Search

Your search keyword '"Takaaki Mizuki"' showing total 79 results

Search Constraints

Start Over You searched for: Author "Takaaki Mizuki" Remove constraint Author: "Takaaki Mizuki" Topic business Remove constraint Topic: business
79 results on '"Takaaki Mizuki"'

Search Results

1. Committed-format AND protocol using only random cuts

2. Actively revealing card attack on card-based protocols

3. Five-Card AND Computations in Committed Format Using Only Uniform Cyclic Shuffles

4. Evaluating card-based protocols in terms of execution time

5. QR Bar-Code Designed Resistant against EM Information Leakage

6. Card-Based Physical Zero-Knowledge Proof for Kakuro

7. New Card-based Copy Protocols Using Only Random Cuts

8. How to construct physical zero-knowledge proofs for puzzles with a 'single loop' condition

9. A Card-Minimal Three-Input AND Protocol Using Two Shuffles

10. A Secure Three-Input AND Protocol with a Standard Deck of Minimal Cards

11. Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational Model

12. Card-Based Covert Lottery

13. Six-Card Finite-Runtime XOR Protocol with Only Random Cut

14. Experimental Study on Measurement Resolution of Side Channel Waveform in Correlation Power Analysis

15. The Source Estimation of Electromagnetic Information Leakage from Information Devices

16. How to Implement a Non-uniform or Non-closed Shuffle

17. Public-PEZ Cryptography

18. Pile-Shifting Scramble for Card-Based Protocols

19. Preface: Special Issue on Card-Based Cryptography

20. Information Leakage Threats for Cryptographic Devices Using IEMI and EM Emission

21. Card-based protocols using unequal division shuffles

22. Card-Based Protocol Against Actively Revealing Card Attack

23. Secure Computation of Any Boolean Function Based on Any Deck of Cards

24. Quantitative Evaluation of Inductance at the Coaxial Connector Contact Failure Portion

25. Five-Card AND Protocol in Committed Format Using Only Practical Shuffles

26. Study on the effect of clock rise time on fault occurrence under IEMI

27. A study on an evaluation method for EM information leakage utilizing controlled image displaying

28. Analyzing Execution Time of Card-Based Protocols

29. Multi-party Computation Based on Physical Coins

30. Analysis of Information Leakage Due to Operative Errors in Card-Based Protocols

31. Securely Computing Three-Input Functions with Eight Cards

32. Fundamental Study on a Mechanism of Faulty Outputs from Cryptographic Modules due to IEMI

33. Efficient Electromagnetic Analysis for Cryptographic Module on the Frequency Domain

34. Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions

35. Investigation of Noise Interference due to Connector Contact Failure in a Coaxial Cable

36. A formalization of card-based cryptographic protocols via abstract machine

37. Efficient Evaluation of EM Radiation Associated With Information Leakage From Cryptographic Devices

38. Analysis of Electromagnetic Information Leakage From Cryptographic Devices With Different Physical Structures

39. Transient IEMI Threats for Cryptographic Devices

41. Physical authentication using side-channel information

42. Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards

43. How to Implement a Random Bisection Cut

44. Mechanism of Increase in Inductance at Loosened Connector Contact Boundary

46. Recent Research Trends in Side Channel Attack on Cryptographic Modules and its Countermeasure

47. Fundamental Study on Mechanism of Electromagnetic Field Radiation from Electric Devices with Loose Contact of Connector

48. Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current

49. Influence of PCB and Attached Line of Hardware on Electromagnetic (EM) Information Leakage

50. Contact Conditions in Connectors that Cause Common Mode Radiation

Catalog

Books, media, physical & digital resources