Bagus Santoso
Orcid: 0000-0003-4604-305X
According to our database1,
Bagus Santoso
authored at least 40 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters for Standardized Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Proceedings of the IEEE International Symposium on Information Theory, 2024
2023
IACR Cryptol. ePrint Arch., 2023
2022
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability.
Proceedings of the International Symposium on Information Theory and Its Applications, 2022
A Framework for Distributed Source Coding with Encryption: a New Strong Converse and More.
Proceedings of the International Symposium on Information Theory and Its Applications, 2022
A Framework for Shannon Ciphers under Side-Channel Attacks: a Strong Converse and More.
Proceedings of the IEEE International Symposium on Information Theory, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the IEEE Information Theory Workshop, 2021
Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin.
IACR Cryptol. ePrint Arch., 2020
Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
2019
Secrecy Amplification of Distributed Encrypted Sources With Correlated Keys Using Post-Encryption-Compression.
IEEE Trans. Inf. Forensics Secur., 2019
A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries.
J. Univers. Comput. Sci., 2019
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks <sup>†</sup>.
Entropy, 2019
Information Theoretic Security for Shannon Cipher System under Side-Channel Attacks <sup>†</sup>.
Entropy, 2019
Information Theoretic Security for Broadcasting of Two Encrypted Sources under Side-Channel Attacks.
CoRR, 2019
Measuring Security of Symmetric Encryption Schemes Against On-the-Fly Side-Channel Key-Recovery Attacks.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
2018
Reviving Identification Scheme Based on Isomorphism of Polynomials with Two Secrets: a Refined Theoretical and Practical Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Secrecy Amplification for Distributed Encrypted Sources with Correlated Keys using Affine Encoders.
CoRR, 2018
Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System.
CoRR, 2018
Entanglement Between Hash Encodings and Signatures from ID Schemes with Non-binary Challenges: A Case Study on Lightweight Code-Based Signatures.
Proceedings of the Information Security Practice and Experience, 2018
A New Three-Pass Code-based Zero-Knowledge Identification Scheme with Cheating Probability of Exactly Half.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Post Encryption Compression with Affine Encoders for Secrecy Amplification in Distributed Source Encryption with Correlated Keys.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model.
Proceedings of the Provable Security, 2017
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017
2016
Refining Identification Scheme based on Isomorphism of Polynomials with Two Secrets: a New Theoretical and Practical Analysis.
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016
2012
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
2011
An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
2010
Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.
Proceedings of the Topics in Cryptology, 2010
2009
A New 'On the Fly' Identification Scheme: An Asymptoticity Trade-Off between ZK and Correctness.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008