Bagus Santoso

Orcid: 0000-0003-4604-305X

According to our database1, Bagus Santoso authored at least 37 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters.
IACR Cryptol. ePrint Arch., 2023

Universal Coding for Shannon Ciphers under Side-Channel Attacks.
CoRR, 2023

2022
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability.
CoRR, 2022

Strong Converse Theorem for Source Encryption under Side-Channel Attacks.
CoRR, 2022

A Framework for Shannon Ciphers under Side-Channel Attacks: a Strong Converse and More.
Proceedings of the IEEE International Symposium on Information Theory, 2022

A Systematic Study of Bulletin Board and Its Application.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials.
IACR Cryptol. ePrint Arch., 2021

Distributed Source Coding with Encryption Using Correlated Keys.
CoRR, 2021

Strong Converse for Distributed Source Coding with Encryption Using Correlated Keys.
Proceedings of the IEEE Information Theory Workshop, 2021

Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin.
IACR Cryptol. ePrint Arch., 2020

Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

2019
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression.
IEEE Trans. Inf. Forensics Secur., 2019

A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries.
J. Univers. Comput. Sci., 2019

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks <sup>†</sup>.
Entropy, 2019

Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks <sup>†</sup>.
Entropy, 2019

Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks.
CoRR, 2019

Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks.
Proceedings of the Network and System Security - 13th International Conference, 2019

Secure Broadcasting of Two Encrypted Sources under Side-Channel Attacks.
Proceedings of the IEEE International Symposium on Information Theory, 2019

2018
Reviving Identification Scheme Based on Isomorphism of Polynomials with Two Secrets: a Refined Theoretical and Practical Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders.
CoRR, 2018

Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System.
CoRR, 2018

Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures.
Proceedings of the Information Security Practice and Experience, 2018

A New Three-Pass Code-based Zero-Knowledge Identification Scheme with Cheating Probability of Exactly Half.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Post Encryption Compression with Affine Encoders for Secrecy Amplification in Distributed Source Encryption with Correlated Keys.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

2017
Universally Composable RFID Mutual Authentication.
IEEE Trans. Dependable Secur. Comput., 2017

Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model.
Proceedings of the Provable Security, 2017

Privacy amplification of distributed encrypted sources with correlated keys.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

2016
Refining Identification Scheme based on Isomorphism of Polynomials with Two Secrets: a New Theoretical and Practical Analysis.
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016

2012
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

2011
An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Sequential Bitwise Sanitizable Signature Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

2010
Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.
Proceedings of the Topics in Cryptology, 2010

2009
A New 'On the Fly' Identification Scheme: An Asymptoticity Trade-Off between ZK and Correctness.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

2008
Factorization of Square-Free Integers with High Bits Known.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008


  Loading...