Brunetta, Carlo; Larangeira, Mario; Liang, Bei; Mitrokotsa, Aikaterini; Tanaka, Keisuke Turn-based communication channels. (English) Zbl 1511.94063 Huang, Qiong (ed.) et al., Provable and practical security. 15th international conference, ProvSec 2021, Guangzhou, China, November 5–8, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13059, 376-392 (2021). MSC: 94A60 94A05 94A62 68P25 PDFBibTeX XMLCite \textit{C. Brunetta} et al., Lect. Notes Comput. Sci. 13059, 376--392 (2021; Zbl 1511.94063) Full Text: DOI
Egashira, Shohei; Wang, Yuyu; Tanaka, Keisuke Fine-grained cryptography revisited. (English) Zbl 1469.94094 J. Cryptology 34, No. 3, Paper No. 23, 43 p. (2021). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Egashira} et al., J. Cryptology 34, No. 3, Paper No. 23, 43 p. (2021; Zbl 1469.94094) Full Text: DOI
Egashira, Shohei; Wang, Yuyu; Tanaka, Keisuke Fine-grained cryptography revisited. (English) Zbl 1458.94232 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 637-666 (2019). Reviewer: Jaak Henno (Tallinn) MSC: 94A60 94C05 PDFBibTeX XMLCite \textit{S. Egashira} et al., Lect. Notes Comput. Sci. 11923, 637--666 (2019; Zbl 1458.94232) Full Text: DOI
Kitagawa, Fuyuki; Tanaka, Keisuke A framework for achieving KDM-CCA secure public-key encryption. (English) Zbl 1446.94146 Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 127-157 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{F. Kitagawa} and \textit{K. Tanaka}, Lect. Notes Comput. Sci. 11273, 127--157 (2018; Zbl 1446.94146) Full Text: DOI
Wang, Yuyu; Tanaka, Keisuke Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency. (English) Zbl 1368.94152 Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 213-229 (2015). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Wang} and \textit{K. Tanaka}, Lect. Notes Comput. Sci. 9144, 213--229 (2015; Zbl 1368.94152) Full Text: DOI
Wang, Yuyu; Tanaka, Keisuke Generic transformation to strongly existentially unforgeable signature schemes with leakage resiliency. (English) Zbl 1368.94151 Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 117-129 (2014). MSC: 94A62 PDFBibTeX XMLCite \textit{Y. Wang} and \textit{K. Tanaka}, Lect. Notes Comput. Sci. 8782, 117--129 (2014; Zbl 1368.94151) Full Text: DOI
Numayama, Akira; Tanaka, Keisuke On the weak ideal compression functions. (English) Zbl 1284.94096 Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 232-248 (2009). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{A. Numayama} and \textit{K. Tanaka}, Lect. Notes Comput. Sci. 5594, 232--248 (2009; Zbl 1284.94096) Full Text: DOI