Author of the publication

A Framework for Shannon Ciphers under Side-Channel Attacks: a Strong Converse and More.

, and . ISIT, page 862-867. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption.. PQCrypto, volume 12100 of Lecture Notes in Computer Science, page 340-359. Springer, (2020)More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters., , , , and . IACR Cryptol. ePrint Arch., (2023)A Framework for Shannon Ciphers under Side-Channel Attacks: a Strong Converse and More., and . ISIT, page 862-867. IEEE, (2022)Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers., , , , and . ProvSec, volume 12505 of Lecture Notes in Computer Science, page 65-84. Springer, (2020)A New Three-Pass Code-based Zero-Knowledge Identification Scheme with Cheating Probability of Exactly Half., and . ISITA, page 394-398. IEEE, (2018)Strong Converse for Distributed Source Coding with Encryption Using Correlated Keys., and . ITW, page 1-6. IEEE, (2021)Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness., , , and . CT-RSA, volume 5985 of Lecture Notes in Computer Science, page 284-301. Springer, (2010)Refining Identification Scheme based on Isomorphism of Polynomials with Two Secrets: a New Theoretical and Practical Analysis.. AsiaPKC@AsiaCCS, page 31-38. ACM, (2016)Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials., , , and . Inscrypt, volume 13007 of Lecture Notes in Computer Science, page 235-250. Springer, (2021)Information Theoretic Security for Side-Channel Attacks to the Shannon Cipher System., and . CoRR, (2018)