publications
publications by categories in reversed chronological order. generated by jekyll-scholar.
2024
- NSS:MCHS24How to Accomplish Key and Communication Compression Over Authentication Channels: Proxy Re-Authentication and its instantiations (To Appear)In 18th International Conference on Network and System Security (NSS 2024), Nov 2024
- CSS:CHHTS24
- CANS:CHHTS24How to Apply Fujisaki-Okamoto Transformation to Registration-Based EncryptionIn The 23rd International Conference on Cryptology And Network Security (CANS 2024), Oct 2024
- ISEC:MCHS24
- SCIS:CHHS24
2023
- ISPEC:CHS23Chosen Ciphertext Security for Blind Identity-based Encryption with Certified IdentitiesIn The 18th International Conference on Information Security Practice and Experience (ISPEC 2023), Nov 2023
- ProvSec:CHS23Identity-based Matchmaking Encryption Secure against Key Generation CenterIn The 17th International Conference on Provable and Practical Security (ProvSec 2023), Oct 2023
- ISEC:CHS23b
- ISEC:CHS23a
2020
- Robomech:CF20CAM System for On-Machine Polishing Based on Five-Axis Control: Application Results for Convex and Concave Surface (In Japanese)The Proceedings of JSME annual Conference on Robotics and Mechatronics (Robomec), Mar 2020