


Остановите войну!
for scientists:


default search action
Shinsaku Kiyomoto
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j54]Shintaro Narisada, Kazuhide Fukushima, Shinsaku Kiyomoto:
Multiparallel MMT: Faster ISD Algorithm Solving High-Dimensional Syndrome Decoding Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 241-252 (2023) - [j53]Kento Hasegawa
, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa
:
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training. IEEE Trans. Computers 72(2): 333-345 (2023) - [c162]Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. ACNS (1) 2023: 695-724 - [c161]Shintaro Narisada, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto:
Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine. ICISSP 2023: 329-338 - [i22]Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. IACR Cryptol. ePrint Arch. 2023: 479 (2023) - 2022
- [j52]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 >pp.1219-1234]. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(2): 130 (2022) - [j51]Masahito Ishizaka, Shinsaku Kiyomoto:
Multi-dimensional sub/super-range signatures. J. Inf. Secur. Appl. 65: 103084 (2022) - [j50]Dung Hoang Duong, Partha Sarathi Roy
, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Arnaud Sipasseuth
:
Chosen-ciphertext lattice-based public key encryption with equality test in standard model. Theor. Comput. Sci. 905: 31-53 (2022) - [j49]Partha Sarathi Roy
, Dung Hoang Duong
, Willy Susilo
, Arnaud Sipasseuth
, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model. Theor. Comput. Sci. 929: 124-139 (2022) - [c160]Priyanka Dutta, Mei Jiang
, Dung Hoang Duong, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security. AsiaCCS 2022: 408-422 - [c159]Hoang-Quoc Nguyen-Son, Huy Quang Ung, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion. EMNLP (Findings) 2022: 2903-2913 - [c158]Tuong Ngoc Nguyen
, Anh The Ta
, Huy Quoc Le
, Dung Hoang Duong
, Willy Susilo
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Efficient Unique Ring Signatures from Lattices. ESORICS (2) 2022: 447-466 - [c157]Vanessa Bracamonte, Seira Hidano, Shinsaku Kiyomoto:
Effect of Errors on the Evaluation of Machine Learning Systems. VISIGRAPP (2: HUCAPP) 2022: 48-57 - [c156]Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto:
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. ICISC 2022: 337-362 - [c155]Vanessa Bracamonte, Seira Hidano, Toru Nakamura, Shinsaku Kiyomoto:
Feature-level Approach for the Evaluation of Text Classification Models. VISIGRAPP (3: IVAPP) 2022: 164-170 - [c154]Priyanka Dutta
, Dung Hoang Duong
, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices. ProvSec 2022: 121-136 - [i21]Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa:
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training. CoRR abs/2205.13702 (2022) - [i20]Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version). IACR Cryptol. ePrint Arch. 2022: 116 (2022) - [i19]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures From Lattices. IACR Cryptol. ePrint Arch. 2022: 1070 (2022) - 2021
- [j48]Huy Quoc Le
, Bay Vo
, Dung Hoang Duong
, Willy Susilo
, Ngoc T. Le, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Identity-Based Linkable Ring Signatures From Lattices. IEEE Access 9: 84739-84755 (2021) - [j47]Huy Quoc Le
, Dung Hoang Duong
, Partha Sarathi Roy
, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Lattice-based signcryption with equality test in standard model. Comput. Stand. Interfaces 76: 103515 (2021) - [j46]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Faster Rotation-Based Gauss Sieve for Solving the SVP on General Ideal Lattices. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 79-88 (2021) - [j45]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1219-1234 (2021) - [j44]Ye Yuan
, Kazuhide Fukushima
, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform. IET Inf. Secur. 15(4): 267-281 (2021) - [j43]Hiroki Okada
, Shinsaku Kiyomoto, Carlos Cid:
Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics. Inf. 12(8): 297 (2021) - [j42]Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa
:
Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. J. Inf. Process. 29: 236-246 (2021) - [j41]Tomoaki Mimoto, Masayuki Hashimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji:
Privacy Risk of Document Data and a Countermeasure Framework. J. Inf. Process. 29: 778-786 (2021) - [j40]Tran Phuong Thao
, Mohammad Shahriar Rahman
, Md. Zakirul Alam Bhuiyan, Ayumu Kubota, Shinsaku Kiyomoto, Kazumasa Omote:
Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data. IEEE Trans. Big Data 7(4): 703-716 (2021) - [j39]Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G. IACR Trans. Symmetric Cryptol. 2021(2): 1-30 (2021) - [c153]Anh The Ta, Thanh Xuan Khuc, Tuong Ngoc Nguyen, Huy Quoc Le, Dung Hoang Duong, Willy Susilo
, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Efficient Unique Ring Signature for Blockchain Privacy Protection. ACISP 2021: 391-407 - [c152]Jean-Claude Bajard, Kazuhide Fukushima
, Shinsaku Kiyomoto, Thomas Plantard, Arnaud Sipasseuth
, Willy Susilo
:
Generating Residue Number System Bases. ARITH 2021: 86-93 - [c151]Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi
, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Countermeasures Against Backdoor Attacks Towards Malware Detectors. CANS 2021: 295-314 - [c150]Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Nozomu Togawa:
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training. CANS 2021: 392-411 - [c149]Vanessa Bracamonte, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool. ICISSP 2021: 628-634 - [c148]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Vanessa Bracamonte, Shinsaku Kiyomoto, Rie Shigetomi Yamaguchi:
OPA2D: One-Pixel Attack, Detection, and Defense in Deep Neural Networks. IJCNN 2021: 1-10 - [c147]Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa:
Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists. IOLTS 2021: 1-4 - [c146]Shintaro Narisada, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Fast GPU Implementation of Dumer's Algorithm Solving the Syndrome Decoding Problem. ISPA/BDCloud/SocialCom/SustainCom 2021: 971-977 - [c145]Shusaku Uemura, Kazuhide Fukushima
, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi:
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem. IWSEC 2021: 23-41 - [c144]Toru Nakamura
, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi
:
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring. IWSEC 2021: 64-73 - [c143]Hoang-Quoc Nguyen-Son, Tran Thao Phuong, Seira Hidano, Ishita Gupta, Shinsaku Kiyomoto:
Machine Translated Text Detection Through Text Similarity with Round-Trip Translation. NAACL-HLT 2021: 5792-5797 - [c142]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima
, Shinsaku Kiyomoto:
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text. PACLIC 2021: 11-20 - [c141]Hiroki Okada
, Shinsaku Kiyomoto, Carlos Cid:
A Comparison of GKE Protocols based on SIDH. SECRYPT 2021: 507-514 - [c140]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Automatic Security Inspection Framework for Trustworthy Supply Chain. SERA 2021: 45-50 - [i18]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text. CoRR abs/2110.05748 (2021) - [i17]Masahito Ishizaka, Shinsaku Kiyomoto:
Multi-Dimensional Sub/Super-Range Signatures. IACR Cryptol. ePrint Arch. 2021: 698 (2021) - [i16]Masahito Ishizaka, Shinsaku Kiyomoto:
Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs. IACR Cryptol. ePrint Arch. 2021: 1170 (2021) - [i15]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR problem. IACR Cryptol. ePrint Arch. 2021: 1699 (2021) - 2020
- [j38]Hiroki Okada
, Atsushi Takayasu, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 173-182 (2020) - [j37]Tomoaki Mimoto, Seira Hidano, Shinsaku Kiyomoto, Atsuko Miyaji:
Anonymization Technique Based on SGD Matrix Factorization. IEICE Trans. Inf. Syst. 103-D(2): 299-308 (2020) - [j36]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques. Proc. Priv. Enhancing Technol. 2020(3): 264-283 (2020) - [j35]Mohammad Shahriar Rahman
, Abdullah Al Omar
, Md. Zakirul Alam Bhuiyan
, Anirban Basu, Shinsaku Kiyomoto, Guojun Wang
:
Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption. IEEE Trans. Engineering Management 67(4): 1476-1486 (2020) - [c139]Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon:
Feasibility study of a camera-based PUF in a realistic scenario. ARES 2020: 31:1-31:6 - [c138]Shintaro Narisada, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi
, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Stronger Targeted Poisoning Attacks Against Malware Detection. CANS 2020: 65-84 - [c137]Rei Ueno, Kazuhide Fukushima
, Yuto Nakano, Shinsaku Kiyomoto, Naofumi Homma:
Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes. COSADE 2020: 43-67 - [c136]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Consideration on Data Conformance Toward Building Trust in Supply Chain. EuCNC 2020: 128-132 - [c135]Hiroki Okada
, Atsushi Takayasu, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. ICICS 2020: 73-90 - [c134]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool. ICISSP 2020: 142-151 - [c133]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Effects of Explanatory Information on Privacy Policy Summarization Tool Perception. ICISSP (Revised Selected Papers) 2020: 156-177 - [c132]Seira Hidano, Shinsaku Kiyomoto:
Recommender Systems Robust to Data Poisoning using Trim Learning. ICISSP 2020: 721-724 - [c131]Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Signatures. ISC 2020: 20-38 - [c130]Hiroki Okada
, Shinsaku Kiyomoto, Carlos Cid:
Integerwise Functional Bootstrapping on TFHE. ISC 2020: 107-125 - [c129]Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji:
A Practical Privacy-Preserving Algorithm for Document Data. TrustCom 2020: 1376-1383 - [p2]Atsuko Miyaji, Shinsaku Kiyomoto, Katsuya Tanaka, Yoshifumi Nishida, Koji Kitamura:
Introduction. Security Infrastructure Technology for Integrated Utilization of Big Data 2020: 1-3 - [p1]Tomoaki Mimoto, Shinsaku Kiyomoto, Atsuko Miyaji:
Secure Data Management Technology. Security Infrastructure Technology for Integrated Utilization of Big Data 2020: 65-105 - [i14]Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth:
Lattice-based public key encryption with equality test in standard model, revisited. CoRR abs/2005.03178 (2020) - [i13]Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Arnaud Sipasseuth, Willy Susilo:
Lattice-based public key encryption with equality test supporting flexible authorization in standard model. CoRR abs/2005.05308 (2020) - [i12]Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo
, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based Signcryption with Equality Test in Standard Model. CoRR abs/2012.15423 (2020) - [i11]Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption. IACR Cryptol. ePrint Arch. 2020: 595 (2020) - [i10]Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Signatures. IACR Cryptol. ePrint Arch. 2020: 658 (2020)
2010 – 2019
- 2019
- [j34]Abdullah Al Omar
, Md. Zakirul Alam Bhuiyan
, Anirban Basu, Shinsaku Kiyomoto, Mohammad Shahriar Rahman
:
Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Future Gener. Comput. Syst. 95: 511-521 (2019) - [j33]Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt:
A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1048-1060 (2019) - [j32]Toru Nakamura, Andrew A. Adams, Kiyoshi Murata
, Shinsaku Kiyomoto, Nobuo Suzuki:
The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability. J. Inf. Process. 27: 787-801 (2019) - [c128]Dung Hoang Duong
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Partha Sarathi Roy
, Willy Susilo
:
A Lattice-Based Public Key Encryption with Equality Test in Standard Model. ACISP 2019: 138-155 - [c127]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Paragraphs by Matching Similar Words. CICLing (1) 2019: 521-532 - [c126]Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa
:
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 341-359 - [c125]Kazuhide Fukushima
, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. ICISSP 2019: 67-74 - [c124]Kazuhide Fukushima
, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device. ICISSP (Revised Selected Papers) 2019: 74-92 - [c123]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
User Study of the Effectiveness of a Privacy Policy Summarization Tool. ICISSP (Revised Selected Papers) 2019: 186-206 - [c122]Partha Sarathi Roy
, Kirill Morozov, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Security Analysis and Efficient Implementation of Code-based Signature Schemes. ICISSP 2019: 213-220 - [c121]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users. ICISSP 2019: 370-377 - [c120]Anirban Basu, Theo Dimitrakos, Yuto Nakano, Shinsaku Kiyomoto:
A Framework for Blockchain-Based Verification of Integrity and Authenticity. IFIPTM 2019: 196-208 - [c119]Hoang-Quoc Nguyen-Son, Tran Thao Phuong, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Text using Back Translation. INLG 2019: 189-197 - [c118]Kazuhide Fukushima
, Ayumu Yoshimura, Shinsaku Kiyomoto, Norikazu Yamasaki:
Evaluation of Software PUF Based on Gyroscope. ISPEC 2019: 232-247 - [c117]Shinsaku Kiyomoto, Yuto Nakano, Atsushi Waseda, Toru Nakamura, Masahito Ishizaka, Yasuaki Kobayashi:
A Framework for Secure and Trustworthy Data Management in Supply Chain. MobiWIS 2019: 148-159 - [c116]Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi
, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
On Embedding Backdoor in Malware Detectors Using Machine Learning. PST 2019: 1-5 - [c115]Sabyasachi Dutta, Partha Sarathi Roy
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. WISA 2019: 180-191 - [i9]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Paragraphs by Matching Similar Words. CoRR abs/1904.10641 (2019) - [i8]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Text using Back Translation. CoRR abs/1910.06558 (2019) - [i7]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Identifying Adversarial Sentences by Analyzing Text Complexity. CoRR abs/1912.08981 (2019) - [i6]Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto:
Evaluation of Code-based Signature Schemes. IACR Cryptol. ePrint Arch. 2019: 544 (2019) - 2018
- [j31]Seira Hidano, Takao Murakami, Shuichi Katsumata
, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes. IEICE Trans. Inf. Syst. 101-D(11): 2665-2676 (2018) - [j30]Mohammad Shahriar Rahman, Anirban Basu, Toru Nakamura, Haruo Takasaki, Shinsaku Kiyomoto:
PPM: Privacy Policy Manager for Home Energy Management System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(2): 42-56 (2018) - [j29]Ye Yuan
, Junting Xiao, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. Secur. Commun. Networks 2018: 9846168:1-9846168:14 (2018) - [c114]Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai:
Active Attack Against Oblivious RAM. AINA 2018: 744-751 - [c113]Sushmita Ruj
, Mohammad Shahriar Rahman
, Anirban Basu, Shinsaku Kiyomoto:
BlockStore: A Secure Decentralized Storage Framework on Blockchain. AINA 2018: 1096-1103 - [c112]Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel M. Serna:
PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation. IWSPA@CODASPY 2018: 15-21 - [c111]Keishiro Fukushima, Toru Nakamura, Daisuke Ikeda, Shinsaku Kiyomoto:
Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features. ICCSP 2018: 62-66 - [c110]Hiroki Okada
, Atsushi Takayasu
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. ICISC 2018: 196-214 - [c109]Seira Hidano, Yuto Nakano, Shinsaku Kiyomoto:
An Evaluation Framework for Fastest Oblivious RAM. IoTBDS 2018: 114-122 - [c108]Partha Sarathi Roy
, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima
, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. ISPEC 2018: 578-594 - [c107]Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji:
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data. PST 2018: 1-7 - [c106]Hiroki Okada
, Carlos Cid, Seira Hidano, Shinsaku Kiyomoto:
Linear Depth Integer-Wise Homomorphic Division. WISTP 2018: 91-106 - [c105]Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel M. Serna:
I Read but Don't Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR. WWW (Companion Volume) 2018: 163-166 - [i5]Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform. IACR Cryptol. ePrint Arch. 2018: 1238 (2018) - 2017
- [j28]Mohammad Shahriar Rahman
, Anirban Basu
, Shinsaku Kiyomoto, Md. Zakirul Alam Bhuiyan
:
Privacy-friendly secure bidding for smart grid demand-response. Inf. Sci. 379: 229-240 (2017) - [j27]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction. J. Internet Serv. Inf. Secur. 7(3): 1-16 (2017) - [c104]Rui Xu, Sze Ling Yeo, Kazuhide Fukushima
, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen:
An Experimental Study of the BDD Approach for the Search LWE Problem. ACNS 2017: 253-272 - [c103]Toru Nakamura, Welderufael B. Tesfay, Shinsaku Kiyomoto, Jetzabel M. Serna:
Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences. DPM/CBT@ESORICS 2017: 107-123 - [c102]Wataru Kawai, Rei Ueno, Naofumi Homma, Takafumi Aoki, Kazuhide Fukushima, Shinsaku Kiyomoto:
Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers. EuroS&P Workshops 2017: 113-121 - [c101]Adetokunbo Makanju, A. Nur Zincir-Heywood, Shinsaku Kiyomoto:
On evolutionary computation for moving target defense in software defined networks. GECCO (Companion) 2017: 287-288 - [c100]Ye Yuan
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card. HOST 2017: 47-50 - [c99]Toshihiro Uchibayashi
, Yuichi Hashi, Seira Hidano, Shinsaku Kiyomoto, Bernady O. Apduhan, Toru Abe, Takuo Suganuma, Masahiro Hiji
:
A Control Mechanism for Live Migration with Data Regulations Preservation. ICCSA (1) 2017: 509-522 - [c98]Anirban Basu
, Rui Xu, Juan Camilo Corena, Shinsaku Kiyomoto:
Hypercubes and Private Information Retrieval. ICICS 2017: 509-515 - [c97]