From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications., , , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 21-32 (2020)Tree-based Secure Comparison of Secret Shared Data., , , , , и . ISITA, стр. 525-529. IEEE, (2018)Single-Shuffle Card-Based Protocol with Eight Cards per Gate., , и . UCNC, том 14003 из Lecture Notes in Computer Science, стр. 171-185. Springer, (2023)Cryptanalysis of EAXprime., , и . IACR Cryptology ePrint Archive, (2012)On the Security of Non-Interactive Key Exchange against Related-Key Attacks., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (9): 1910-1923 (2017)Secure Parallel Computation on Privately Partitioned Data and Applications., , , , , и . CCS, стр. 151-164. ACM, (2022)On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks., , , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (1): 73-90 (2017)Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation., , , , , , , и . IACR Cryptol. ePrint Arch., (2021)Constant-Round Private Decision Tree Evaluation for Secret Shared Data., , , , и . IACR Cryptol. ePrint Arch., (2023)Oblivious Linear Group Actions and Applications., , , , , , , и . CCS, стр. 630-650. ACM, (2021)