number |
title/author |
C01-1 | Structurally aggregate message authentication codes Yuta Ishii, Mitsuru Tada, |
C01-10 | A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta, |
C01-11 | Client-Aided Bit-Composition Protocol with Guaranteed Output Delivery Hikaru Tsuchida, Takashi Nishide, |
C01-2 | The time-adaptive statistical testing for random number generators Boris Ryabko, Viacheslav Zhuravlev, |
C01-3 | On the Power of Interaction in Signcryption Junichi Ida, Junji Shikata, Yohei Watanabe, |
C01-4 | A Construction of Robustly Reusable Fuzzy Extractors over Blockchains Kodai Sato, Kenji Yasunaga, Toru Fujiwara, |
C01-5 | The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi, |
C01-6 | Delegatable proof of knowledge systems Naoya Shiratori, Mitsuru Tada, |
C01-7 | Hamming Weight of Product of Random Sparse Polynomials Akinori Kawachi, |
C01-8 | The relation between Proportion test and Uniformity test in NIST SP800-22 Atsushi Iwasaki, |
C01-9 | How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, |