Author of the publication

A Key Leakage Preventive White-box Cryptographic Implementation.

, , and . IACR Cryptol. ePrint Arch., (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Broadcast Encryption Using Multiple Interpolation Methods., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 87-103. Springer, (2004)Efficient Construction of Order-Preserving Encryption Using Pseudo Random Function., , and . IEICE Trans. Commun., 98-B (7): 1276-1283 (2015)Data Randomization for Lightweight Secure Data Aggregation in Sensor Network., , , , and . UIC, volume 5061 of Lecture Notes in Computer Science, page 338-351. Springer, (2008)Authorized Client-Side Deduplication Using CP-ABE in Cloud Storage., , , and . Wirel. Commun. Mob. Comput., (2019)On the Design of a Privacy-Preserving Communication Scheme for Cloud-Based Digital Twin Environments Using Blockchain., , , , , and . IEEE Access, (2022)A Computationally-Efficient Construction for the Matrix-Based Key Distribution in Sensor Network., , and . ISA, volume 5576 of Lecture Notes in Computer Science, page 190-199. Springer, (2009)Fully Dynamic Data Management in Cloud Storage Systems with Secure Proof of Retrievability., , and . IEICE Trans. Inf. Syst., 105-D (11): 1872-1879 (November 2022)A Key Leakage Preventive White-box Cryptographic Implementation., , and . IACR Cryptol. ePrint Arch., (2018)Skipping, Cascade, and Combined Chain Schemes for Broadcast Encryption., , , and . IEEE Trans. Inf. Theory, 54 (11): 5155-5171 (2008)New broadcast encryption scheme using tree-based circle., , , and . Digital Rights Management Workshop, page 37-44. ACM, (2005)