Shinsaku Kiyomoto
Orcid: 0000-0003-0268-0532
According to our database1,
Shinsaku Kiyomoto
authored at least 237 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 21st International Conference on Security and Cryptography, 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
Multiparallel MMT: Faster ISD Algorithm Solving High-Dimensional Syndrome Decoding Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
IEEE Trans. Computers, February, 2023
IACR Cryptol. ePrint Arch., 2023
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023
VoteTRANS: Detecting Adversarial Text without Training by Voting on Hard Labels of Transformations.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2023, 2023
2022
Lattice-based public-key encryption with equality test supporting flexible authorization in standard model.
Theor. Comput. Sci., 2022
Chosen-ciphertext lattice-based public key encryption with equality test in standard model.
Theor. Comput. Sci., 2022
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 pp.1219-1234].
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Provable and Practical Security, 2022
Proceedings of the 17th International Joint Conference on Computer Vision, 2022
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the 17th International Joint Conference on Computer Vision, 2022
Proceedings of the Computer Vision, Imaging and Computer Graphics Theory and Applications, 2022
CheckHARD: Checking Hard Labels for Adversarial Text Detection, Prediction Correction, and Perturbed Word Suggestion.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
Hierarchical Identity-based Puncturable Encryption from Lattices with Application to Forward Security.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IEEE Trans. Big Data, 2021
Generating Adversarial Examples for Hardware-Trojan Detection at Gate-Level Netlists.
J. Inf. Process., 2021
Integer-Wise Functional Bootstrapping on TFHE: Applications in Secure Integer Arithmetics.
Inf., 2021
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform.
IET Inf. Secur., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs.
IACR Cryptol. ePrint Arch., 2021
Comput. Stand. Interfaces, 2021
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering Research, 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
SEPP: Similarity Estimation of Predicted Probabilities for Defending and Detecting Adversarial Text.
Proceedings of the 35th Pacific Asia Conference on Language, Information and Computation, 2021
Machine Translated Text Detection Through Text Similarity with Round-Trip Translation.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021
Proceedings of the Advances in Information and Computer Security, 2021
(Short Paper) Evidence Collection and Preservation System with Virtual Machine Monitoring.
Proceedings of the Advances in Information and Computer Security, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Data Augmentation for Machine Learning-Based Hardware Trojan Detection at Gate-Level Netlists.
Proceedings of the 27th IEEE International Symposium on On-Line Testing and Robust System Design, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the 7th International Conference on Information Systems Security and Privacy, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Toward Learning Robust Detectors from Imbalanced Datasets Leveraging Weighted Adversarial Training.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
Proceedings of the 28th IEEE Symposium on Computer Arithmetic, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Accountable Cross-Border Data Sharing Using Blockchain Under Relaxed Trust Assumption.
IEEE Trans. Engineering Management, 2020
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques.
Proc. Priv. Enhancing Technol., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Inf. Syst., 2020
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption.
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the Information Systems Security and Privacy - 6th International Conference, 2020
Evaluating the Effect of Justification and Confidence Information on User Perception of a Privacy Policy Summarization Tool.
Proceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Proceedings of the 2020 European Conference on Networks and Communications, 2020
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2020
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020
2019
The Effects of Nudging a Privacy Setting Suggestion Algorithm's Outputs on User Acceptability.
J. Inf. Process., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Privacy-friendly platform for healthcare data in cloud based on blockchain environment.
Future Gener. Comput. Syst., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the 17th International Conference on Privacy, Security and Trust, 2019
Proceedings of the Mobile Web and Intelligent Information Systems, 2019
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the 12th International Conference on Natural Language Generation, 2019
Proceedings of the Trust Management XIII - 13th IFIP WG 11.11 International Conference, 2019
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Information Systems Security and Privacy - 5th International Conference, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the Computer Security - ESORICS 2019 International Workshops, 2019
Proceedings of the Computational Linguistics and Intelligent Text Processing, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms.
Secur. Commun. Networks, 2018
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2018
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Trans. Inf. Syst., 2018
I Read but Don't Agree: Privacy Policy Benchmarking using Machine Learning and the EU GDPR.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the Information Security Theory and Practice, 2018
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018
Proceedings of the 3rd International Conference on Internet of Things, 2018
Challenges in Classifying Privacy Policies by Machine Learning with Word-based Features.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018
PrivacyGuide: Towards an Implementation of the EU GDPR on Internet Privacy Policy Evaluation.
Proceedings of the Fourth ACM International Workshop on Security and Privacy Analytics, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Decentralized Ciphertext-Policy Attribute-Based Encryption: A Post-Quantum Construction.
J. Internet Serv. Inf. Secur., 2017
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Proceedings of the 15th IEEE International Conference on Software Engineering Research, 2017
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the Genetic and Evolutionary Computation Conference, 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017
Default Privacy Setting Prediction by Grouping User's Attributes and Settings Preferences.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Int. J. Netw. Comput., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Decentralized Ciphertext-Policy Attribute-Based Encryption from Learning with Errors over Rings.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Towards Practical k-Anonymization: Correlation-based Construction of Generalization Hierarchy.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the ICT Systems Security and Privacy Protection, 2016
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016
Proceedings of the Mobile Internet Security - First International Symposium, 2016
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016
Proceedings of the Information Systems Security and Privacy, 2016
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Computational Intelligence and Intelligent Systems, 2015
Proceedings of the IEEE First International Smart Cities Conference, 2015
Proceedings of the Trust Management IX - 9th IFIP WG 11.11 International Conference, 2015
Proceedings of the Cloud Computing - 6th International Conference, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015
2014
J. Ambient Intell. Humaniz. Comput., 2014
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Inf. Syst., 2014
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
A Multiple-server Efficient Reusable Proof of Data Possesion from Private Information Retrieval Techniques.
Proceedings of the SECRYPT 2014, 2014
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the Symposium on Applied Computing, 2014
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the Trust Management VIII - 8th IFIP WG 11.11 International Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the IEEE 6th International Conference on Cloud Computing Technology and Science, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
Proceedings of the Availability, Reliability, and Security in Information Systems, 2014
2013
Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the SECRYPT 2013, 2013
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012
On Designing Privacy-Aware Data Upload Mechanism - Towards Information-Gathering System for Disasters.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Smart Card Research and Advanced Applications, 2012
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012
2011
IEEE Trans. Consumer Electron., 2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism.
J. Internet Serv. Inf. Secur., 2011
Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Automatic security verification for 3-party authentication and key exchange protocols.
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Proceedings of the Security Technology, 2011
Proceedings of the Applied Cryptography and Network Security, 2011
Proceedings of the Sixth International Conference on Availability, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
On a Construction of Stream-cipher-based Hash Functions.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the POLICY 2010, 2010
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010
A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Proceedings of the 2010 International Conference on Security & Management, 2010
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009
An Offline Peer-to-peer Broadcasting Scheme with Anonymity.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
J. Inf. Process., 2008
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
FPGA-Targeted Hardware Implementations of K2.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008
On-the-Fly Automatic Generation of Security Protocols.
Proceedings of the ICEIS 2008, 2008
2007
Syst. Comput. Jpn., 2007
Inf. Media Technol., 2007
Inf. Media Technol., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
2006
Inf. Media Technol., 2006
Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004