274 results on '"Takaaki Mizuki"'
Search Results
2. Physical Zero-Knowledge Proof Protocols for Topswops and Botdrops.
3. Card-Based Zero-Knowledge Proof Protocols for the 15-Puzzle and the Token Swapping Problem.
4. Efficient Card-Based Protocols for Symmetric Functions Using Four-Colored Decks.
5. An Energy Efficient SDN Controller Placement with Delay Constraints.
6. Single-Shuffle Card-Based Protocol with Eight Cards per Gate.
7. Two UNO Decks Efficiently Perform Zero-Knowledge Proof for Sudoku.
8. Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input and Protocols.
9. Few-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges.
10. Special Issue on Card-Based Cryptography 3.
11. Card-Minimal Protocols for Symmetric Boolean Functions of More than Seven Inputs.
12. Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards.
13. Physical Zero-Knowledge Proof Protocol for Topswops.
14. Secure Computations Through Checking Suits of Playing Cards.
15. Card-Based Secure Sorting Protocol.
16. Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR Computations.
17. Card-Based ZKP Protocol for Nurimisaki.
18. Hide a Liar: Card-Based ZKP Protocol for Usowan.
19. Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting.
20. Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake.
21. Actively revealing card attack on card-based protocols.
22. Coin-based Secure Computations.
23. Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori.
24. Zero-Knowledge Proof Protocol for Cryptarithmetic Using Dihedral Cards.
25. Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational Model.
26. Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation.
27. A Card-Minimal Three-Input AND Protocol Using Two Shuffles.
28. Efficient Generation of a Card-Based Uniformly Distributed Random Derangement.
29. New Card-based Copy Protocols Using Only Random Cuts.
30. A Secure Three-Input AND Protocol with a Standard Deck of Minimal Cards.
31. Card-Based ZKP Protocols for Takuzu and Juosan.
32. Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags.
33. Public-PEZ Cryptography.
34. How to Implement a Non-uniform or Non-closed Shuffle.
35. Six-Card Finite-Runtime XOR Protocol with Only Random Cut.
36. Physical Zero-Knowledge Proof for Suguru Puzzle.
37. Card-Based Covert Lottery.
38. Five-Card AND Computations in Committed Format Using Only Uniform Cyclic Shuffles.
39. Committed-format AND protocol using only random cuts.
40. How to construct physical zero-knowledge proofs for puzzles with a 'single loop' condition.
41. Evaluating card-based protocols in terms of execution time.
42. Card-Based Secure Ranking Computations.
43. A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.
44. Secure Computation of Any Boolean Function Based on Any Deck of Cards.
45. Interactive Physical Zero-Knowledge Proof for Norinori.
46. Card-Based Protocol Against Actively Revealing Card Attack.
47. Light Cryptography.
48. Efficient card-based zero-knowledge proof for Sudoku.
49. Practical card-based implementations of Yao's millionaire protocol.
50. Card-based protocols for secure ranking computations.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.