default search action
Kazuhide Fukushima
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j38]Huynh Phuong Thanh Nguyen, Kento Hasegawa, Kazuhide Fukushima, Razvan Beuran:
PenGym: Realistic training environment for reinforcement learning pentesting agents. Comput. Secur. 148: 104140 (2025) - 2024
- [j37]Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide:
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 234-247 (2024) - [j36]Toru Nakamura, Hiroki Okada, Kazuhide Fukushima, Takamasa Isohara:
Private Verification in Multi-stakeholder Environment and its Application to Stable Matching. SN Comput. Sci. 5(3): 309 (2024) - [c83]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems. ACISP (2) 2024: 269-289 - [c82]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Threshold Ring Signatures with Accountability. ACISP (1) 2024: 368-388 - [c81]Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:
AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning. CODASPY 2024: 325-336 - [c80]Kento Hasegawa, Katsutoshi Hanahara, Hiroshi Sugisaki, Minoru Kozu, Kazuhide Fukushima, Yosuke Murakami, Shinsaku Kiyomoto:
Vulnerability Information Sharing Platform for Securing Hardware Supply Chains. ICISSP 2024: 403-410 - [c79]Huynh Phuong Thanh Nguyen, Zhi Chen, Kento Hasegawa, Kazuhide Fukushima, Razvan Beuran:
PenGym: Pentesting Training Framework for Reinforcement Learning Agents. ICISSP 2024: 498-509 - [c78]Ryo Meguro, Hiroya Kato, Shintaro Narisada, Seira Hidano, Kazuhide Fukushima, Takuo Suganuma, Masahiro Hiji:
Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks. ICISSP 2024: 510-521 - [c77]Shusaku Uemura, Kazuhide Fukushima:
Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data. ICISSP 2024: 534-545 - [c76]Hibiki Nakanishi, Kota Hisafuru, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Initial Seeds Generation Using LLM for IoT Device Fuzzing. IOTSMS 2024: 5-10 - [c75]Yuka Ikegami, Ryotaro Negishi, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Prioritizing Vulnerability Assessment Items Using LLM Based on IoT Device Documentations. IOTSMS 2024: 147-152 - [c74]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Shrinkable Ring Signatures: It Wasn't Them! ISPEC 2024: 75-93 - [c73]Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima:
Solving McEliece-1409 in One Day - Cryptanalysis with the Improved BJMM Algorithm. ISC (2) 2024: 3-23 - [c72]Hiroya Kato, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:
EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning. SaTML 2024: 309-326 - [c71]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Takashi Nishide:
Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE. WAHC@CCS 2024: 1-10 - [i19]Shintaro Narisada, Shusaku Uemura, Hiroki Okada, Hiroki Furue, Yusuke Aikawa, Kazuhide Fukushima:
Revisiting the May-Meurer-Thomae Algorithm - Solving McEliece-1409 in One Day. IACR Cryptol. ePrint Arch. 2024: 393 (2024) - [i18]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Takashi Nishide:
Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE. IACR Cryptol. ePrint Arch. 2024: 1114 (2024) - 2023
- [j35]Tran Thi Phuong, Le Trieu Phong, Kazuhide Fukushima:
Distributed Stochastic Gradient Descent With Compressed and Skipped Communication. IEEE Access 11: 99836-99846 (2023) - [j34]Shintaro Narisada, Kazuhide Fukushima, Shinsaku Kiyomoto:
Multiparallel MMT: Faster ISD Algorithm Solving High-Dimensional Syndrome Decoding Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 241-252 (2023) - [j33]Masahito Ishizaka, Kazuhide Fukushima:
Wildcarded identity-based ring signatures based on linearly homomorphic signatures. J. Inf. Secur. Appl. 75: 103499 (2023) - [j32]Jean-Claude Bajard, Kazuhide Fukushima, Thomas Plantard, Arnaud Sipasseuth:
Fast verification and public key storage optimization for unstructured lattice-based signatures. J. Cryptogr. Eng. 13(3): 373-388 (2023) - [c70]Masahito Ishizaka, Kazuhide Fukushima:
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications. ACISP 2023: 291-319 - [c69]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen:
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations. ACL (Findings) 2023: 5090-5104 - [c68]Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. ACNS (1) 2023: 695-724 - [c67]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Accountable Ring Signatures in the Plain Model. Inscrypt (1) 2023: 23-43 - [c66]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Ring Signatures with Post-Quantum Security in Standard Model. Inscrypt (1) 2023: 65-84 - [c65]Ravi Anand, Subhadeep Banik, Andrea Caforio, Kazuhide Fukushima, Takanori Isobe, Shinsaku Kiyomoto, Fukang Liu, Yuto Nakano, Kosei Sakamoto, Nobuyuki Takeuchi:
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation. ESORICS (1) 2023: 229-248 - [c64]Shintaro Narisada, Seira Hidano, Kazuhide Fukushima:
Fully Hidden Dynamic Trigger Backdoor Attacks. ICAART (3) 2023: 81-91 - [c63]Toru Nakamura, Hiroki Okada, Kazuhide Fukushima, Takamasa Isohara:
Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching. ICEIS (1) 2023: 768-775 - [c62]Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:
Automating XSS Vulnerability Testing Using Reinforcement Learning. ICISSP 2023: 70-80 - [c61]Shintaro Narisada, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto:
Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine. ICISSP 2023: 329-338 - [c60]Hiroki Okada, Kazuhide Fukushima:
Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite. ICISSP 2023: 366-372 - [c59]Hiroki Okada, Kazuhide Fukushima:
SoK: Towards CCA Secure Fully Homomorphic Encryption. SECRYPT 2023: 793-798 - [c58]Thanh Xuan Khuc, Anh The Ta, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems. SPACE 2023: 214-241 - [c57]Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Membership Inference Attacks against GNN-based Hardware Trojan Detection. TrustCom 2023: 1222-1229 - [c56]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide:
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation. WAHC@CCS 2023: 1-9 - [i17]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen:
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations. CoRR abs/2306.01273 (2023) - [i16]Hiroya Kato, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima:
EdgePruner: Poisoned Edge Pruning in Graph Contrastive Learning. CoRR abs/2312.07022 (2023) - [i15]Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide:
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications. IACR Cryptol. ePrint Arch. 2023: 366 (2023) - [i14]Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. IACR Cryptol. ePrint Arch. 2023: 479 (2023) - [i13]Masahito Ishizaka, Kazuhide Fukushima:
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications. IACR Cryptol. ePrint Arch. 2023: 746 (2023) - [i12]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide:
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation. IACR Cryptol. ePrint Arch. 2023: 1467 (2023) - 2022
- [j31]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 pp.1219-1234]. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(2): 130 (2022) - [j30]Chihiro Tomita, Makoto Takita, Kazuhide Fukushima, Yuto Nakano, Yoshiaki Shiraishi, Masakatu Morii:
Extracting the Secrets of OpenSSL with RAMBleed. Sensors 22(9): 3586 (2022) - [j29]Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth:
Chosen-ciphertext lattice-based public key encryption with equality test in standard model. Theor. Comput. Sci. 905: 31-53 (2022) - [j28]Partha Sarathi Roy, Dung Hoang Duong, Willy Susilo, Arnaud Sipasseuth, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model. Theor. Comput. Sci. 929: 124-139 (2022) - [j27]Jean-Claude Bajard, Kazuhide Fukushima, Thomas Plantard, Arnaud Sipasseuth:
Generating Very Large RNS Bases. IEEE Trans. Emerg. Top. Comput. 10(3): 1289-1301 (2022) - [c55]Jean-Claude Bajard, Kazuhide Fukushima, Thomas Plantard, Arnaud Sipasseuth:
Generating Very Large RNS Bases. ARITH 2022: 102 - [c54]Priyanka Dutta, Mei Jiang, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security. AsiaCCS 2022: 408-422 - [c53]Hoang-Quoc Nguyen-Son, Huy Quang Ung, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion. EMNLP (Findings) 2022: 2903-2913 - [c52]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures from Lattices. ESORICS (2) 2022: 447-466 - [c51]Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto:
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. ICISC 2022: 337-362 - [c50]Masahito Ishizaka, Kazuhide Fukushima:
Attribute-Based Signatures for Range of Inner Product and Its Applications. ICISC 2022: 382-407 - [c49]Kazuki Yamashita, Tomohiro Kato, Kento Hasegawa, Seira Hidano, Kazuhide Fukushima, Nozomu Togawa:
Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists. IOLTS 2022: 1-7 - [c48]Priyanka Dutta, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices. ProvSec 2022: 121-136 - [c47]Kazuhide Fukushima, Hiroki Okada, Sofiane Takarabt, Amina Korchi, Meziane Hamoud, Khaled Karray, Youssef Souissy, Sylvain Guilley:
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature. SECRYPT 2022: 701-706 - [i11]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures From Lattices. IACR Cryptol. ePrint Arch. 2022: 1070 (2022) - [i10]Masahito Ishizaka, Kazuhide Fukushima:
Attribute-Based Signatures for Range of Inner Product and Its Applications. IACR Cryptol. ePrint Arch. 2022: 1451 (2022) - 2021
- [j26]Huy Quoc Le, Bay Vo, Dung Hoang Duong, Willy Susilo, Ngoc-Thuy Le, Kazuhide Fukushima, Shinsaku Kiyomoto:
Identity-Based Linkable Ring Signatures From Lattices. IEEE Access 9: 84739-84755 (2021) - [j25]Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based signcryption with equality test in standard model. Comput. Stand. Interfaces 76: 103515 (2021) - [j24]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto:
Faster Rotation-Based Gauss Sieve for Solving the SVP on General Ideal Lattices. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 79-88 (2021) - [j23]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1219-1234 (2021) - [j22]Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform. IET Inf. Secur. 15(4): 267-281 (2021) - [c46]Anh The Ta, Thanh Xuan Khuc, Tuong Ngoc Nguyen, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signature for Blockchain Privacy Protection. ACISP 2021: 391-407 - [c45]Jean-Claude Bajard, Kazuhide Fukushima, Shinsaku Kiyomoto, Thomas Plantard, Arnaud Sipasseuth, Willy Susilo:
Generating Residue Number System Bases. ARITH 2021: 86-93 - [c44]Shintaro Narisada, Kazuhide Fukushima, Shinsaku Kiyomoto:
Fast GPU Implementation of Dumer's Algorithm Solving the Syndrome Decoding Problem. ISPA/BDCloud/SocialCom/SustainCom 2021: 971-977 - [c43]Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi:
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem. IWSEC 2021: 23-41 - [c42]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text. PACLIC 2021: 11-20 - [i9]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text. CoRR abs/2110.05748 (2021) - [i8]Kento Hasegawa, Kazuki Yamashita, Seira Hidano, Kazuhide Fukushima, Kazuo Hashimoto, Nozomu Togawa:
Node-wise Hardware Trojan Detection Based on Graph Learning. CoRR abs/2112.02213 (2021) - [i7]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR problem. IACR Cryptol. ePrint Arch. 2021: 1699 (2021) - 2020
- [j21]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 173-182 (2020) - [c41]Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon:
Feasibility study of a camera-based PUF in a realistic scenario. ARES 2020: 31:1-31:6 - [c40]Rei Ueno, Kazuhide Fukushima, Yuto Nakano, Shinsaku Kiyomoto, Naofumi Homma:
Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes. COSADE 2020: 43-67 - [c39]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. ICICS 2020: 73-90 - [i6]Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth:
Lattice-based public key encryption with equality test in standard model, revisited. CoRR abs/2005.03178 (2020) - [i5]Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Arnaud Sipasseuth, Willy Susilo:
Lattice-based public key encryption with equality test supporting flexible authorization in standard model. CoRR abs/2005.05308 (2020) - [i4]Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based Signcryption with Equality Test in Standard Model. CoRR abs/2012.15423 (2020)
2010 – 2019
- 2019
- [c38]Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Willy Susilo:
A Lattice-Based Public Key Encryption with Equality Test in Standard Model. ACISP 2019: 138-155 - [c37]Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. ICISSP 2019: 67-74 - [c36]Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device. ICISSP (Revised Selected Papers) 2019: 74-92 - [c35]Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Security Analysis and Efficient Implementation of Code-based Signature Schemes. ICISSP 2019: 213-220 - [c34]Kazuhide Fukushima, Ayumu Yoshimura, Shinsaku Kiyomoto, Norikazu Yamasaki:
Evaluation of Software PUF Based on Gyroscope. ISPEC 2019: 232-247 - [c33]Sabyasachi Dutta, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. WISA 2019: 180-191 - [i3]Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto:
Evaluation of Code-based Signature Schemes. IACR Cryptol. ePrint Arch. 2019: 544 (2019) - 2018
- [j20]Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. Secur. Commun. Networks 2018: 9846168:1-9846168:14 (2018) - [c32]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. ICISC 2018: 196-214 - [c31]Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. ISPEC 2018: 578-594 - [i2]Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform. IACR Cryptol. ePrint Arch. 2018: 1238 (2018) - 2017
- [c30]Rui Xu, Sze Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen:
An Experimental Study of the BDD Approach for the Search LWE Problem. ACNS 2017: 253-272 - [c29]Wataru Kawai, Rei Ueno, Naofumi Homma, Takafumi Aoki, Kazuhide Fukushima, Shinsaku Kiyomoto:
Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers. EuroS&P Workshops 2017: 113-121 - [c28]Ye Yuan, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card. HOST 2017: 47-50 - [c27]Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto:
White-box Implementation of Stream Cipher. ICISSP 2017: 263-269 - [c26]Anirban Basu, Mohammad Shahriar Rahman, Rui Xu, Kazuhide Fukushima, Shinsaku Kiyomoto:
VIGraph - A Framework for Verifiable Information. IFIPTM 2017: 12-20 - [c25]Kazuhide Fukushima, Rui Xu, Shinsaku Kiyomoto, Naofumi Homma:
Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure. TrustCom/BigDataSE/ICESS 2017: 1032-1037 - 2016
- [c24]Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto:
Sensor-based Wearable PUF. SECRYPT 2016: 207-214 - [c23]Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage:
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology. Trustcom/BigDataSE/ISPA 2016: 201-207 - 2014
- [j19]Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai:
Fast Implementation of KCipher-2 for Software and Hardware. IEICE Trans. Inf. Syst. 97-D(1): 43-52 (2014) - [j18]Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 157-166 (2014) - [j17]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Security issues on IT systems during disasters: a survey. J. Ambient Intell. Humaniz. Comput. 5(2): 173-185 (2014) - 2013
- [c22]Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure. COSADE 2013: 169-183 - [c21]Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). ESORICS 2013: 775-792 - 2012
- [j16]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Software Protection Combined with Tamper-Proof Device. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 213-222 (2012) - [j15]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Design of Categorization Mechanism for Disaster-Information-Gathering System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 21-34 (2012) - [c20]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Security-and-Privacy-Related Issues on IT Systems During Disasters. CD-ARES 2012: 445-459 - [c19]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Privacy Preservation of User History Graph. WISTP 2012: 87-96 - 2011
- [j14]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism. J. Internet Serv. Inf. Secur. 1(1): 4-17 (2011) - [j13]Wook Shin, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
AMY: Use your cell phone to create a protected personal network over devices. IEEE Trans. Consumer Electron. 57(1): 99-104 (2011) - [c18]Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto:
Analysis of Message Injection in Stream Cipher-Based Hash Functions. ACNS 2011: 498-513 - [c17]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Data Anonymity in Multi-Party Service Model. FGIT-SecTech 2011: 21-30 - [c16]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme. ICETE (Selected Papers) 2011: 233-248 - [c15]Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima:
MASHA - Low Cost Authentication with a New Stream Cipher. ISC 2011: 63-78 - [c14]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree. SECRYPT 2011: 37-49 - 2010
- [j12]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Improved Subset Difference Method with Ternary Tree. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2034-2044 (2010) - [c13]Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework. Security and Management 2010: 323-329 - [c12]Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi:
Efficient Implementation of Pairing on BREW Mobile Phones. IWSEC 2010: 326-336 - [c11]Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Small But Non-negligible Flaw in the Android Permission Scheme. POLICY 2010: 107-110 - [c10]Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework. SocialCom/PASSAT 2010: 944-951
2000 – 2009
- 2009
- [j11]Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
Design of Anonymous Attribute Authentication Mechanism. IEICE Trans. Commun. 92-B(4): 1112-1118 (2009) - [j10]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1808-1821 (2009) - [c9]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Obfuscation Mechanism in Conjunction with Tamper-Proof Module. CSE (2) 2009: 665-670 - [c8]Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin:
Offline Peer-to-Peer Broadcast with Anonymity. ICETE (Selected Papers) 2009: 174-185 - [c7]Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
How to Bootstrap Security for Ad-Hoc Network: Revisited. SEC 2009: 119-131 - [c6]Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin:
An Offline Peer-to-peer Broadcasting Scheme with Anonymity. SECRYPT 2009: 75-82 - [c5]Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima:
Privacy-Aware Location Database Service for Granular Queries. WISTP 2009: 28-37 - 2008
- [j9]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 127-138 (2008) - [j8]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Analysis of Program Obfuscation Schemes with Variable Encoding Technique. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 316-329 (2008) - [j7]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
On a Fast (k, n)-Threshold Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2365-2378 (2008) - [j6]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. Inf. Media Technol. 3(4): 788-799 (2008) - [j5]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. J. Inf. Process. 16: 130-141 (2008) - [c4]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. ISC 2008: 455-470 - [c3]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis. WISA 2008: 225-239 - [i1]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. IACR Cryptol. ePrint Arch. 2008: 409 (2008) - 2007
- [j4]Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Kouichi Sakurai:
On Effectiveness of Clock Control in Stream Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1780-1787 (2007) - [j3]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Design of τ-Gradual Key-Management Schemes for Mobile Content Distribution. Inf. Media Technol. 2(1): 356-367 (2007) - [j2]Kouichi Sakurai, Kazuhide Fukushima:
Actual Condition and Issues for Mobile Security System. J. Inf. Process. Syst. 3(2): 54-63 (2007) - 2006
- [j1]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
An Obfuscation Scheme Using Affine Transformation and Its Implementation. Inf. Media Technol. 1(2): 1094-1108 (2006) - [c2]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services. MDM 2006: 17 - 2003
- [c1]Kazuhide Fukushima, Kouichi Sakurai:
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. WISA 2003: 303-316
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint