274 results on '"Takaaki Mizuki"'
Search Results
52. Physical ZKP protocols for Nurimisaki and Kurodoko.
53. Analyzing Execution Time of Card-Based Protocols.
54. Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol.
55. The Six-Card Trick: Secure Computation of Three-Input Equality.
56. Analysis of Information Leakage Due to Operative Errors in Card-Based Protocols.
57. Multi-party Computation Based on Physical Coins.
58. Secret Key Amplification from Uniformly Leaked Key Exchange Complete Graph.
59. Five-Card AND Protocol in Committed Format Using Only Practical Shuffles.
60. Card-Based Zero-Knowledge Proof for Sudoku.
61. Card-based Protocols Using Triangle Cards.
62. Physical Zero-Knowledge Proof for Makaro.
63. Preface: Special Issue on Card-Based Cryptography 2.
64. Card-Based Physical Zero-Knowledge Proof for Kakuro.
65. The Minimum Number of Cards in Practical Card-Based Protocols.
66. Session details: Session 1.
67. Information leakage due to operative errors in card-based protocols.
68. Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle.
69. Card-based protocols using unequal division shuffles.
70. Pile-Shifting Scramble for Card-Based Protocols.
71. Preface: Special Issue on Card-Based Cryptography.
72. Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions.
73. Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards.
74. How to Implement a Random Bisection Cut.
75. An Implementation of Non-Uniform Shuffle for Secure Multi-Party Computation.
76. Card-Based Protocols Using Regular Polygon Cards.
77. Computational Model of Card-Based Cryptographic Protocols and Its Applications.
78. Fundamental study on randomized processing in cryptographic IC using variable clock against Correlation Power Analysis.
79. Efficient Card-Based Protocols for Generating a Hidden Random Permutation Without Fixed Points.
80. Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
81. Basic Study on the Method for Real-Time Video Streaming with Low Latency and High Bandwidth Efficiency.
82. Secure Multi-Party Computation Using Polarizing Cards.
83. Five-Card Secure Computations Using Unequal Division Shuffle.
84. Card-Based Protocols for Any Boolean Function.
85. Secure Computation Protocols Using Polarizing Cards.
86. Card-based protocols for securely computing the conjunction of multiple variables.
87. Practical Card-Based Cryptography.
88. Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting
89. Securely Computing Three-Input Functions with Eight Cards.
90. Voting with a Logarithmic Number of Cards.
91. Securely Computing the Three-Input Majority Function with Eight Cards.
92. The Five-Card Trick Can Be Done with Four Cards.
93. Six-Card Secure AND and Four-Card Secure XOR.
94. Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.
95. Minimizing AND-EXOR Expressions for Multiple-Valued Two-Input Logic Functions.
96. Minimizing ESCT forms for two-variable multiple-valued input binary output functions.
97. Investigation of Noise Interference due to Connector Contact Failure in a Coaxial Cable.
98. A formalization of card-based cryptographic protocols via abstract machine.
99. Committed-format AND protocol using only random cuts
100. Secure Multiparty Computations Using the 15 Puzzle.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.