Follow
Shinsaku Kiyomoto
Shinsaku Kiyomoto
KDDI Research Inc.
Verified email at kddi-research.jp
Title
Cited by
Year
Threshold Ring Signatures with Accountability
XT Khuc, W Susilo, DH Duong, F Guo, K Fukushima, S Kiyomoto
Australasian Conference on Information Security and Privacy, 368-388, 2024
2024
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems
TN Nguyen, W Susilo, DH Duong, F Guo, K Fukushima, S Kiyomoto
Australasian Conference on Information Security and Privacy, 269-289, 2024
2024
Vulnerability Information Sharing Platform for Securing Hardware Supply Chains.
K Hasegawa, K Hanahara, H Sugisaki, M Kozu, K Fukushima, ...
ICISSP, 403-410, 2024
2024
Logarithmic-Size (Linkable) Ring Signatures from Lattice Isomorphism Problems
XT Khuc, AT Ta, W Susilo, DH Duong, F Guo, K Fukushima, S Kiyomoto
International Conference on Security, Privacy, and Applied Cryptography …, 2023
2023
Compact Ring Signatures with Post-Quantum Security in Standard Model
TN Nguyen, W Susilo, DH Duong, F Guo, K Fukushima, S Kiyomoto
International Conference on Information Security and Cryptology, 65-84, 2023
2023
Compact Accountable Ring Signatures in the Plain Model
TX Khuc, W Susilo, DH Duong, F Guo, K Fukushima, S Kiyomoto
International Conference on Information Security and Cryptology, 23-43, 2023
2023
Gpu acceleration of high-precision homomorphic computation utilizing redundant representation
S Narisada, H Okada, K Fukushima, S Kiyomoto, T Nishide
Proceedings of the 11th Workshop on Encrypted Computing & Applied …, 2023
12023
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations
HQ Nguyen-Son, S Hidano, K Fukushima, S Kiyomoto, I Echizen
arXiv preprint arXiv:2306.01273, 2023
2023
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence
H Okada, K Fukushima, S Kiyomoto, T Takagi
International Conference on Applied Cryptography and Network Security, 695-724, 2023
2023
Multiparallel MMT: Faster ISD Algorithm Solving High-Dimensional Syndrome Decoding Problem
S Narisada, K Fukushima, S Kiyomoto
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2023
22023
実環境回路に挿入されたハードウェアトロイを対象としたグラフ学習によるゲートレベルハードウェアトロイ識別
Y IKEGAMI, K YAMASHITA, K HASEGAWA, K FUKUSHIMA, S KIYOMOTO, ...
電子情報通信学会技術研究報告 (Web) 122 (402 (VLD2022 73-122)), 191-196, 2023
2023
Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine.
S Narisada, S Beppu, K Fukushima, S Kiyomoto
ICISSP, 329-338, 2023
12023
CheckHARD: Checking hard labels for adversarial text detection, prediction correction, and perturbed word suggestion
HQ Nguyen-Son, HQ Ung, S Hidano, K Fukushima, S Kiyomoto
Findings of the Association for Computational Linguistics: EMNLP 2022, 2903-2913, 2022
32022
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding
M Ishizaka, K Fukushima, S Kiyomoto
International Conference on Information Security and Cryptology, 337-362, 2022
12022
R-htdetector: Robust hardware-trojan detection based on adversarial training
K Hasegawa, S Hidano, K Nozawa, S Kiyomoto, N Togawa
IEEE Transactions on Computers 72 (2), 333-345, 2022
162022
Zero-Knowledge Range Arguments for Signed Fractional Numbers from Lattices
P Dutta, DH Duong, W Susilo, K Fukushima, S Kiyomoto
International Conference on Provable Security, 121-136, 2022
2022
Efficient unique ring signatures from lattices
TN Nguyen, AT Ta, HQ Le, DH Duong, W Susilo, F Guo, K Fukushima, ...
European Symposium on Research in Computer Security, 447-466, 2022
32022
AI 時代のサイバーセキュリティ: 3. AI によるサイバーセキュリティ防御-AI を活用したセキュリティ対策研究の最前線
清本晋作, 中原正隆, 成定真太郎, 長谷川健人
情報処理 63 (10), e14-e19, 2022
2022
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model
PS Roy, DH Duong, W Susilo, A Sipasseuth, K Fukushima, S Kiyomoto
Theoretical Computer Science 929, 124-139, 2022
102022
Security Inspection Framework and its Application to Use Cases
Y Nakano, Y Kobayashi, T Kojima, Y Miyake, S Kiyomoto
2022 IEEE 28th International Conference on Engineering, Technology and …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20