Author of the publication

Signature for Objects: Formalizing How to Authenticate Physical Data and More.

, , , , , , , , , , , , and . FC (1), volume 13950 of Lecture Notes in Computer Science, page 182-199. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Teruya, Tadanori
add a person with the name Teruya, Tadanori
 

Other publications of authors with the same name

Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation., , and . IACR Cryptology ePrint Archive, (2018)Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 319-334. Springer, (2016)On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data., , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 242-261. Springer, (2015)High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves., , , , , and . Pairing, volume 6487 of Lecture Notes in Computer Science, page 21-39. Springer, (2010)MOBIUS: Model-Oblivious Binarized Neural Networks., , , , , , , , , and . IEEE Access, (2019)A Note on Subgroup Security in Discrete Logarithm-Based Cryptography.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (1): 104-120 (2021)Constant-Round Client-Aided Secure Comparison Protocol., , , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 395-415. Springer, (2018)Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 21-32 (2020)Software implementation of an Attribute-Based Encryption scheme., , , , , and . IACR Cryptology ePrint Archive, (2014)MOBIUS: Model-Oblivious Binarized Neural Networks., , , , , , , , , and . CoRR, (2018)