Author of the publication

Fairy ring: Ubiquitous secure multiparty computation framework for smartphone applications.

, , and . ISITA, page 708-712. IEEE, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Teruya, Tadanori
add a person with the name Teruya, Tadanori
 

Other publications of authors with the same name

Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three., , , , , and . Pairing, volume 8365 of Lecture Notes in Computer Science, page 97-112. Springer, (2013)Computing fixed argument pairings with the elliptic net algorithm., , , , , and . JSIAM Lett., (2014)Secure Parallel Computation on Privately Partitioned Data and Applications., , , , , and . CCS, page 151-164. ACM, (2022)Estimation of the Success Probability of Random Sampling by the Gram-Charlier Approximation., , and . IACR Cryptology ePrint Archive, (2018)MOBIUS: Model-Oblivious Binarized Neural Networks., , , , , , , , , and . IEEE Access, (2019)Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation., , , and . IWSEC, volume 9836 of Lecture Notes in Computer Science, page 319-334. Springer, (2016)On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data., , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 242-261. Springer, (2015)High-Speed Software Implementation of the Optimal Ate Pairing over Barreto-Naehrig Curves., , , , , and . Pairing, volume 6487 of Lecture Notes in Computer Science, page 21-39. Springer, (2010)A Note on Subgroup Security in Discrete Logarithm-Based Cryptography.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (1): 104-120 (2021)Constant-Round Client-Aided Secure Comparison Protocol., , , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 395-415. Springer, (2018)