Masayuki Yoshino

According to our database1, Masayuki Yoshino authored at least 25 papers between 2006 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Systematic Literature Review of Security Pattern Research.
Inf., 2021

2020
Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020

2019
Definition and Efficient Construction of Encrypted k-anonymization Scheme.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

2018
Cloud Security and Privacy Metamodel - Metamodel for Security and Privacy Knowledge in Cloud Services.
Proceedings of the 6th International Conference on Model-Driven Engineering and Software Development, 2018

Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem.
Proceedings of the Advances in Information and Computer Security, 2018

Decentralized Netting Protocol over Consortium Blockchain.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2017
Auditable Zerocoin.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

2015
Key Update Mechanism Using All-or-Nothing Transform for Network Storage of Encrypted Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2013
Random Sampling Reduction with Precomputation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

How to Evaluate Contents Popularity over Oblivious Transfer.
Proceedings of the Ninth International Conference on Signal-Image Technology & Internet-Based Systems, 2013

Key Update Mechanism for Network Storage of Encrypted Data.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013

2012
Symmetric Inner-Product Predicate Encryption Based on Three Groups.
Proceedings of the Provable Security - 6th International Conference, 2012

Improving GGH cryptosystem for large error vector.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Upper bound of the shortest vector coefficients and its applications.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
Symmetric Searchable Encryption for Database Applications.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

2010
Recursive Double-Size Modular Multiplications from Euclidean and Montgomery Multipliers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2009
Bipartite modular multiplication with twice the bit-length of multipliers.
Int. J. Inf. Sec., 2009

Faster Double-Size Bipartite Multiplication out of Montgomery Multipliers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients.
Proceedings of the Topics in Cryptology, 2009

2008
Montgomery Multiplication with Twice the Bit-Length of Multipliers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Black Hen Lays White Eggs.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Double-Size Bipartite Modular Multiplication.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006


  Loading...