default search action
Shinsaku Kiyomoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c174]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems. ACISP (2) 2024: 269-289 - [c173]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Threshold Ring Signatures with Accountability. ACISP (1) 2024: 368-388 - [c172]Kento Hasegawa, Katsutoshi Hanahara, Hiroshi Sugisaki, Minoru Kozu, Kazuhide Fukushima, Yosuke Murakami, Shinsaku Kiyomoto:
Vulnerability Information Sharing Platform for Securing Hardware Supply Chains. ICISSP 2024: 403-410 - [c171]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Shrinkable Ring Signatures: It Wasn't Them! ISPEC 2024: 75-93 - [c170]Tomoaki Mimoto, Yuta Gempei, Kentaro Kita, Takamasa Isohara, Shinsaku Kiyomoto, Toshiaki Tanaka:
Linkage Between CVE and ATT&CK with Public Information. SECRYPT 2024: 655-660 - 2023
- [j59]Shintaro Narisada, Kazuhide Fukushima, Shinsaku Kiyomoto:
Multiparallel MMT: Faster ISD Algorithm Solving High-Dimensional Syndrome Decoding Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 241-252 (2023) - [j58]Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa:
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training. IEEE Trans. Computers 72(2): 333-345 (2023) - [c169]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen:
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations. ACL (Findings) 2023: 5090-5104 - [c168]Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. ACNS (1) 2023: 695-724 - [c167]Thanh Xuan Khuc, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Accountable Ring Signatures in the Plain Model. Inscrypt (1) 2023: 23-43 - [c166]Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Compact Ring Signatures with Post-Quantum Security in Standard Model. Inscrypt (1) 2023: 65-84 - [c165]Ravi Anand, Subhadeep Banik, Andrea Caforio, Kazuhide Fukushima, Takanori Isobe, Shinsaku Kiyomoto, Fukang Liu, Yuto Nakano, Kosei Sakamoto, Nobuyuki Takeuchi:
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation. ESORICS (1) 2023: 229-248 - [c164]Shintaro Narisada, Shohei Beppu, Kazuhide Fukushima, Shinsaku Kiyomoto:
Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine. ICISSP 2023: 329-338 - [c163]Thanh Xuan Khuc, Anh The Ta, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems. SPACE 2023: 214-241 - [c162]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide:
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation. WAHC@CCS 2023: 1-9 - [i24]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto, Isao Echizen:
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations. CoRR abs/2306.01273 (2023) - [i23]Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. IACR Cryptol. ePrint Arch. 2023: 479 (2023) - [i22]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Takashi Nishide:
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation. IACR Cryptol. ePrint Arch. 2023: 1467 (2023) - 2022
- [j57]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 pp.1219-1234]. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(2): 130 (2022) - [j56]Masahito Ishizaka, Shinsaku Kiyomoto:
Multi-dimensional sub/super-range signatures. J. Inf. Secur. Appl. 65: 103084 (2022) - [j55]Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth:
Chosen-ciphertext lattice-based public key encryption with equality test in standard model. Theor. Comput. Sci. 905: 31-53 (2022) - [j54]Partha Sarathi Roy, Dung Hoang Duong, Willy Susilo, Arnaud Sipasseuth, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model. Theor. Comput. Sci. 929: 124-139 (2022) - [c161]Priyanka Dutta, Mei Jiang, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security. AsiaCCS 2022: 408-422 - [c160]Hoang-Quoc Nguyen-Son, Huy Quang Ung, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion. EMNLP (Findings) 2022: 2903-2913 - [c159]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures from Lattices. ESORICS (2) 2022: 447-466 - [c158]Vanessa Bracamonte, Seira Hidano, Shinsaku Kiyomoto:
Influence of Errors on the Evaluation of Text Classification Systems. VISIGRAPP (Revised Selected Papers) 2022: 161-181 - [c157]Vanessa Bracamonte, Seira Hidano, Shinsaku Kiyomoto:
Effect of Errors on the Evaluation of Machine Learning Systems. VISIGRAPP (2: HUCAPP) 2022: 48-57 - [c156]Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto:
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. ICISC 2022: 337-362 - [c155]Vanessa Bracamonte, Seira Hidano, Toru Nakamura, Shinsaku Kiyomoto:
Feature-level Approach for the Evaluation of Text Classification Models. VISIGRAPP (3: IVAPP) 2022: 164-170 - [c154]Priyanka Dutta, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices. ProvSec 2022: 121-136 - [i21]Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa:
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training. CoRR abs/2205.13702 (2022) - [i20]Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version). IACR Cryptol. ePrint Arch. 2022: 116 (2022) - [i19]Tuong Ngoc Nguyen, Anh The Ta, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signatures From Lattices. IACR Cryptol. ePrint Arch. 2022: 1070 (2022) - 2021
- [j53]Huy Quoc Le, Bay Vo, Dung Hoang Duong, Willy Susilo, Ngoc-Thuy Le, Kazuhide Fukushima, Shinsaku Kiyomoto:
Identity-Based Linkable Ring Signatures From Lattices. IEEE Access 9: 84739-84755 (2021) - [j52]Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based signcryption with equality test in standard model. Comput. Stand. Interfaces 76: 103515 (2021) - [j51]Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto:
Faster Rotation-Based Gauss Sieve for Solving the SVP on General Ideal Lattices. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 79-88 (2021) - [j50]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1219-1234 (2021) - [j49]Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform. IET Inf. Secur. 15(4): 267-281 (2021) - [j48]Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid:
Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics. Inf. 12(8): 297 (2021) - [j47]Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa:
Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. J. Inf. Process. 29: 236-246 (2021) - [j46]Tomoaki Mimoto, Masayuki Hashimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji:
Privacy Risk of Document Data and a Countermeasure Framework. J. Inf. Process. 29: 778-786 (2021) - [j45]Tran Phuong Thao, Mohammad Shahriar Rahman, Md. Zakirul Alam Bhuiyan, Ayumu Kubota, Shinsaku Kiyomoto, Kazumasa Omote:
Optimizing Share Size in Efficient and Robust Secret Sharing Scheme for Big Data. IEEE Trans. Big Data 7(4): 703-716 (2021) - [j44]Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G. IACR Trans. Symmetric Cryptol. 2021(2): 1-30 (2021) - [c153]Anh The Ta, Thanh Xuan Khuc, Tuong Ngoc Nguyen, Huy Quoc Le, Dung Hoang Duong, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Efficient Unique Ring Signature for Blockchain Privacy Protection. ACISP 2021: 391-407 - [c152]Jean-Claude Bajard, Kazuhide Fukushima, Shinsaku Kiyomoto, Thomas Plantard, Arnaud Sipasseuth, Willy Susilo:
Generating Residue Number System Bases. ARITH 2021: 86-93 - [c151]Shintaro Narisada, Yuki Matsumoto, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Countermeasures Against Backdoor Attacks Towards Malware Detectors. CANS 2021: 295-314 - [c150]Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Nozomu Togawa:
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training. CANS 2021: 392-411 - [c149]Vanessa Bracamonte, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Towards Exploring User Perception of a Privacy Sensitive Information Detection Tool. ICISSP 2021: 628-634 - [c148]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Vanessa Bracamonte, Shinsaku Kiyomoto, Rie Shigetomi Yamaguchi:
OPA2D: One-Pixel Attack, Detection, and Defense in Deep Neural Networks. IJCNN 2021: 1-10 - [c147]Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa:
Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists. IOLTS 2021: 1-4 - [c146]Shintaro Narisada, Kazuhide Fukushima, Shinsaku Kiyomoto:
Fast GPU Implementation of Dumer's Algorithm Solving the Syndrome Decoding Problem. ISPA/BDCloud/SocialCom/SustainCom 2021: 971-977 - [c145]Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi:
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem. IWSEC 2021: 23-41 - [c144]Toru Nakamura, Hiroshi Ito, Shinsaku Kiyomoto, Toshihiro Yamauchi:
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring. IWSEC 2021: 64-73 - [c143]Hoang-Quoc Nguyen-Son, Tran Thao Phuong, Seira Hidano, Ishita Gupta, Shinsaku Kiyomoto:
Machine Translated Text Detection Through Text Similarity with Round-Trip Translation. NAACL-HLT 2021: 5792-5797 - [c142]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text. PACLIC 2021: 11-20 - [c141]Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid:
A Comparison of GKE Protocols based on SIDH. SECRYPT 2021: 507-514 - [c140]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Automatic Security Inspection Framework for Trustworthy Supply Chain. SERA 2021: 45-50 - [i18]Hoang-Quoc Nguyen-Son, Seira Hidano, Kazuhide Fukushima, Shinsaku Kiyomoto:
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text. CoRR abs/2110.05748 (2021) - [i17]Masahito Ishizaka, Shinsaku Kiyomoto:
Multi-Dimensional Sub/Super-Range Signatures. IACR Cryptol. ePrint Arch. 2021: 698 (2021) - [i16]Masahito Ishizaka, Shinsaku Kiyomoto:
Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs. IACR Cryptol. ePrint Arch. 2021: 1170 (2021) - [i15]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR problem. IACR Cryptol. ePrint Arch. 2021: 1699 (2021) - 2020
- [j43]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 173-182 (2020) - [j42]Tomoaki Mimoto, Seira Hidano, Shinsaku Kiyomoto, Atsuko Miyaji:
Anonymization Technique Based on SGD Matrix Factorization. IEICE Trans. Inf. Syst. 103-D(2): 299-308 (2020) - [j41]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques. Proc. Priv. Enhancing Technol. 2020(3): 264-283 (2020) - [j40]Mohammad Shahriar Rahman, Abdullah Al Omar, Md. Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, Guojun Wang:
Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption. IEEE Trans. Engineering Management 67(4): 1476-1486 (2020) - [c139]Kazuhide Fukushima, Thomas Perianin, Victor Dyseryn, Shinsaku Kiyomoto, Sylvain Guilley, Adrien Facon:
Feasibility study of a camera-based PUF in a realistic scenario. ARES 2020: 31:1-31:6 - [c138]Shintaro Narisada, Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
Stronger Targeted Poisoning Attacks Against Malware Detection. CANS 2020: 65-84 - [c137]Rei Ueno, Kazuhide Fukushima, Yuto Nakano, Shinsaku Kiyomoto, Naofumi Homma:
Single-Trace Side-Channel Analysis on Polynomial-Based MAC Schemes. COSADE 2020: 43-67 - [c136]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Consideration on Data Conformance Toward Building Trust in Supply Chain. EuCNC 2020: 128-132 - [c135]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. ICICS 2020: 73-90 - [c134]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool. ICISSP 2020: 142-151 - [c133]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Effects of Explanatory Information on Privacy Policy Summarization Tool Perception. ICISSP (Revised Selected Papers) 2020: 156-177 - [c132]Seira Hidano, Shinsaku Kiyomoto:
Recommender Systems Robust to Data Poisoning using Trim Learning. ICISSP 2020: 721-724 - [c131]Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Signatures. ISC 2020: 20-38 - [c130]Hiroki Okada, Shinsaku Kiyomoto, Carlos Cid:
Integerwise Functional Bootstrapping on TFHE. ISC 2020: 107-125 - [c129]Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji:
A Practical Privacy-Preserving Algorithm for Document Data. TrustCom 2020: 1376-1383 - [p2]Atsuko Miyaji, Shinsaku Kiyomoto, Katsuya Tanaka, Yoshifumi Nishida, Koji Kitamura:
Introduction. Security Infrastructure Technology for Integrated Utilization of Big Data 2020: 1-3 - [p1]Tomoaki Mimoto, Shinsaku Kiyomoto, Atsuko Miyaji:
Secure Data Management Technology. Security Infrastructure Technology for Integrated Utilization of Big Data 2020: 65-105 - [i14]Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto, Arnaud Sipasseuth:
Lattice-based public key encryption with equality test in standard model, revisited. CoRR abs/2005.03178 (2020) - [i13]Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Arnaud Sipasseuth, Willy Susilo:
Lattice-based public key encryption with equality test supporting flexible authorization in standard model. CoRR abs/2005.05308 (2020) - [i12]Huy Quoc Le, Dung Hoang Duong, Partha Sarathi Roy, Willy Susilo, Kazuhide Fukushima, Shinsaku Kiyomoto:
Lattice-based Signcryption with Equality Test in Standard Model. CoRR abs/2012.15423 (2020) - [i11]Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption. IACR Cryptol. ePrint Arch. 2020: 595 (2020) - [i10]Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Signatures. IACR Cryptol. ePrint Arch. 2020: 658 (2020)
2010 – 2019
- 2019
- [j39]Abdullah Al Omar, Md. Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, Mohammad Shahriar Rahman:
Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Future Gener. Comput. Syst. 95: 511-521 (2019) - [j38]Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt:
A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1048-1060 (2019) - [j37]Toru Nakamura, Andrew A. Adams, Kiyoshi Murata, Shinsaku Kiyomoto, Nobuo Suzuki:
The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability. J. Inf. Process. 27: 787-801 (2019) - [c128]Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Willy Susilo:
A Lattice-Based Public Key Encryption with Equality Test in Standard Model. ACISP 2019: 138-155 - [c127]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Paragraphs by Matching Similar Words. CICLing (1) 2019: 521-532 - [c126]Kohei Nozawa, Kento Hasegawa, Seira Hidano, Shinsaku Kiyomoto, Kazuo Hashimoto, Nozomu Togawa:
Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists. CyberICPS/SECPRE/SPOSE/ADIoT@ESORICS 2019: 341-359 - [c125]Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Experiment on Side-Channel Key-Recovery using a Real LPWA End-device. ICISSP 2019: 67-74 - [c124]Kazuhide Fukushima, Damien Marion, Yuto Nakano, Adrien Facon, Shinsaku Kiyomoto, Sylvain Guilley:
Evaluation of Side-Channel Key-Recovery Attacks on LoRaWAN End-Device. ICISSP (Revised Selected Papers) 2019: 74-92 - [c123]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
User Study of the Effectiveness of a Privacy Policy Summarization Tool. ICISSP (Revised Selected Papers) 2019: 186-206 - [c122]Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Security Analysis and Efficient Implementation of Code-based Signature Schemes. ICISSP 2019: 213-220 - [c121]Vanessa Bracamonte, Seira Hidano, Welderufael B. Tesfay, Shinsaku Kiyomoto:
Evaluating Privacy Policy Summarization: An Experimental Study among Japanese Users. ICISSP 2019: 370-377 - [c120]Anirban Basu, Theo Dimitrakos, Yuto Nakano, Shinsaku Kiyomoto:
A Framework for Blockchain-Based Verification of Integrity and Authenticity. IFIPTM 2019: 196-208 - [c119]Hoang-Quoc Nguyen-Son, Tran Thao Phuong, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Text using Back Translation. INLG 2019: 189-197 - [c118]Kazuhide Fukushima, Ayumu Yoshimura, Shinsaku Kiyomoto, Norikazu Yamasaki:
Evaluation of Software PUF Based on Gyroscope. ISPEC 2019: 232-247 - [c117]Shinsaku Kiyomoto, Yuto Nakano, Atsushi Waseda, Toru Nakamura, Masahito Ishizaka, Yasuaki Kobayashi:
A Framework for Secure and Trustworthy Data Management in Supply Chain. MobiWIS 2019: 148-159 - [c116]Shoichiro Sasaki, Seira Hidano, Toshihiro Uchibayashi, Takuo Suganuma, Masahiro Hiji, Shinsaku Kiyomoto:
On Embedding Backdoor in Malware Detectors Using Machine Learning. PST 2019: 1-5 - [c115]Sabyasachi Dutta, Partha Sarathi Roy, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. WISA 2019: 180-191 - [i9]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Paragraphs by Matching Similar Words. CoRR abs/1904.10641 (2019) - [i8]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Detecting Machine-Translated Text using Back Translation. CoRR abs/1910.06558 (2019) - [i7]Hoang-Quoc Nguyen-Son, Tran Phuong Thao, Seira Hidano, Shinsaku Kiyomoto:
Identifying Adversarial Sentences by Analyzing Text Complexity. CoRR abs/1912.08981 (2019) - [i6]Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto:
Evaluation of Code-based Signature Schemes. IACR Cryptol. ePrint Arch. 2019: 544 (2019) - 2018
- [j36]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes. IEICE Trans. Inf. Syst. 101-D(11): 2665-2676 (2018) - [j35]Mohammad Shahriar Rahman, Anirban Basu, Toru Nakamura, Haruo Takasaki, Shinsaku Kiyomoto:
PPM: Privacy Policy Manager for Home Energy Management System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 9(2): 42-56 (2018) - [j34]Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. Secur. Commun. Networks 2018: 9846168:1-9846168:14 (2018) - [c114]Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai:
Active Attack Against Oblivious RAM. AINA 2018: 744-751 - [c113]Sushmita Ruj, Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
BlockStore: A Secure Decentralized Storage Framework on Blockchain. AINA 2018: 1096-1103 - [c112]Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel M. Serna:
PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation. IWSPA@CODASPY 2018: 15-21 - [c111]Keishiro Fukushima, Toru Nakamura, Daisuke Ikeda, Shinsaku Kiyomoto:
Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features. ICCSP 2018: 62-66 - [c110]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. ICISC 2018: 196-214 - [c109]Seira Hidano, Yuto Nakano, Shinsaku Kiyomoto:
An Evaluation Framework for Fastest Oblivious RAM. IoTBDS 2018: 114-122 - [c108]Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. ISPEC 2018: 578-594 - [c107]Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji:
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data. PST 2018: 1-7 - [c106]Hiroki Okada, Carlos Cid, Seira Hidano, Shinsaku Kiyomoto:
Linear Depth Integer-Wise Homomorphic Division. WISTP 2018: 91-106 - [c105]Welderufael B. Tesfay, Peter Hofmann, Toru Nakamura, Shinsaku Kiyomoto, Jetzabel M. Serna:
I Read but Don't Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR. WWW (Companion Volume) 2018: 163-166 - [i5]Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform. IACR Cryptol. ePrint Arch. 2018: 1238 (2018) - 2017
- [j33]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto, Md. Zakirul Alam Bhuiyan:
Privacy-friendly secure bidding for smart grid demand-response. Inf. Sci. 379: 229-240 (2017) - [j32]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction. J. Internet Serv. Inf. Secur. 7(3): 1-16 (2017) - [c104]Rui Xu, Sze Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen:
An Experimental Study of the BDD Approach for the Search LWE Problem. ACNS 2017: 253-272 - [c103]Toru Nakamura, Welderufael B. Tesfay, Shinsaku Kiyomoto, Jetzabel M. Serna:
Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences. DPM/CBT@ESORICS 2017: 107-123 - [c102]Wataru Kawai, Rei Ueno, Naofumi Homma, Takafumi Aoki, Kazuhide Fukushima, Shinsaku Kiyomoto:
Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers. EuroS&P Workshops 2017: 113-121 - [c101]Adetokunbo Makanju, Nur Zincir-Heywood, Shinsaku Kiyomoto:
On evolutionary computation for moving target defense in software defined networks. GECCO (Companion) 2017: 287-288 - [c100]Ye Yuan, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card. HOST 2017: 47-50 - [c99]Toshihiro Uchibayashi, Yuichi Hashi, Seira Hidano, Shinsaku Kiyomoto, Bernady O. Apduhan, Toru Abe, Takuo Suganuma, Masahiro Hiji:
A Control Mechanism for Live Migration with Data Regulations Preservation. ICCSA (1) 2017: 509-522 - [c98]Anirban Basu, Rui Xu, Juan Camilo Corena, Shinsaku Kiyomoto:
Hypercubes and Private Information Retrieval. ICICS 2017: 509-515 - [c97]Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto:
White-box Implementation of Stream Cipher. ICISSP 2017: 263-269 - [c96]Shinsaku Kiyomoto, Anirban Basu, Mohammad Shahriar Rahman, Sushmita Ruj:
On blockchain-based authorization architecture for beyond-5G mobile services. ICITST 2017: 136-141 - [c95]Anirban Basu, Mohammad Shahriar Rahman, Rui Xu, Kazuhide Fukushima, Shinsaku Kiyomoto:
VIGraph - A Framework for Verifiable Information. IFIPTM 2017: 12-20 - [c94]Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. IWSEC 2017: 159-178 - [c93]Toshihiro Uchibayashi, Yuichi Hashi, Seira Hidano, Shinsaku Kiyomoto, Takuo Suganuma, Masahiro Hiji:
Verification of Data Collection Methods for Live Migration Protection Mechanism. NBiS 2017: 420-430 - [c92]Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Ayumu Kubota:
Robust ORAM: Enhancing Availability, Confidentiality and Integrity. PRDC 2017: 30-39 - [c91]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Towards Outsourced Privacy-Preserving Multiparty DBSCAN. PRDC 2017: 225-226 - [c90]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes. PST 2017: 115-126 - [c89]Nuttapong Attrapadung, Goichiro Hanaoka, Shinsaku Kiyomoto, Tomoaki Mimoto, Jacob C. N. Schuldt:
A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions. PST 2017: 215-224 - [c88]Shinsaku Kiyomoto, Mohammad Shahriar Rahman, Anirban Basu:
On blockchain-based anonymized dataset distribution platform. SERA 2017: 85-92 - [c87]Abdullah Al Omar, Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
MediBchain: A Blockchain Based Privacy Preserving Platform for Healthcare Data. SpaCCS Workshops 2017: 534-543 - [c86]Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka, Atsuko Miyaji:
(p, N)-identifiability: Anonymity under Practical Adversaries. TrustCom/BigDataSE/ICESS 2017: 996-1003 - [c85]Kazuhide Fukushima, Rui Xu, Shinsaku Kiyomoto, Naofumi Homma:
Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure. TrustCom/BigDataSE/ICESS 2017: 1032-1037 - [c84]Adetokunbo Makanju, Shinsaku Kiyomoto:
Diversification of Autonomous Vehicle Driving Behavior. VTC Fall 2017: 1-5 - 2016
- [j31]Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Portable Implementation of Lattice-based Cryptography using JavaScript. Int. J. Netw. Comput. 6(2): 309-327 (2016) - [c83]Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
Secure Bike Sharing System for Multi-Modal Journey. BDCloud-SocialCom-SustainCom 2016: 437-444 - [c82]Yuichi Hashi, Toshihiro Uchibayashi, Seira Hidano, Shinsaku Kiyomoto, Abdur Rahim Biswas, Takuo Suganuma, Masahiro Hiji:
Data Protection for Cross-Border Live Migration in Multi-cloud Environment. CANDAR 2016: 681-685 - [c81]Toru Nakamura, Shinsaku Kiyomoto, Welderufael B. Tesfay, Jetzabel M. Serna:
Easing the Burden of Setting Privacy Preferences: A Machine Learning Approach. ICISSP (Revised Selected Papers) 2016: 44-63 - [c80]Toru Nakamura, Shinsaku Kiyomoto, Welderufael B. Tesfay, Jetzabel M. Serna:
Personalised Privacy by Default Preferences - Experiment and Analysis. ICISSP 2016: 53-62 - [c79]Anirban Basu, Stephen Marsh, Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
A Model for Personalised Perception of Policies. IFIPTM 2016: 52-62 - [c78]Seira Hidano, Shinsaku Kiyomoto, Abdur Rahim Biswas, Toshihiro Uchibayashi, Takuo Suganuma:
Access Control for Cross-Border Transfer of Sensor Data. MobiSec 2016: 143-153 - [c77]Anirban Basu, Rui Xu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto:
User-in-a-context: A blueprint for context-aware identification. PST 2016: 329-334 - [c76]Markus Tschersich, Shinsaku Kiyomoto, Sebastian Pape, Toru Nakamura, Gökhan Bal, Haruo Takasaki, Kai Rannenberg:
On Gender Specific Perception of Data Sharing in Japan. SEC 2016: 150-160 - [c75]Kazuhide Fukushima, Seira Hidano, Shinsaku Kiyomoto:
Sensor-based Wearable PUF. SECRYPT 2016: 207-214 - [c74]Tomoaki Mimoto, Anirban Basu, Shinsaku Kiyomoto:
Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy. SECRYPT 2016: 411-418 - [c73]Anirban Basu, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh:
PrefRank: Quantification and Aggregation of Subjective User Preferences. Trustcom/BigDataSE/ISPA 2016: 7-13 - [c72]Kazuhide Fukushima, Youssef Souissi, Seira Hidano, Robert Nguyen, Jean-Luc Danger, Sylvain Guilley, Yuto Nakano, Shinsaku Kiyomoto, Laurent Sauvage:
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology. Trustcom/BigDataSE/ISPA 2016: 201-207 - [c71]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings. Trustcom/BigDataSE/ISPA 2016: 1759-1764 - [c70]Mohammad Shahriar Rahman, Keita Emura, Shinsaku Kiyomoto:
On the Leakage Resilient Cryptography in Game-Theoretic Settings. Trustcom/BigDataSE/ISPA 2016: 1984-1989 - 2015
- [c69]Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Tatsuhiko Hirabayashi:
Personal Agent for Services in ITS. ARES 2015: 493-500 - [c68]Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Yung Shin Van Der Sype, Yutaka Miyake:
Practical Private One-way Anonymous Message Routing. AsiaCCS 2015: 665 - [c67]Seira Hidano, Shinsaku Kiyomoto, Yosuke Murakami, Panagiotis Vlacheas, Klaus Moessner:
Design of a Security Gateway for iKaaS Platform. CloudComp 2015: 323-333 - [c66]Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Portable Implementation of Lattice-Based Cryptography Using JavaScript. CANDAR 2015: 58-67 - [c65]Anirban Basu, Juan Camilo Corena, Jaideep Vaidya, Jon Crowcroft, Shinsaku Kiyomoto, Stephen Marsh, Yung Shin Van Der Sype, Toru Nakamura:
Lightweight Practical Private One-Way Anonymous Messaging. IFIPTM 2015: 76-91 - [c64]Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Privacy-friendly secure bidding scheme for demand response in smart grid. ISC2 2015: 1-6 - [c63]Seira Hidano, Martin Pecovský, Shinsaku Kiyomoto:
New Security Challenges in the 5G Network. ISICA 2015: 619-630 - [c62]Anirban Basu, Toru Nakamura, Seira Hidano, Shinsaku Kiyomoto:
k-anonymity: Risks and the Reality. TrustCom/BigDataSE/ISPA (1) 2015: 983-989 - [c61]Shinsaku Kiyomoto, Toru Nakamura, Yutaka Miyake:
Towards Tracing of k-Anonymized Datasets. TrustCom/BigDataSE/ISPA (1) 2015: 1237-1242 - [c60]Ricardo Neisse, Gianmarco Baldini, Gary Steri, Yutaka Miyake, Shinsaku Kiyomoto, Abdur Rahim Biswas:
An agent-based framework for Informed Consent in the internet of things. WF-IoT 2015: 789-794 - [c59]Seira Hidano, Shinsaku Kiyomoto:
On Partitioning Secret Data Based on Concept of Functional Safety. WISA 2015: 110-121 - 2014
- [j30]Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai:
Fast Implementation of KCipher-2 for Software and Hardware. IEICE Trans. Inf. Syst. 97-D(1): 43-52 (2014) - [j29]Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 157-166 (2014) - [j28]Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation. IEICE Trans. Inf. Syst. 97-D(10): 2576-2585 (2014) - [j27]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Security issues on IT systems during disasters: a survey. J. Ambient Intell. Humaniz. Comput. 5(2): 173-185 (2014) - [c58]Shinsaku Kiyomoto, Yutaka Miyake:
PrivacyFrost2: A Efficient Data Anonymization Tool Based on Scoring Functions. CD-ARES 2014: 211-225 - [c57]Juan Camilo Corena, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake, Tomoaki Ohtsuki:
XOR network coding pollution prevention without homomorphic functions. CCNC 2014: 293-300 - [c56]Anirban Basu, Juan Camilo Corena, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Shinsaku Kiyomoto, Jaideep Vaidya, Yutaka Miyake:
CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud. CloudCom 2014: 731-734 - [c55]Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake:
Data Storage on the Cloud under User Control. CloudCom 2014: 739-742 - [c54]Yuto Nakano, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake:
Key Extraction Attack Using Statistical Analysis of Memory Dump Data. CRiSIS 2014: 239-246 - [c53]Juan Camilo Corena, Anirban Basu, Shinsaku Kiyomoto, Yutaka Miyake, Tomoaki Ohtsuki:
Beyond proofs of data possession: Finding defective blocks in outsourced storage. GLOBECOM 2014: 2381-2386 - [c52]Anirban Basu, Anna Monreale, Juan Camilo Corena, Fosca Giannotti, Dino Pedreschi, Shinsaku Kiyomoto, Yutaka Miyake, Tadashi Yanagihara, Roberto Trasarti:
A Privacy Risk Model for Trajectory Data. IFIPTM 2014: 125-140 - [c51]Shinsaku Kiyomoto, Yutaka Miyake:
How to Find an Appropriate K for K-Anonymization. IMIS 2014: 273-279 - [c50]Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice. Public Key Cryptography 2014: 411-428 - [c49]Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Jaideep Vaidya, Stephen Marsh, Yutaka Miyake:
PrefRank: fair aggregation of subjective user preferences. SAC 2014: 287-288 - [c48]Anirban Basu, Juan Camilo Corena, Shinsaku Kiyomoto, Stephen Marsh, Jaideep Vaidya, Guibing Guo, Jie Zhang, Yutaka Miyake:
Privacy preserving trusted social feedback. SAC 2014: 1706-1711 - [c47]Juan Camilo Corena, Anirban Basu, Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake:
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques. SECRYPT 2014: 307-314 - [c46]Yuto Nakano, Youssef Souissi, Robert Nguyen, Laurent Sauvage, Jean-Luc Danger, Sylvain Guilley, Shinsaku Kiyomoto, Yutaka Miyake:
A Pre-processing Composition for Secret Key Recovery on Android Smartphone. WISTP 2014: 76-91 - 2013
- [c45]Shinsaku Kiyomoto, Toru Nakamura, Haruo Takasaki, Ryu Watanabe, Yutaka Miyake:
PPM: Privacy Policy Manager for Personalized Services. CD-ARES Workshops 2013: 377-392 - [c44]Takafumi Hibiki, Naofumi Homma, Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Takafumi Aoki:
Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure. COSADE 2013: 169-183 - [c43]Limin Jia, Jassim Aljuraidan, Elli Fragkaki, Lujo Bauer, Michael Stroucken, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract). ESORICS 2013: 775-792 - [c42]Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake:
A Key-revocable Attribute-based Encryption for Mobile Cloud Environments. SECRYPT 2013: 51-61 - [c41]Shinsaku Kiyomoto, Andre Rein, Yuto Nakano, Carsten Rudolph, Yutaka Miyake:
LMM - A Common Component for Software License Management on Cloud. SECRYPT 2013: 284-295 - [c40]Matt Henricksen, Shinsaku Kiyomoto:
AVON - A Fast Hash Function for Intel SIMD Architectures. SECRYPT 2013: 482-487 - [c39]Toru Nakamura, Shinsaku Kiyomoto, Ryu Watanabe, Yutaka Miyake:
P3MCF: Practical Privacy-Preserving Multi-domain Collaborative Filtering. TrustCom/ISPA/IUCC 2013: 354-361 - [i4]Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions. IACR Cryptol. ePrint Arch. 2013: 388 (2013) - [i3]Shinsaku Kiyomoto, Wook Shin:
A Description of the KCipher-2 Encryption Algorithm. RFC 7008: 1-37 (2013) - 2012
- [j26]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Software Protection Combined with Tamper-Proof Device. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 213-222 (2012) - [j25]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Design of Categorization Mechanism for Disaster-Information-Gathering System. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 3(4): 21-34 (2012) - [c38]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Security-and-Privacy-Related Issues on IT Systems During Disasters. CD-ARES 2012: 445-459 - [c37]Yuto Nakano, Carlos Cid, Shinsaku Kiyomoto, Yutaka Miyake:
Memory Access Pattern Protection for Resource-Constrained Devices. CARDIS 2012: 188-202 - [c36]Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:
On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters. TrustCom 2012: 1755-1762 - [c35]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Privacy Preservation of User History Graph. WISTP 2012: 87-96 - 2011
- [j24]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism. J. Internet Serv. Inf. Secur. 1(1): 4-17 (2011) - [j23]Shinsaku Kiyomoto, Keith M. Martin:
Model for a Common Notion of Privacy Leakage on Public Database. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 2(1): 50-62 (2011) - [j22]Wook Shin, Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake:
AMY: Use your cell phone to create a protected personal network over devices. IEEE Trans. Consumer Electron. 57(1): 99-104 (2011) - [c34]Shinsaku Kiyomoto, Yutaka Miyake, Toshiaki Tanaka:
Privacy Frost: A User-Oriented Data Anonymization Tool. ARES 2011: 442-447 - [c33]Yuto Nakano, Carlos Cid, Kazuhide Fukushima, Shinsaku Kiyomoto:
Analysis of Message Injection in Stream Cipher-Based Hash Functions. ACNS 2011: 498-513 - [c32]Shinsaku Kiyomoto, Kazuhide Fukushima, Yutaka Miyake:
Data Anonymity in Multi-Party Service Model. FGIT-SecTech 2011: 21-30 - [c31]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme. ICETE (Selected Papers) 2011: 233-248 - [c30]Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake:
Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha. ICICS 2011: 255-266 - [c29]Shinsaku Kiyomoto, Yutaka Miyake:
On Data Importance Analysis. INCoS 2011: 628-633 - [c28]Shinsaku Kiyomoto, Matthew Henricksen, Wun-She Yap, Yuto Nakano, Kazuhide Fukushima:
MASHA - Low Cost Authentication with a New Stream Cipher. ISC 2011: 63-78 - [c27]Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake:
Automatic security verification for 3-party authentication and key exchange protocols. NSS 2011: 254-258 - [c26]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree. SECRYPT 2011: 37-49 - 2010
- [j21]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Improved Subset Difference Method with Ternary Tree. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 2034-2044 (2010) - [c25]Matthew Henricksen, Wun-She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka:
Side-Channel Analysis of the K2 Stream Cipher. ACISP 2010: 53-73 - [c24]Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka:
Security Verification for Authentication and Key Exchange Protocols, Revisited. AINA Workshops 2010: 226-233 - [c23]Shinsaku Kiyomoto, Keith M. Martin:
Towards a Common Notion of Privacy Leakage on Public Database. BWCCA 2010: 186-191 - [c22]Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework. Security and Management 2010: 323-329 - [c21]Shinsaku Kiyomoto, Toshiaki Tanaka:
A User-Oriented Anonymization Mechanism for Public Data. DPM/SETOP 2010: 22-35 - [c20]Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:
Stream Cipher-Based Hash Function and Its Security. ICETE (Selected Papers) 2010: 188-202 - [c19]Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi:
Efficient Implementation of Pairing on BREW Mobile Phones. IWSEC 2010: 326-336 - [c18]Wook Shin, Sanghoon Kwak, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Small But Non-negligible Flaw in the Android Permission Scheme. POLICY 2010: 107-110 - [c17]Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka:
On a Construction of Stream-cipher-based Hash Functions. SECRYPT 2010: 334-343 - [c16]Wook Shin, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework. SocialCom/PASSAT 2010: 944-951
2000 – 2009
- 2009
- [j20]Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
Design of Anonymous Attribute Authentication Mechanism. IEICE Trans. Commun. 92-B(4): 1112-1118 (2009) - [j19]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1808-1821 (2009) - [c15]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Obfuscation Mechanism in Conjunction with Tamper-Proof Module. CSE (2) 2009: 665-670 - [c14]Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin:
Offline Peer-to-Peer Broadcast with Anonymity. ICETE (Selected Papers) 2009: 174-185 - [c13]Carlos Cid, Shinsaku Kiyomoto, Jun Kurihara:
The rakaposhi Stream Cipher. ICICS 2009: 32-46 - [c12]Wook Shin, Carl A. Gunter, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
How to Bootstrap Security for Ad-Hoc Network: Revisited. SEC 2009: 119-131 - [c11]Shinsaku Kiyomoto, Kazuhide Fukushima, Keith M. Martin:
An Offline Peer-to-peer Broadcasting Scheme with Anonymity. SECRYPT 2009: 75-82 - [c10]Shinsaku Kiyomoto, Keith M. Martin, Kazuhide Fukushima:
Privacy-Aware Location Database Service for Granular Queries. WISTP 2009: 28-37 - 2008
- [j18]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 127-138 (2008) - [j17]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Analysis of Program Obfuscation Schemes with Variable Encoding Technique. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 316-329 (2008) - [j16]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW. IEICE Trans. Inf. Syst. 91-D(5): 1330-1337 (2008) - [j15]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
On a Fast (k, n)-Threshold Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2365-2378 (2008) - [j14]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. Inf. Media Technol. 3(4): 788-799 (2008) - [j13]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. J. Inf. Process. 16: 130-141 (2008) - [c9]Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka:
On-the-Fly Automatic Generation of Security Protocols. ICEIS (3-2) 2008: 97-104 - [c8]Shinsaku Kiyomoto, Toshiaki Tanaka:
Anonymous attribute authentication scheme using self-blindable certificates. ISI 2008: 215-217 - [c7]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. ISC 2008: 455-470 - [c6]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
FPGA-Targeted Hardware Implementations of K2. SECRYPT 2008: 270-277 - [c5]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis. WISA 2008: 225-239 - [i2]Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka:
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. IACR Cryptol. ePrint Arch. 2008: 409 (2008) - 2007
- [j12]Haruki Ota, Kazuki Yoneyama, Shinsaku Kiyomoto, Toshiaki Tanaka, Kazuo Ohta:
Universally Composable Hierarchical Hybrid Authenticated Key Exchange. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 139-151 (2007) - [j11]Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Kouichi Sakurai:
On Effectiveness of Clock Control in Stream Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(9): 1780-1787 (2007) - [j10]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Design of τ-Gradual Key-Management Schemes for Mobile Content Distribution. Inf. Media Technol. 2(1): 356-367 (2007) - [j9]Haruki Ota, Kazuki Yoneyama, Shinsaku Kiyomoto, Toshiaki Tanaka, Kazuo Ohta:
Universally Composable Client-to-Client General Authenticated Key Exchange. Inf. Media Technol. 2(4): 1022-1037 (2007) - [j8]Shinsaku Kiyomoto, Toshiaki Tanaka, Yutaka Miyake, Yoshinori Mitamura:
Development of security functions for a medical information sharing platform. Syst. Comput. Jpn. 38(11): 49-63 (2007) - [c4]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
K2 Stream Cipher. ICETE (Selected Papers) 2007: 214-226 - [c3]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
K2: A Stream Cipher Algorithm using Dynamic Feedback Control. SECRYPT 2007: 204-213 - [c2]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW. WISA 2007: 203-214 - [i1]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones using BREW. IACR Cryptol. ePrint Arch. 2007: 340 (2007) - 2006
- [j7]Shinsaku Kiyomoto, Toshiaki Tanaka:
Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 222-226 (2006) - [j6]Shinsaku Kiyomoto, Toshiaki Tanaka, Mariko Yoshida, Masahiro Kuroda:
Design of Self-Delegation for Mobile Terminals. Inf. Media Technol. 1(1): 594-605 (2006) - [j5]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
An Obfuscation Scheme Using Affine Transformation and Its Implementation. Inf. Media Technol. 1(2): 1094-1108 (2006) - [c1]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka:
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services. MDM 2006: 17 - 2005
- [j4]Haruki Ota, Shinsaku Kiyomoto, Toshiaki Tanaka:
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 287-295 (2005) - [j3]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai:
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(10): 2778-2791 (2005) - 2004
- [j2]Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao:
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 182-189 (2004) - [j1]Masahiro Kuroda, Mariko Yoshida, Ryoji Ono, Shinsaku Kiyomoto, Toshiaki Tanaka:
Secure Service and Network Framework for Mobile Ethernet. Wirel. Pers. Commun. 29(3-4): 161-190 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:37 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint