Author of the publication

Voting with a Logarithmic Number of Cards.

, , and . UCNC, volume 7956 of Lecture Notes in Computer Science, page 162-173. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fundamental study on randomized processing in cryptographic IC using variable clock against Correlation Power Analysis., , , and . EMC Compo, page 39-43. IEEE, (2015)Card-Based Secure Ranking Computations., , , , , , and . COCOA, volume 11949 of Lecture Notes in Computer Science, page 461-472. Springer, (2019)A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation., , , , and . ISPEC, volume 11879 of Lecture Notes in Computer Science, page 135-151. Springer, (2019)Securely computing XOR with 10 cards., , and . Australas. J Comb., (2006)Pile-Shifting Scramble for Card-Based Protocols., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (9): 1494-1502 (2018)The Effect of Position of a Connector Contact Failure on Electromagnetic Near-Field around a Coaxial Cable., and . IEICE Trans. Commun., 92-B (6): 1969-1973 (2009)Investigation of Noise Interference due to Connector Contact Failure in a Coaxial Cable., , and . IEICE Trans. Electron., 97-C (9): 900-903 (2014)Mechanism of Increase in Inductance at Loosened Connector Contact Boundary., , , and . IEICE Trans. Electron., 95-C (9): 1502-1507 (2012)Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion., , , and . DRMTICS, volume 3919 of Lecture Notes in Computer Science, page 203-216. Springer, (2005)Secret Key Amplification from Uniformly Leaked Key Exchange Complete Graph., , , , , and . WALCOM, volume 10755 of Lecture Notes in Computer Science, page 20-31. Springer, (2018)