number | title/author |
---|---|
Mo-PM-2-2.1 | Multi-party Key Exchange Protocols from Supersingular Isogenies Satoshi Furukawa, Noboru Kunihiro, Katsuyuki Takashima, |
Mo-PM-2-2.2 | Secure Hybrid Authentication Protocols against Malicious Key Generation Center SeongHan Shin, |
Mo-PM-2-2.3 | Card-Based Majority Voting Protocols with Three Inputs Using Three Cards Yohei Watanabe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, Kazuo Ohta, |
Mo-PM-2-2.4 | A Construction of the (4; n)-Threshold Visual Cryptography Scheme Using a 3-Design Koutaro Okada, Hiroki Koga, |
Mo-PM-2-2.5 | An algebraic interpretation of the XOR-based Secret Sharing Schemes Yuji Suga, |