2085
A group signature scheme introduced by Chaum and Van Heyst allows a group member to sign messages anonymously on behalf of the group. However, in the case of a dispute, the identity of a signer of a group signature can be revealed only by a privilege
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642322839
ICITS
ICITS
In this paper, we study timed-release cryptography with information-theoretic security. As fundamental cryptographic primitives with information-theoretic security, we can consider key-agreement, encryption, and authentication codes. Therefore, in th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::efbafff99b80a2eb7c1935dedee71191
https://doi.org/10.1007/978-3-642-32284-6_10
https://doi.org/10.1007/978-3-642-32284-6_10
Autor:
Takenobu Seito, Junji Shikata
Publikováno v:
ITW
In this paper, we study key-agreement which realizes the protection against key-exposure problems in the information-theoretic security setting. And we newly define a model and security notions for information-theoretically secure key-insulated key-a
Publikováno v:
Progress in Cryptology – AFRICACRYPT 2010 ISBN: 9783642126772
AFRICACRYPT
AFRICACRYPT
Exposing a secret-key is one of the most disastrous threats in cryptographic protocols. The key-insulated security is proposed with the aim of realizing the protection against such key-exposure problems. In this paper, we study key-insulated authenti
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::965c22569f7b0678767b97094dc4bff9
https://doi.org/10.1007/978-3-642-12678-9_10
https://doi.org/10.1007/978-3-642-12678-9_10
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642102295
ICITS
ICITS
The blind signature scheme introduced by Chaum allows a user to obtain a valid signature for a message from a signer such that the message is kept secret for the signer. Blind signature schemes have mainly been studied from a viewpoint of computation
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::782eb75c2378807b43355f5341883a68
https://doi.org/10.1007/978-3-642-10230-1_2
https://doi.org/10.1007/978-3-642-10230-1_2