Hideaki Sone

Orcid: 0000-0002-9395-9987

According to our database1, Hideaki Sone authored at least 81 papers between 1997 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Actively revealing card attack on card-based protocols.
Nat. Comput., 2022

2021
How to construct physical zero-knowledge proofs for puzzles with a "single loop" condition.
Theor. Comput. Sci., 2021

Five-Card AND Computations in Committed Format Using Only Uniform Cyclic Shuffles.
New Gener. Comput., 2021

Committed-format AND protocol using only random cuts.
Nat. Comput., 2021

Evaluating card-based protocols in terms of execution time.
Int. J. Inf. Sec., 2021

Efficient Generation of a Card-Based Uniformly Distributed Random Derangement.
Proceedings of the WALCOM: Algorithms and Computation, 2021

Proposal of Information Hub Models for Effective Disaster Support Activities.
Proceedings of the International Conference on Information and Communication Technologies for Disaster Management, 2021

Card-Based ZKP Protocols for Takuzu and Juosan.
Proceedings of the 10th International Conference on Fun with Algorithms, 2021

A Secure Three-Input AND Protocol with a Standard Deck of Minimal Cards.
Proceedings of the Computer Science - Theory and Applications, 2021

Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2020
Card-based protocols for secure ranking computations.
Theor. Comput. Sci., 2020

Efficient card-based zero-knowledge proof for Sudoku.
Theor. Comput. Sci., 2020

Practical card-based implementations of Yao's millionaire protocol.
Theor. Comput. Sci., 2020

Secure implementations of a random bisection cut.
Int. J. Inf. Sec., 2020

Card-Based Covert Lottery.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

Public-PEZ Cryptography.
Proceedings of the Information Security - 23rd International Conference, 2020

Six-Card Finite-Runtime XOR Protocol with Only Random Cut.
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020

2019
Card-Based Physical Zero-Knowledge Proof for Kakuro.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Card-Based Protocol Against Actively Revealing Card Attack.
Proceedings of the Theory and Practice of Natural Computing - 8th International Conference, 2019

A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.
Proceedings of the Information Security Practice and Experience, 2019

Sharing Information to Eliminate Support Irregularities and Omissions: - Cases from Disaster Information Supporters in Japan -.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2019

Interactive Physical Zero-Knowledge Proof for Norinori.
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019

Card-Based Secure Ranking Computations.
Proceedings of the Combinatorial Optimization and Applications, 2019

2018
Card-based protocols using unequal division shuffles.
Soft Comput., 2018

Pile-Shifting Scramble for Card-Based Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Secret Key Amplification from Uniformly Leaked Key Exchange Complete Graph.
Proceedings of the WALCOM: Algorithms and Computation - 12th International Conference, 2018

Analyzing Execution Time of Card-Based Protocols.
Proceedings of the Unconventional Computation and Natural Computation, 2018

Physical Zero-Knowledge Proof for Makaro.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018

Online Media Usage by Disaster Volunteer Centers.
Proceedings of the 5th International Conference on Information and Communication Technologies for Disaster Management, 2018

Card-Based Zero-Knowledge Proof for Sudoku.
Proceedings of the 9th International Conference on Fun with Algorithms, 2018

Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol.
Proceedings of the Combinatorial Optimization and Applications, 2018

Five-Card AND Protocol in Committed Format Using Only Practical Shuffles.
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 2018

2017
Foreword.
IEICE Trans. Electron., 2017

Card-Based Protocols Using Unequal Division Shuffle.
IACR Cryptol. ePrint Arch., 2017

The Minimum Number of Cards in Practical Card-based Protocols.
IACR Cryptol. ePrint Arch., 2017

2016
How to Implement a Random Bisection Cut.
Proceedings of the Theory and Practice of Natural Computing - 5th International Conference, 2016

Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

An Implementation of Non-Uniform Shuffle for Secure Multi-Party Computation.
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016

2015
Securely Computing Three-Input Functions with Eight Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Five-Card Secure Computations Using Unequal Division Shuffle.
Proceedings of the Theory and Practice of Natural Computing, 2015

Card-Based Protocols for Any Boolean Function.
Proceedings of the Theory and Applications of Models of Computation, 2015

Fundamental study on randomized processing in cryptographic IC using variable clock against Correlation Power Analysis.
Proceedings of the 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits, 2015

Basic Study on the Method for Real-Time Video Streaming with Low Latency and High Bandwidth Efficiency.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

2014
Investigation of Noise Interference due to Connector Contact Failure in a Coaxial Cable.
IEICE Trans. Electron., 2014

Minimizing ESCT forms for two-variable multiple-valued input binary output functions.
Discret. Appl. Math., 2014

A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
Evaluation of Resistance and Inductance of Loose Connector Contact.
IEICE Trans. Electron., 2013

Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard.
IEICE Trans. Commun., 2013

Voting with a Logarithmic Number of Cards.
Proceedings of the Unconventional Computation and Natural Computation, 2013

Securely Computing the Three-Input Majority Function with Eight Cards.
Proceedings of the Theory and Practice of Natural Computing, 2013

Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Fault-Tolerant Wireless LAN Roaming System Using Client Certificates.
Proceedings of the 37th Annual IEEE Computer Software and Applications Conference, 2013

2012
Mechanism of Increase in Inductance at Loosened Connector Contact Boundary.
IEICE Trans. Electron., 2012

Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current.
IEICE Trans. Electron., 2012

Flexible Access Control Framework Considering IdP-Side's Authorization Policy in Roaming Environment.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

Implementation and Evaluation of an OpenFlow-Based Access Control System for Wireless LAN Roaming.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference Workshops, 2012

The Five-Card Trick Can Be Done with Four Cards.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
An Application of ST-Numbering to Secret Key Agreement.
Int. J. Found. Comput. Sci., 2011

Analysis of Electromagnetic Radiation from Transmission Line with Loose Contact of Connector.
IEICE Trans. Electron., 2011

Contact Conditions in Connectors that Cause Common Mode Radiation.
IEICE Trans. Electron., 2011

Flexible Access Management System for Campus VLAN Based on OpenFlow.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

Optimization System of IP Address Using Terminal ID in Eduroam.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

2010
Centralized Authentication System for Location Privacy Protection and Low Operational Cost of Large Scale WLAN Roaming.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Teaching Internet Safety at Universities using "Hikari & Tsubasa's Information Security Game".
Proceedings of the CSEDU 2010 - Proceedings of the Second International Conference on Computer Supported Education, Valencia, Spain, April 7-10, 2010, 2010

2009
A one-round secure message broadcasting protocol through a key sharing tree.
Inf. Process. Lett., 2009

The Effect of Position of a Connector Contact Failure on Electromagnetic Near-Field around a Coaxial Cable.
IEICE Trans. Commun., 2009

Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

Six-Card Secure AND and Four-Card Secure XOR.
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009

2008
Fundamental Measurement of Electromagnetic Field Radiated from a Coaxial Transmission Line Caused by Connector Contact Failure.
IEICE Trans. Electron., 2008

Resource Access Control for Wireless LAN Roaming Systems.
Proceedings of the 2008 International Symposium on Applications and the Internet, 2008

2007
An Application of ESOP Expressions to Secure Computations.
J. Circuits Syst. Comput., 2007

Secure Multiparty Computations Using a Dial Lock.
Proceedings of the Theory and Applications of Models of Computation, 2007

A Policy-Based, Secure Access Control Mechanism for Network Roaming Infrastructures.
Proceedings of the 2007 International Symposium on Applications and the Internet, 2007

Secure Multiparty Computations Using the 15 Puzzle.
Proceedings of the Combinatorial Optimization and Applications, 2007

2006
Formation Mechanism of Dark Bridge between Contacts with Very Slow Opening Speed.
IEICE Trans. Electron., 2006

Securely computing XOR with 10 cards.
Australas. J Comb., 2006

Secure Computations in a Minimal Model Using Multiple-Valued ESOP Expressions.
Proceedings of the Theory and Applications of Models of Computation, 2006

2005
Relationship between Length and Diameter of Contact Bridge Formed under Thermal Equilibrium Condition.
IEICE Trans. Electron., 2005

A Method to Monitor a BBS Using Feature Extraction of Text Data.
Proceedings of the Web and Communication Technologies and Internet-Related Social Issues, 2005

Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion.
Proceedings of the Digital Rights Management: Technologies, 2005

1997
Divide and Conquer Technique for Network Fault Management.
Proceedings of the Integrated Network Management V, 1997


  Loading...