Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures
ISHII, Ryu, YAMASHITA, Kyosuke, SAKAI, Yusuke, TERUYA, Tadanori, MATSUDA, Takahiro, HANAOKA, Goichiro, MATSUURA, Kanta, MATSUMOTO, Tsutomu
Published in IEICE Transactions on Information and Systems (01.11.2022)
Published in IEICE Transactions on Information and Systems (01.11.2022)
Get full text
Journal Article
High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves
Beuchat, Jean-Luc, González-Díaz, Jorge E., Mitsunari, Shigeo, Okamoto, Eiji, Rodríguez-Henríquez, Francisco, Teruya, Tadanori
Published in Pairing-Based Cryptography - Pairing 2010 (2010)
Published in Pairing-Based Cryptography - Pairing 2010 (2010)
Get full text
Book Chapter
Constant-Round Client-Aided Secure Comparison Protocol
Morita, Hiraku, Attrapadung, Nuttapong, Teruya, Tadanori, Ohata, Satsuya, Nuida, Koji, Hanaoka, Goichiro
Published in Computer Security (2018)
Published in Computer Security (2018)
Get full text
Book Chapter
An Observation on the Randomness Assumption over Lattices
Teruya, Tadanori
Published in 2018 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2018)
Published in 2018 International Symposium on Information Theory and Its Applications (ISITA) (01.10.2018)
Get full text
Conference Proceeding
Constant-Round Client-Aided Secure Comparison Protocol
Morita, Hiraku, Attrapadung, Nuttapong, Teruya, Tadanori, Ohata, Satsuya, Nuida, Koji, Hanaoka, Goichiro
Published in SECURITY MANAGEMENT (31.05.2019)
Published in SECURITY MANAGEMENT (31.05.2019)
Get full text
Journal Article
The optimal ate pairing over the Barreto-Naehrig curve via parallelizing elliptic nets
Onuki, Hiroshi, Teruya, Tadanori, Kanayama, Naoki, Uchiyama, Shigenori
Published in JSIAM Letters (2016)
Published in JSIAM Letters (2016)
Get full text
Journal Article
PREDICTION MODEL CONVERSION METHOD AND SYSTEM
ATTRAPADUNG, Nuttapong, TERUYA, Tadanori, OBA, Tatsumi, UNAGAMI, Yuji, NISHIDA, Naohisa
Year of Publication 16.07.2020
Get full text
Year of Publication 16.07.2020
Patent
SECRET AUTHENTICATION METHOD AND SECRET AUTHENTICATION SYSTEM
ATTRAPADUNG, Nuttapong, HANAOKA, Goichiro, TERUYA, Tadanori, OBA, Tatsumi, UNAGAMI, Yuji, NISHIDA, Naohisa
Year of Publication 15.04.2021
Get full text
Year of Publication 15.04.2021
Patent
Computing fixed argument pairings with the elliptic net algorithm
Liu, Yang, Kanayama, Naoki, Saito, Kazutaka, Teruya, Tadanori, Uchiyama, Shigenori, Okamoto, Eiji
Published in JSIAM Letters (2014)
Published in JSIAM Letters (2014)
Get full text
Journal Article
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality
Ishii, Ryu, Yamashita, Kyosuke, Song, Zihao, Sakai, Yusuke, Teruya, Tadanori, Hanaoka, Goichiro, Matsuura, Kanta, Matsumoto, Tsutomu
Published in Attacks and Defenses for the Internet-Of-Things (2022)
Published in Attacks and Defenses for the Internet-Of-Things (2022)
Get full text
Book Chapter
定数ラウンドの クライアント補助型秘匿大小比較プロトコルの構成
森田, 啓, アッタラパドゥン, ナッタポン, 照屋, 唯紀, 大畑, 幸矢, 縫田, 光司, 花岡, 悟一郎
Published in 日本セキュリティ・マネジメント学会誌 (31.05.2019)
Published in 日本セキュリティ・マネジメント学会誌 (31.05.2019)
Get full text
Journal Article
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures
Ishii, Ryu, Yamashita, Kyosuke, Sakai, Yusuke, Matsuda, Takahiro, Teruya, Tadanori, Hanaoka, Goichiro, Matsuura, Kanta, Matsumoto, Tsutomu
Published in Applied Cryptography and Network Security Workshops (2021)
Published in Applied Cryptography and Network Security Workshops (2021)
Get full text
Book Chapter
PREDICTION MODEL DISTRIBUTION METHOD AND PREDICTION MODEL DISTRIBUTION SYSTEM
NATTAPONG ATTRAPADUNG, TERUYA TADANORI, MATSUDA TAKAHIRO, HANAOKA GOICHIRO, NISHIDA NAOHISA, KAIJO YUJI, KATO RYO, YAMADA SHOTA, OBA TATSUMI
Year of Publication 19.12.2019
Get full text
Year of Publication 19.12.2019
Patent
Delegating Verification for Remote Attestation Using TEE
Yagawa, Takashi, Teruya, Tadanori, Suzaki, Kuniyasu, Abe, Hirotake
Published in 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (08.07.2024)
Published in 2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (08.07.2024)
Get full text
Conference Proceeding