Ryo Kikuchi
According to our database1,
Ryo Kikuchi
authored at least 31 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
J. Cryptol., July, 2023
Efficient decision tree training with new data structure for secure multi-party computation.
Proc. Priv. Enhancing Technol., January, 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
2022
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.
Proc. Priv. Enhancing Technol., 2022
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters.
IACR Cryptol. ePrint Arch., 2022
2019
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the IEEE International Conference on Industrial Technology, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority.
IACR Cryptol. ePrint Arch., 2018
Comparative Study of the Effectiveness of Perturbative Methods for Creating Official Microdata in Japan.
Proceedings of the Privacy in Statistical Databases, 2018
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018
2017
IET Inf. Secur., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 ACM International Conference on Management of Data, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Exploring Complexity in Health: An Interdisciplinary Systems Approach - Proceedings of MIE2016 at HEC2016, Munich, Germany, 28 August, 2016
2015
Adaptively and Unconditionally Secure Conversion Protocols between Ramp and Linear Secret Sharing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the Advances in Information and Computer Security, 2015
Implementation and evaluation of a combined optimization scheme for routing and channel assignment in wireless mesh networks.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015
Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
2014
Actively Private and Correct MPC Scheme in t<n/2 from Passively Secure Schemes with Small Overhead.
IACR Cryptol. ePrint Arch., 2014
2013
Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2010
Proceedings of the Provable Security - 4th International Conference, 2010