The International Symposium on Information Theory and Its Applications

number title/author
Mo-PM-2-2.1Multi-party Key Exchange Protocols from Supersingular Isogenies
Satoshi Furukawa, Noboru Kunihiro, Katsuyuki Takashima,
Mo-PM-2-2.2Secure Hybrid Authentication Protocols against Malicious Key Generation Center
SeongHan Shin,
Mo-PM-2-2.3Card-Based Majority Voting Protocols with Three Inputs Using Three Cards
Yohei Watanabe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, Kazuo Ohta,
Mo-PM-2-2.4A Construction of the (4; n)-Threshold Visual Cryptography Scheme Using a 3-Design
Koutaro Okada, Hiroki Koga,
Mo-PM-2-2.5An algebraic interpretation of the XOR-based Secret Sharing Schemes
Yuji Suga,