Takeshi Koshiba
Orcid: 0000-0001-8994-729X
According to our database1,
Takeshi Koshiba
authored at least 107 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage.
IEEE/ACM Trans. Netw., February, 2024
2023
Quantum Inf. Comput., July, 2023
A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm.
J. Inf. Secur. Appl., March, 2023
2022
Quantum Inf. Process., 2022
IEEE J. Sel. Areas Inf. Theory, 2022
Bangla-BERT: Transformer-Based Efficient Model for Transfer Learning and Language Understanding.
IEEE Access, 2022
CARAN: A Context-Aware Recency-Based Attention Network for Point-of-Interest Recommendation.
IEEE Access, 2022
2021
Symmetry, 2021
CricShotClassify: An Approach to Classifying Batting Shots from Cricket Videos Using a Convolutional Neural Network and Gated Recurrent Unit.
Sensors, 2021
Entropy, 2021
Entropy, 2021
ACM Comput. Surv., 2021
Frequent contiguous pattern mining over biological sequences of protein misfolded diseases.
BMC Bioinform., 2021
2020
Blind Audio Watermarking Based on Parametric Slant-Hadamard Transform and Hessenberg Decomposition.
Symmetry, 2020
Blind Image Watermarking in Canonical and Cepstrum Domains Based on 4-Connected t-o'clock Scrambling.
Symmetry, 2020
J. Inf. Secur. Appl., 2020
Combined interactive protocol for lattice-based group signature schemes with verifier-local revocation.
Int. J. Grid Util. Comput., 2020
IEEE Commun. Lett., 2020
Cryptogr., 2020
Proceedings of the Advances in Networked-Based Information Systems, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
2019
Impossibility Of Perfectly-Secure Ono-Round Delegated Quantum Computing for classical client.
Quantum Inf. Comput., 2019
J. Inf. Secur. Appl., 2019
A Guests Managing System with Lattice-Based Verifier-Local Revocation Group Signature Scheme with Time-Bound Keys.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
2018
Achieving Strong Security and Member Registration for Lattice-based Group Signature Scheme with Verifier-local Revocation.
J. Internet Serv. Inf. Secur., 2018
Int. J. Space Based Situated Comput., 2018
IACR Cryptol. ePrint Arch., 2018
Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice Assumptions.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018
Zero-Knowledge Proof for Lattice-Based Group Signature Schemes with Verifier-Local Revocation.
Proceedings of the Advances in Network-Based Information Systems, 2018
Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation.
Proceedings of the Information Security Practice and Experience, 2018
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018
Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys.
Proceedings of the Internet and Distributed Computing Systems, 2018
New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation.
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
2017
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors.
J. Math. Cryptol., 2017
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the Advances in Network-Based Information Systems, 2017
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017
Proceedings of the Internet and Distributed Computing Systems, 2017
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016
2015
Secur. Commun. Networks, 2015
Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption.
J. Math. Cryptol., 2014
CoRR, 2014
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the CCSW'13, 2013
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Computational Indistinguishability Between Quantum States and Its Cryptographic Application.
J. Cryptol., 2012
2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
2009
Statistically-Hiding Quantum Bit Commitment from Approximable-Preimage-Size Quantum One-Way Function.
Proceedings of the Theory of Quantum Computation, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions.
IEEE Trans. Inf. Theory, 2008
IACR Cryptol. ePrint Arch., 2008
Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification.
Proceedings of the Information Theoretic Security, Third International Conference, 2008
2007
IEEE Trans. Circuits Syst. II Express Briefs, 2007
IACR Cryptol. ePrint Arch., 2007
2006
Round-Efficient One-Way Permutation Based Perfectly Concealing Bit Commitment Scheme.
Electron. Colloquium Comput. Complex., 2006
2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Proceedings of the Public Key Cryptography, 2004
2002
Proceedings of the Public Key Cryptography, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
2001
A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes.
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Algorithms and Computation, 12th International Symposium, 2001
2000
A Note on Finding One-Variable Patterns Consistent with Examples and Counterexamples.
Proceedings of the International Colloquium on Words, 2000
1999
A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions.
Proceedings of the Information Security and Cryptology, 1999
1998
Proceedings of the Knowledge-Based Intelligent Electronic Systems, 1998
1997
Theor. Comput. Sci., 1997
Fundam. Informaticae, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
Int. J. Hum. Comput. Interact., 1996
Proceedings of the Advances in Artificial Intelligence, 1996
1995
Proceedings of the Computational Learning Theory, Second European Conference, 1995
Proceedings of the Algorithmic Learning Theory, 6th International Conference, 1995