Takaaki Mizuki
Orcid: 0000-0002-8698-1043
According to our database1,
Takaaki Mizuki
authored at least 124 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
New Gener. Comput., September, 2024
Proceedings of the Unconventional Computation and Natural Computation, 2024
Card-Based Zero-Knowledge Proof Protocols for the 15-Puzzle and the Token Swapping Problem.
Proceedings of the 11th ACM Asia Public-Key Cryptography Workshop, 2024
Proceedings of the 11th ACM Asia Public-Key Cryptography Workshop, 2024
2023
Theor. Comput. Sci., September, 2023
Proceedings of the Unconventional Computation and Natural Computation, 2023
Proceedings of the Fundamentals of Computation Theory - 24th International Symposium, 2023
Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input and Protocols.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
Few-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges.
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 2023
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023
2022
New Gener. Comput., 2022
Inf. Comput., 2022
Inf. Comput., 2022
Proceedings of the Theory and Applications of Models of Computation, 2022
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2022
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022
Proceedings of the Advances in Information and Computer Security, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the Theoretical Aspects of Computing - ICTAC 2022, 2022
Proceedings of the Frontiers of Algorithmic Wisdom, 2022
Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR Computations.
Proceedings of the APKC '22: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, 2022
Proceedings of the Progress in Cryptology, 2022
2021
How to construct physical zero-knowledge proofs for puzzles with a "single loop" condition.
Theor. Comput. Sci., 2021
New Gener. Comput., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the WALCOM: Algorithms and Computation, 2021
Proceedings of the Unconventional Computation and Natural Computation, 2021
Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational Model.
Proceedings of the Provable and Practical Security, 2021
Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation.
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Proceedings of the 10th International Conference on Fun with Algorithms, 2021
Proceedings of the Computer Science - Theory and Applications, 2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
Proceedings of the Computing and Combinatorics - 27th International Conference, 2021
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021
2020
Theor. Comput. Sci., 2020
Proceedings of the Theory and Practice of Natural Computing - 9th International Conference, 2020
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2020
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020
Proceedings of the Information Security - 23rd International Conference, 2020
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Proceedings of the Theory and Practice of Natural Computing - 8th International Conference, 2019
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation.
Proceedings of the Information Security Practice and Experience, 2019
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019
Proceedings of the Frontiers in Algorithmics - 13th International Workshop, 2019
Proceedings of the Computing and Combinatorics - 25th International Conference, 2019
Proceedings of the Combinatorial Optimization and Applications, 2019
Proceedings of the 6th on ASIA Public-Key Cryptography Workshop, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Proceedings of the WALCOM: Algorithms and Computation - 12th International Conference, 2018
Proceedings of the Unconventional Computation and Natural Computation, 2018
Proceedings of the Theory and Practice of Natural Computing - 7th International Conference, 2018
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018
Proceedings of the Combinatorial Algorithms - 29th International Workshop, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
Proceedings of the 9th International Conference on Fun with Algorithms, 2018
Proceedings of the 9th International Conference on Fun with Algorithms, 2018
Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol.
Proceedings of the Combinatorial Optimization and Applications, 2018
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
2016
Theor. Comput. Sci., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Proceedings of the Theory and Practice of Natural Computing - 5th International Conference, 2016
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Efficient Card-Based Protocols for Generating a Hidden Random Permutation Without Fixed Points.
Proceedings of the Unconventional Computation and Natural Computation, 2015
Proceedings of the Theory and Practice of Natural Computing, 2015
Proceedings of the Theory and Applications of Models of Computation, 2015
Proceedings of the Provable Security, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Fundamental study on randomized processing in cryptographic IC using variable clock against Correlation Power Analysis.
Proceedings of the 10th International Workshop on the Electromagnetic Compatibility of Integrated Circuits, 2015
Basic Study on the Method for Real-Time Video Streaming with Low Latency and High Bandwidth Efficiency.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
2014
Int. J. Inf. Sec., 2014
Investigation of Noise Interference due to Connector Contact Failure in a Coaxial Cable.
IEICE Trans. Electron., 2014
IACR Cryptol. ePrint Arch., 2014
Minimizing ESCT forms for two-variable multiple-valued input binary output functions.
Discret. Appl. Math., 2014
Proceedings of the Fun with Algorithms - 7th International Conference, 2014
2013
IEICE Trans. Electron., 2013
Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard.
IEICE Trans. Commun., 2013
Proceedings of the Unconventional Computation and Natural Computation, 2013
Proceedings of the Theory and Practice of Natural Computing, 2013
2012
IEICE Trans. Electron., 2012
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current.
IEICE Trans. Electron., 2012
Discret. Math. Algorithms Appl., 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Int. J. Found. Comput. Sci., 2011
Analysis of Electromagnetic Radiation from Transmission Line with Loose Contact of Connector.
IEICE Trans. Electron., 2011
IEICE Trans. Electron., 2011
2010
Minimizing AND-EXOR Expressions for Two-Variable Multiple-Valued Input Binary Output Functions.
J. Multiple Valued Log. Soft Comput., 2010
2009
Inf. Process. Lett., 2009
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules.
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the Theory and Applications of Models of Computation, 6th Annual Conference, 2009
Proceedings of the Frontiers in Algorithmics, Third International Workshop, 2009
2008
Theory Comput. Syst., 2008
2007
J. Circuits Syst. Comput., 2007
Proceedings of the Theory and Applications of Models of Computation, 2007
Proceedings of the Combinatorial Optimization and Applications, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Theory and Applications of Models of Computation, 2006
2005
Proceedings of the Digital Rights Management: Technologies, 2005
2004
Proceedings of the Computing and Combinatorics, 10th Annual International Conference, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
2002
Int. J. Inf. Sec., 2002
2001
Necessary and Sufficient Numbers of Cards for Sharing Secret Keys on Hierarchical Groups.
Proceedings of the Algorithms and Computation, 12th International Symposium, 2001
1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Computing and Combinatorics, 4th Annual International Conference, 1998