Jun Furukawa
Orcid: 0009-0002-6376-8167Affiliations:
- NEC Israel Research Center, Herzliya, Israel
- NEC Corporation, Kawasaki, Japan (former)
According to our database1,
Jun Furukawa
authored at least 43 papers
between 2001 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
J. Cryptol., July, 2023
IC-SECURE: Intelligent System for Assisting Security Experts in Generating Playbooks for Automated Incident Response.
CoRR, 2023
2022
2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Adversarial Robustness for Face Recognition: How to Introduce Ensemble Diversity among Feature Extractors?
Proceedings of the Workshop on Artificial Intelligence Safety 2021 (SafeAI 2021) co-located with the Thirty-Fifth AAAI Conference on Artificial Intelligence (AAAI 2021), 2021
2019
Two-Thirds Honest-Majority MPC for Malicious Adversaries at Almost the Cost of Semi-Honest.
IACR Cryptol. ePrint Arch., 2019
2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
Optimized Honest-Majority MPC for Malicious Adversaries - Breaking the 1 Billion-Gate Per Second Barrier.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
2016
High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
IEICE Trans. Inf. Syst., 2015
2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
2013
Proceedings of the Computer Security - ESORICS 2013, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
2010
An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010
Proceedings of the Selected Areas in Cryptography - 17th International Workshop, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the 5th Workshop on Digital Identity Management, 2009
2008
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the Progress in Cryptology, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007
Proceedings of the Financial Cryptography and Data Security, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Advances in Cryptology, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Advances in Cryptology, 2004
2002
An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling.
Proceedings of the Financial Cryptography, 6th International Conference, 2002
2001
Proceedings of the Advances in Cryptology, 2001