Toshiyuki Isshiki

According to our database1, Toshiyuki Isshiki authored at least 16 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Threshold Fully Homomorphic Encryption Over the Torus.
Proceedings of the Computer Security - ESORICS 2023, 2023

Fuzzy Signature with Biometric-Independent Verification.
Proceedings of the International Conference of the Biometrics Special Interest Group, 2023

2022
Research on the TRM Kaizen Method for Governmental Organizations to Apply Technology Roadmapping as a Methodology to Achieve the Goals of Industrial Technology Policy.
IEEE Trans. Engineering Management, 2022

2021
Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

2019
Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

2018
Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2013
Factoring-Based Proxy Re-Encryption Schemes.
Proceedings of the Provable Security - 7th International Conference, 2013

Attacks to the Proxy Re-Encryption Schemes from IWSEC2011.
Proceedings of the Advances in Information and Computer Security, 2013

Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012.
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013

New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems.
Proceedings of the 2013 BIOSIG, 2013

2012
Controlled Joining on Encrypted Relational Database.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

2011
Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology.
Proceedings of the HOST 2011, 2011

2010
A Rational Secret-Sharing Scheme Based on RSA-OAEP.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2008
Security of Digital Signature Schemes in Weakened Random Oracle Models.
Proceedings of the Public Key Cryptography, 2008

2006
Using group signatures for identity management and its implementation.
Proceedings of the 2006 Workshop on Digital Identity Management, 2006

2005
An (n-t)-out-of-n Threshold Ring Signature Scheme.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005


  Loading...