Author of the publication

Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.

, , , , , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 350-364. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful., , and . ASIACRYPT (2), volume 8270 of Lecture Notes in Computer Science, page 504-523. Springer, (2013)Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations., , , , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 500-517. (2016)Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption., , , , , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 350-364. (2016)Packet Analysis and Information Theory on Attack Detection for Modbus TCP., , , , and . IECON, page 1-6. IEEE, (2023)A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule., , , , , , and . ISITA, page 382-386. IEEE, (2020)Card-Based Majority Voting Protocols with Three Inputs Using Three Cards., , , , , and . ISITA, page 218-222. IEEE, (2018)A Construction Method of Visual Secret Sharing Schemes for Plural Secret Images., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (10): 2577-2588 (2003)Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage., , , and . CODASPY, page 312-323. ACM, (2022)Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function., , , and . SecITC, volume 13809 of Lecture Notes in Computer Science, page 203-221. Springer, (2022)Strongly secure ramp secret sharing schemes for general access structures., and . Inf. Process. Lett., 97 (2): 52-57 (2006)