Keisuke Hara
Orcid: 0000-0003-3598-0988
According to our database1,
Keisuke Hara
authored at least 44 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Theor. Comput. Sci., 2025
Proceedings of the Provable and Practical Security, 2025
Proceedings of the Provable and Practical Security, 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Foundations of Multi-Designated Verifier Signature Comprehensive Formalization and New Constructions in Subset Simulation.
Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025
Proceedings of the 12th ACM ASIA Public-Key Cryptography Workshop, 2025
Proceedings of the Applied Cryptography and Network Security Workshops, 2025
2024
Theor. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
How to Accomplish Key and Communication Compression Over Authentication Channels - Proxy Re-authentication and Its Instantiations.
Proceedings of the Network and System Security - 18th International Conference, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the 11th ACM Asia Public-Key Cryptography Workshop, 2024
2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023
IACR Cryptol. ePrint Arch., 2023
On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes.
IACR Cryptol. ePrint Arch., 2023
Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Provable and Practical Security, 2023
Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities.
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023
Proceedings of the Progress in Cryptology - AFRICACRYPT 2023, 2023
2022
Surface Texturing Technique Based on Ultrasonic Turning for Improving Tribological Properties.
Int. J. Autom. Technol., 2022
Generic transformation from broadcast encryption to round-optimal deniable ring authentication.
Des. Codes Cryptogr., 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Improvement of Removal Rate of Tape Lapping by Applying Fluid with Ultrasonic Excited Cavitation.
Int. J. Autom. Technol., 2021
Effect of Vibration Direction of Ultrasonic Vibrating Cutting Edge on Internal Stress Fluctuation of Workpiece.
Int. J. Autom. Technol., 2021
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021
2020
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
2019
Visualization of Stress Distribution by Photoelastic Method Under Ultrasonic Grinding Condition.
Int. J. Autom. Technol., 2019
2018
Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
2015
Proceedings of the Next Frontier in Agent-Based Complex Automated Negotiation, 2015
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015
2013
Proceedings of the 4th IEEE PES Innovative Smart Grid Technologies Europe, 2013
Proceedings of the Recent Trends in Applied Artificial Intelligence, 2013
A Mediation Mechanism for Automated Negotiating Agents Whose Utility Changes over Time.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013