Takaaki Mizuki
Takaaki Mizuki
Dirección de correo verificada de cc.tohoku.ac.jp
Título
Citado por
Citado por
Año
Six-card secure AND and four-card secure XOR
T Mizuki, H Sone
International Workshop on Frontiers in Algorithmics, 358-369, 2009
682009
The five-card trick can be done with four cards
T Mizuki, M Kumamoto, H Sone
International Conference on the Theory and Application of Cryptology and …, 2012
512012
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures
YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger
IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2012
502012
A formalization of card-based cryptographic protocols via abstract machine
T Mizuki, H Shizuya
International Journal of Information Security 13 (1), 15-23, 2014
392014
Voting with a logarithmic number of cards
T Mizuki, IK Asiedu, H Sone
International Conference on Unconventional Computing and Natural Computation …, 2013
342013
Practical card-based cryptography
T Mizuki, H Shizuya
International Conference on Fun with Algorithms, 313-324, 2014
312014
Non-invasive EMI-based fault injection attack against cryptographic modules
Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone
2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011
292011
Securely computing XOR with 10 cards
T Mizuki, F Uchiike, H Sone
Australasian Journal of Combinatorics 36, 279-293, 2006
292006
Efficient card-based protocols for generating a hidden random permutation without fixed points
R Ishikawa, E Chida, T Mizuki
International Conference on Unconventional Computation and Natural …, 2015
272015
Card-based protocols for any boolean function
T Nishida, Y Hayashi, T Mizuki, H Sone
International Conference on Theory and Applications of Models of Computation …, 2015
272015
Efficient evaluation of EM radiation associated with information leakage from cryptographic devices
Y Hayashi, N Homma, T Mizuki, H Shimada, T Aoki, H Sone, L Sauvage, ...
IEEE Transactions on Electromagnetic Compatibility 55 (3), 555-563, 2012
272012
Securely computing the three-input majority function with eight cards
T Nishida, T Mizuki, H Sone
International Conference on Theory and Practice of Natural Computing, 193-204, 2013
262013
How to implement a random bisection cut
I Ueda, A Nishimura, Y Hayashi, T Mizuki, H Sone
International Conference on Theory and Practice of Natural Computing, 58-69, 2016
252016
Spectrum analysis on cryptographic modules to counteract side-channel attacks
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
EMC 9, 21-24, 2009
242009
Mechanism behind information leakage in electromagnetic analysis of cryptographic modules
T Sugawara, Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone, A Satoh
International Workshop on Information Security Applications, 66-78, 2009
232009
Transient IEMI threats for cryptographic devices
Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone
IEEE transactions on Electromagnetic Compatibility 55 (1), 140-148, 2012
202012
Dealing necessary and sufficient numbers of cards for sharing a one-bit secret key
T Mizuki, H Shizuya, T Nishizeki
International Conference on the Theory and Applications of Cryptographic …, 1999
191999
Computational model of card-based cryptographic protocols and its applications
T Mizuki, H Shizuya
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
172017
The minimum number of cards in practical card-based protocols
J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone
International Conference on the Theory and Application of Cryptology and …, 2017
152017
Five-card secure computations using unequal division shuffle
A Nishimura, T Nishida, Y Hayashi, T Mizuki, H Sone
International Conference on Theory and Practice of Natural Computing, 109-120, 2015
152015
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20