Kazuhide Fukushima
Orcid: 0000-0003-2571-0116
According to our database1,
Kazuhide Fukushima
authored at least 122 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Computers, March, 2025
Comput. Secur., 2025
2024
Private Verification in Multi-stakeholder Environment and its Application to Stable Matching.
SN Comput. Sci., March, 2024
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
Time-Memory Trade-off Algorithms for Homomorphically Evaluating Look-up Table in TFHE.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the IEEE Conference on Secure and Trustworthy Machine Learning, 2024
Traceable Ring Signatures: Logarithmic-Size, Without Any Setup, from Standard Assumptions.
Proceedings of the Provable and Practical Security, 2024
Proceedings of the Information Security - 27th International Conference, 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024
Prioritizing Vulnerability Assessment Items Using LLM Based on IoT Device Documentations.
Proceedings of the 11th International Conference on Internet of Things: Systems, 2024
Feasibility of Random Forest with Fully Homomorphic Encryption Applied to Network Data.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
AutoRed: Automating Red Team Assessment via Strategic Thinking Using Reinforcement Learning.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Fast verification and public key storage optimization for unstructured lattice-based signatures.
J. Cryptogr. Eng., September, 2023
J. Inf. Secur. Appl., June, 2023
Multiparallel MMT: Faster ISD Algorithm Solving High-Dimensional Syndrome Decoding Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
IACR Cryptol. ePrint Arch., 2023
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation.
IACR Cryptol. ePrint Arch., 2023
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications.
IACR Cryptol. ePrint Arch., 2023
IEEE Access, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching.
Proceedings of the 25th International Conference on Enterprise Information Systems, 2023
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
2022
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model.
Theor. Comput. Sci., 2022
Chosen-ciphertext lattice-based public key encryption with equality test in standard model.
Theor. Comput. Sci., 2022
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 pp.1219-1234].
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature.
Proceedings of the 19th International Conference on Security and Cryptography, 2022
Proceedings of the Provable and Practical Security, 2022
Effective Hardware-Trojan Feature Extraction Against Adversarial Attacks at Gate-Level Netlists.
Proceedings of the 28th IEEE International Symposium on On-Line Testing and Robust System Design, 2022
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform.
IET Inf. Secur., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Comput. Stand. Interfaces, 2021
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text.
Proceedings of the 35th Pacific Asia Conference on Language, Information and Computation, 2021
Proceedings of the Advances in Information and Computer Security, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the 28th IEEE Symposium on Computer Arithmetic, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
CoRR, 2020
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms.
Secur. Commun. Networks, 2018
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018
2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
2014
J. Ambient Intell. Humaniz. Comput., 2014
IEICE Trans. Inf. Syst., 2014
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2013
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
IEEE Trans. Consumer Electron., 2011
Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism.
J. Internet Serv. Inf. Secur., 2011
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Proceedings of the Security Technology, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the POLICY 2010, 2010
Proceedings of the Advances in Information and Computer Security, 2010
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Proceedings of the 2010 International Conference on Security & Management, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
An Offline Peer-to-peer Broadcasting Scheme with Anonymity.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
J. Inf. Process., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
2007
Inf. Media Technol., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
2006
Inf. Media Technol., 2006
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006
2003
Proceedings of the Information Security Applications, 4th International Workshop, 2003