Hiroki Shizuya
Orcid: 0000-0002-8441-0407
According to our database1,
Hiroki Shizuya
authored at least 43 papers
between 1990 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
1990
1995
2000
2005
2010
2015
2020
0
1
2
3
4
5
6
7
1
2
1
1
3
1
1
2
1
2
4
1
1
1
1
1
1
1
3
1
1
1
1
1
2
1
1
1
1
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
On the Higher bit Version of Approximate Inhomogeneous Short Integer Solution Problem.
IACR Cryptol. ePrint Arch., 2022
Preimage Sampling in the Higher-bit Approximate Setting with a Non-spherical Gaussian Sampler.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
2021
On a Relation between Knowledge-of-Exponent Assumptions and the DLog vs. CDH Question.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
2020
Proceedings of the Theory and Practice of Natural Computing - 9th International Conference, 2020
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
2014
Int. J. Inf. Sec., 2014
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the International Symposium on Information Theory and its Applications, 2014
Proceedings of the Fun with Algorithms - 7th International Conference, 2014
On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
On the Length-Decreasing Self-Reducibility and the Many-One-Like Reducibilities for Partial Multivalued Functions.
IEICE Trans. Inf. Syst., 2013
Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
2005
The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
2002
Int. J. Inf. Sec., 2002
Proceedings of the Progress in Cryptology, 2002
2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software.
Proceedings of the Information Security, Third International Workshop, 2000
1999
J. Cryptol., 1999
Proceedings of the Advances in Cryptology, 1999
1998
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems.
J. Cryptol., 1998
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Computing and Combinatorics, 4th Annual International Conference, 1998
1997
1996
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996
1995
Proceedings of the Advances in Cryptology, 1995
1994
Proceedings of the Advances in Cryptology, 1994
1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990