Go Yamamoto

According to our database1, Go Yamamoto authored at least 13 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Intrinsic Mechanism Deciding Hash Rates from Bitcoin Price.
Proceedings of the Financial Cryptography and Data Security. FC 2023 International Workshops, 2023

2022
Stronger Security and Generic Constructions for Adaptor Signatures.
IACR Cryptol. ePrint Arch., 2022

A Taxonomy of Blockchain Oracles: The Truth Depends on the Question.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2022

2021
Selfish Mining Attacks Exacerbated by Elastic Hash Supply.
Proceedings of the Financial Cryptography and Data Security, 2021

2020
Equilibrium of Blockchain Miners with Dynamic Asset Allocation.
Proceedings of the 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services, 2020

2011
Self-correctors for Cryptographic Modules.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

2010
An Improvement of Key Generation Algorithm for Gentry's Homomorphic Encryption Scheme.
Proceedings of the Advances in Information and Computer Security, 2010

2008
Batch Processing for Proofs of Partial Knowledge and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Practical Password Recovery on an MD5 Challenge and Response.
IACR Cryptol. ePrint Arch., 2007

Batch Processing of Interactive Proofs.
Proceedings of the Topics in Cryptology, 2007

2005
Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

2004
Weak Property of Malleability in NTRUSign.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004


  Loading...