Original Papers- MIZUKI Takaaki -
number of results to view: what to display: sort:
total:87
[2019]
1.Card-Based Protocol Against Actively Revealing Card Attack.[Theory and Practice of Natural Computing (TPNC 2019), Lecture Notes in Computer Science,11934,(2019),95-106]Ken Takashima, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
10.1007/978-3-030-34500-6_6
2.A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.[Information Security Practice and Experience (ISPEC 2019), Lecture Notes in Computer Science,11879,(2019),135-151]Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, and Hideaki Sone
10.1007/978-3-030-34339-2_8
3.Card-based Physical Zero-knowledge Proof for Kakuro.[IEICE Trans. Fundamentals,102-A(9),(2019),1072-1078]Daiki Miyahara, Tatsuya Sasaki, Takaaki Mizuki, and Hideaki Sone
10.1587/transfun.E102.A.1072
4.Interactive Physical Zero-Knowledge Proof for Norinori.[Computing and Combinatorics (COCOON 2019), Lecture Notes in Computer Science,11653,(2019),166-177]Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, and Hideaki Sone
10.1007/978-3-030-26176-4_14
5.Light Cryptography.[Information Security Education (WISE 2019), IFIP Advances in Information and Communication Technology,557,(2019),89-101]Pascal Lafourcade, Takaaki Mizuki, Atsuki Nagao, and Kazumasa Shinagawa
10.1007/978-3-030-23451-5_7
6.Secure Computation of Any Boolean Function Based on Any Deck of Cards.[Frontiers in Algorithmics (FAW 2019), Lecture Notes in Computer Science,11458,(2019),63-75]1.Kazumasa Shinagawa and Takaaki Mizuki
10.1007/978-3-030-18126-0_6
7.The Six-Card Trick: Secure Computation of Three-Input Equality.[Information Security and Cryptology (ICISC 2018), Lecture Notes in Computer Science,11396,(2019),123-131]Kazumasa Shinagawa and Takaaki Mizuki
10.1007/978-3-030-12146-4_8
[2018]
8.Multi-party Computation Based on Physical Coins.[Theory and Practice of Natural Computing (TPNC 2018), Lecture Notes in Computer Science,11324,(2018),87-98]Yuichi Komano and Takaaki Mizuki
10.1007/978-3-030-04070-3_7
9.Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol.[Combinatorial Optimization and Applications (COCOA 2018), Lecture Notes in Computer Science,11346,(2018),246-261]Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
10.1007/978-3-030-04651-4_17
10.Physical Zero-Knowledge Proof for Makaro.[Stabilization, Safety, and Security of Distributed Systems (SSS 2018), Lecture Notes in Computer Science,11201,(2018),111-125]Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki, Kazumasa Shinagawa, and Hideaki Sone
10.1007/978-3-030-03232-6_8
11.Pile-Shifting Scramble for Card-Based Protocols.[IEICE Trans. Fundamentals,E101-A(9),(2018),1494-1502]Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
10.1587/transfun.E101.A.1494
12.Information Leakage Threats for Cryptographic Devices Using IEMI and EM Emission.[IEEE Transactions on Electromagnetic Compatibility,vol., no., pp.-, 2018.,60(5),(2018),1340-1347]Ko Nakamura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
10.1109/TEMC.2017.2766139
13.Analysis of Information Leakage Due to Operative Errors in Card-Based Protocols.[Combinatorial Algorithms (IWOCA 2018), Lecture Notes in Computer Science,10979,(2018),250-262]Takaaki Mizuki and Yuichi Komano
10.1007/978-3-319-94667-2_21
14.Five-Card AND Protocol in Committed Format Using Only Practical Shuffles.[Proceedings of the 5rd ACM International Workshop on ASIA Public-Key Cryptography (APKC '18),,(2018),3-8]Yuta Abe, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
10.1145/3197507.3197510
15.Card-Based Zero-Knowledge Proof for Sudoku.[Fun with Algorithms (FUN 2018), Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik,100,(2018),29:1-29:10]Tatsuya Sasaki, Takaaki Mizuki, and Hideaki Sone
10.4230/LIPIcs.FUN.2018.29
16.Card-based Protocols Using Triangle Cards.[Fun with Algorithms (FUN 2018), Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik,100,(2018),31:1-31:13]Kazumasa Shinagawa and Takaaki Mizuki
10.4230/LIPIcs.FUN.2018.31
17.Analyzing Execution Time of Card-Based Protocols.[Unconventional Computation and Natural Computation (UCNC 2018), Lecture Notes in Computer Science,10867,(2018),145-158]Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
10.1007/978-3-319-92435-9_11
18.Secret Key Amplification from Uniformly Leaked Key Exchange Complete Graph.[Algorithms and Computation (WALCOM 2018), Lecture Notes in Computer Science,10755,(2018),20-31]Tatsuya Sasaki, Bateh Mathias Agbor, Shingo Masuda, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
10.1007/978-3-319-75172-6_3
19.Card-Based Protocols Using Unequal Division Shuffles.[Soft Computing,22(2),(2018),361-371]Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
10.1007/s00500-017-2858-2
[2017]
20.The Minimum Number of Cards in Practical Card-Based Protocols.[Advances in Cryptology -- ASIACRYPT 2017, Part III, Lecture Notes in Computer Science,10626,(2017),126-155]Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
10.1007/978-3-319-70700-6_5
Pageļ¼š [1] [2] [3] [4] [5] [next]
BackTop
copyright(c)2005 Tohoku University