Search

Your search keyword '"Takaaki Mizuki"' showing total 41 results

Search Constraints

Start Over You searched for: Author "Takaaki Mizuki" Remove constraint Author: "Takaaki Mizuki" Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection
41 results on '"Takaaki Mizuki"'

Search Results

1. Coin-based Secure Computations

2. Actively revealing card attack on card-based protocols

3. Five-Card AND Computations in Committed Format Using Only Uniform Cyclic Shuffles

4. Card-based protocols for secure ranking computations

5. Evaluating card-based protocols in terms of execution time

6. Efficient card-based zero-knowledge proof for Sudoku

7. Practical card-based implementations of Yao's millionaire protocol

8. Physical Zero-Knowledge Proof and NP-completeness Proof of Suguru Puzzle ⋆

9. Secure Computations Through Checking Suits of Playing Cards

10. Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake

11. Card-Based Physical Zero-Knowledge Proof for Kakuro

13. How to construct physical zero-knowledge proofs for puzzles with a 'single loop' condition

14. Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori

16. Physical Zero-Knowledge Proof for Suguru Puzzle

17. Card-Based ZKP Protocols for Takuzu and Juosan

18. Pile-Shifting Scramble for Card-Based Protocols

19. Preface: Special Issue on Card-Based Cryptography

20. Information Leakage Threats for Cryptographic Devices Using IEMI and EM Emission

21. Card-Based Protocols Using Regular Polygon Cards

22. Interactive Physical Zero-Knowledge Proof for Norinori

23. Secure Computation Protocols Using Polarizing Cards

24. Card-based protocols for securely computing the conjunction of multiple variables

25. Secure Multi-Party Computations Using a Deck of Cards

26. Physical Zero-Knowledge Proof for Makaro

27. Card-Based Zero-Knowledge Proof for Sudoku

28. Card-based Protocols Using Triangle Cards

29. Minimizing ESCT forms for two-variable multiple-valued input binary output functions

30. FOREWORD

31. Efficient Evaluation of EM Radiation Associated With Information Leakage From Cryptographic Devices

32. Analysis of Electromagnetic Information Leakage From Cryptographic Devices With Different Physical Structures

33. Transient IEMI Threats for Cryptographic Devices

34. AN APPLICATION OF ESOP EXPRESSIONS TO SECURE COMPUTATIONS

35. The Five-Card Trick Can Be Done with Four Cards

36. Necessary and Sufficient Numbers of Cards for Sharing Secret Keys on Hierarchical Groups

37. Characterization of Optimal Key Set Protocols

38. Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key (Extended Abstract)

39. ABSOLUTELY SECURE MESSAGE TRANSMISSION USING A KEY SHARING GRAPH

40. Characterization of optimal key set protocols

41. Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori

Catalog

Books, media, physical & digital resources