Daiki Miyahara

Orcid: 0000-0002-5818-8937

According to our database1, Daiki Miyahara authored at least 50 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
Physical ZKP protocols for Nurimisaki and Kurodoko.
Theor. Comput. Sci., September, 2023

Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography.
J. Inf. Process., 2023

Abstraction Model of Probing and DFA Attacks on Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M.
IACR Cryptol. ePrint Arch., 2023

Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun.
IACR Cryptol. ePrint Arch., 2023

On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Few-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges.
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023

2022
Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake.
New Gener. Comput., 2022

Actively revealing card attack on card-based protocols.
Nat. Comput., 2022

Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle.
Inf. Comput., 2022

Hide a Liar: Card-Based ZKP Protocol for Usowan.
Proceedings of the Theory and Applications of Models of Computation, 2022

Card-Based ZKP Protocol for Nurimisaki.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2022

Towards Verifying Physical Assumption in Card-Based Cryptography.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

Card-Based Secure Sorting Protocol.
Proceedings of the Advances in Information and Computer Security, 2022

Card-Minimal Protocols for Symmetric Boolean Functions of More than Seven Inputs.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2022, 2022

Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M0.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

Secure Computations Through Checking Suits of Playing Cards.
Proceedings of the Frontiers of Algorithmic Wisdom, 2022

Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR Computations.
Proceedings of the APKC '22: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, 2022

Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards.
Proceedings of the Progress in Cryptology, 2022

2021
How to construct physical zero-knowledge proofs for puzzles with a "single loop" condition.
Theor. Comput. Sci., 2021

Evaluating card-based protocols in terms of execution time.
Int. J. Inf. Sec., 2021

Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori.
IACR Cryptol. ePrint Arch., 2021

Efficient Generation of a Card-Based Uniformly Distributed Random Derangement.
Proceedings of the WALCOM: Algorithms and Computation, 2021

Zero-Knowledge Proof Protocol for Cryptarithmetic Using Dihedral Cards.
Proceedings of the Unconventional Computation and Natural Computation, 2021

Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational Model.
Proceedings of the Provable and Practical Security, 2021

Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021

Card-Based ZKP Protocols for Takuzu and Juosan.
Proceedings of the 10th International Conference on Fun with Algorithms, 2021

A Secure Three-Input AND Protocol with a Standard Deck of Minimal Cards.
Proceedings of the Computer Science - Theory and Applications, 2021

Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

A Card-Minimal Three-Input AND Protocol Using Two Shuffles.
Proceedings of the Computing and Combinatorics - 27th International Conference, 2021

New Card-based Copy Protocols Using Only Random Cuts.
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021

2020
Card-based protocols for secure ranking computations.
Theor. Comput. Sci., 2020

Efficient card-based zero-knowledge proof for Sudoku.
Theor. Comput. Sci., 2020

Practical card-based implementations of Yao's millionaire protocol.
Theor. Comput. Sci., 2020

Secure implementations of a random bisection cut.
Int. J. Inf. Sec., 2020

How to Implement a Non-uniform or Non-closed Shuffle.
Proceedings of the Theory and Practice of Natural Computing - 9th International Conference, 2020

Physical Zero-Knowledge Proof for Suguru Puzzle.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020

Card-Based Covert Lottery.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Public-PEZ Cryptography.
Proceedings of the Information Security - 23rd International Conference, 2020

Six-Card Finite-Runtime XOR Protocol with Only Random Cut.
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020

2019
Card-Based Physical Zero-Knowledge Proof for Kakuro.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Card-Based Protocol Against Actively Revealing Card Attack.
Proceedings of the Theory and Practice of Natural Computing - 8th International Conference, 2019

A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.
Proceedings of the Information Security Practice and Experience, 2019

Interactive Physical Zero-Knowledge Proof for Norinori.
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019

Card-Based Secure Ranking Computations.
Proceedings of the Combinatorial Optimization and Applications, 2019

2018
Analyzing Execution Time of Card-Based Protocols.
Proceedings of the Unconventional Computation and Natural Computation, 2018

Physical Zero-Knowledge Proof for Makaro.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018

Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol.
Proceedings of the Combinatorial Optimization and Applications, 2018

2017
The Minimum Number of Cards in Practical Card-based Protocols.
IACR Cryptol. ePrint Arch., 2017


  Loading...