Author of the publication

Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.

, , , , , , , and . ACNS Workshops, volume 12809 of Lecture Notes in Computer Science, page 378-396. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Teruya, Tadanori
add a person with the name Teruya, Tadanori
 

Other publications of authors with the same name

High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves., , , , , and . Pairing, volume 6487 of Lecture Notes in Computer Science, page 21-39. Springer, (2010)Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 319-334. Springer, (2016)On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data., , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 242-261. Springer, (2015)Constant-Round Client-Aided Secure Comparison Protocol., , , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 395-415. Springer, (2018)Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three., , , , , and . Pairing, volume 8365 of Lecture Notes in Computer Science, page 97-112. Springer, (2013)Secure Parallel Computation on Privately Partitioned Data and Applications., , , , , and . CCS, page 151-164. ACM, (2022)Attribute Based Encryption with Direct Efficiency Tradeoff., , , , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 249-266. Springer, (2016)Efficient Estimation of Number of Short Lattice Vectors in Search Space under Randomness Assumption., , and . APKC@AsiaCCS, page 13-22. ACM, (2019)MOBIUS: Model-Oblivious Binarized Neural Networks., , , , , , , , , and . CoRR, (2018)Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 21-32 (2020)