Nuttapong Attrapadung
Orcid: 0000-0003-4116-1751
According to our database1,
Nuttapong Attrapadung
authored at least 83 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
Des. Codes Cryptogr., May, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the IEEE International Joint Conference on Biometrics, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
2022
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.
Proc. Priv. Enhancing Technol., 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts.
IACR Cryptol. ePrint Arch., 2019
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
IET Inf. Secur., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Provable Security, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the Computer Security, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IEICE Trans. Inf. Syst., 2017
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits.
IACR Cryptol. ePrint Arch., 2017
2016
Time-specific encryption from forward-secure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016
IACR Cryptol. ePrint Arch., 2016
Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
BMC Bioinform., December, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps.
IACR Cryptol. ePrint Arch., 2014
Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More.
IACR Cryptol. ePrint Arch., 2014
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014
2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Information Security, 16th International Conference, 2013
2012
Theor. Comput. Sci., 2012
Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation.
J. Math. Cryptol., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
2010
Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation.
Proceedings of the Public Key Cryptography, 2010
2009
Proceedings of the Pairing-Based Cryptography, 2009
Proceedings of the Cryptography and Coding, 2009
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009
2008
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Trans. Inf. Syst., 2008
Proceedings of the Progress in Cryptology, 2008
2007
Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Proceedings of the Provable Security, 2007
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007
2006
Inf. Media Technol., 2006
Proceedings of the LATIN 2006: Theoretical Informatics, 2006
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Advances in Cryptology, 2006
2005
IACR Cryptol. ePrint Arch., 2005
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations.
Proceedings of the Advances in Cryptology, 2005
2003
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003