What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Mitsugu Iwamoto
Google Scholar
21
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acisp
Anonymous Credentials with Credential Redaction and Its Application to SSI-Based Plug&Charge for Shared Vehicles.
Kyosuke Hatsugai
Kyoichi Asano
Yuki Sawai
Yohei Watanabe
Mitsugu Iwamoto
2025
conf/asiapkc
Single-Shuffle Physical Zero-Knowledge Proof for Sudoku Using Interactive Inputs.
Tomoki Ono
Suthee Ruangwises
Yoshiki Abe
Kyosuke Hatsugai
Mitsugu Iwamoto
2025
conf/asiapkc
Revisiting Relations of Security Notions in Searchable Encryption.
Kazuki Sato
Takumi Amada
Kyoichi Asano
Yohei Watanabe
Mitsugu Iwamoto
Kazuo Ohta
2025
conf/asiajcis
A Generic Zero-Knowledge Range Argument with Preprocessing.
Yuki Sawai
Kyoichi Asano
Yohei Watanabe
Mitsugu Iwamoto
2025
conf/esorics
Correcting the Record on Leakage Abuse Attacks: Revisiting the Subgraph Attacks with Sound Evaluation.
Takumi Namiki
Takumi Amada
Mitsugu Iwamoto
Yohei Watanabe
2024
conf/sacrypt
Multi-user Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key Primitives.
Takato Hirano
Yutaka Kawai
Yoshihiro Koseki
Satoshi Yasuda
Yohei Watanabe
Takumi Amada
Mitsugu Iwamoto
Kazuo Ohta
2023
conf/icisc
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners.
Shun Uchizono
Takeshi Nakai
Yohei Watanabe
Mitsugu Iwamoto
2023
conf/icisc
Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy.
Takumi Amada
Mitsugu Iwamoto
Yohei Watanabe
2023
conf/icisc
Single-Shuffle Card-Based Protocols with Six Cards per Gate.
Tomoki Ono
Kazumasa Shinagawa
Takeshi Nakai
Yohei Watanabe
Mitsugu Iwamoto
2019
conf/tcc
Efficient Private PEZ Protocols for Symmetric Functions.
Yoshiki Abe
Mitsugu Iwamoto
Kazuo Ohta
2016
conf/iwsec
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Takato Hirano
Mitsuhiro Hattori
Yutaka Kawai
Nori Matsuda
Mitsugu Iwamoto
Kazuo Ohta
Yusuke Sakai
Tatsuji Munaka
2016
conf/iwsec
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants.
Risa Yashiro
Takanori Machida
Mitsugu Iwamoto
Kazuo Sakiyama
2016
conf/cans
Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.
Kenichiro Hayasaka
Yutaka Kawai
Yoshihiro Koseki
Takato Hirano
Kazuo Ohta
Mitsugu Iwamoto
2016
conf/cans
Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations.
Takeshi Nakai
Yuuki Tokushige
Yuto Misawa
Mitsugu Iwamoto
Kazuo Ohta
2014
conf/ccs
Privacy-preserving smart metering with verifiability for both billing and energy management.
Kazuma Ohara
Yusuke Sakai
Fumiaki Yoshida
Mitsugu Iwamoto
Kazuo Ohta
2014
conf/ctrsa
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl.
Yu Sasaki
Yuuki Tokushige
Lei Wang
Mitsugu Iwamoto
Kazuo Ohta
2013
conf/asiacrypt
Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful.
Mitsugu Iwamoto
Thomas Peyrin
Yu Sasaki
2012
journals/tifs
A Weak Security Notion for Visual Secret Sharing Schemes.
Mitsugu Iwamoto
2012
journals/tifs
Information-Theoretic Approach to Optimal Differential Fault Analysis.
Kazuo Sakiyama
Yang Li
Mitsugu Iwamoto
Kazuo Ohta
2012
conf/icisc
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher.
Toshiki Nakasone
Yang Li
Yu Sasaki
Mitsugu Iwamoto
Kazuo Ohta
Kazuo Sakiyama
2011
conf/ches
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches.
Dai Yamamoto
Kazuo Sakiyama
Mitsugu Iwamoto
Kazuo Ohta
Takao Ochiai
Masahiko Takenaka
Kouichi Itoh
Coauthors
Dai Yamamoto
(1)
Fumiaki Yoshida
(1)
Kazuki Sato
(1)
Kazuma Ohara
(1)
Kazumasa Shinagawa
(1)
Kazuo Ohta
(11)
Kazuo Sakiyama
(4)
Kenichiro Hayasaka
(1)
Kouichi Itoh
(1)
Kyoichi Asano
(3)
Kyosuke Hatsugai
(2)
Lei Wang
(1)
Masahiko Takenaka
(1)
Mitsugu Iwamoto
(21)
Mitsuhiro Hattori
(1)
Nori Matsuda
(1)
Risa Yashiro
(1)
Satoshi Yasuda
(1)
Shun Uchizono
(1)
Suthee Ruangwises
(1)
Takanori Machida
(1)
Takao Ochiai
(1)
Takato Hirano
(3)
Takeshi Nakai
(3)
Takumi Amada
(4)
Takumi Namiki
(1)
Tatsuji Munaka
(1)
Thomas Peyrin
(1)
Tomoki Ono
(2)
Toshiki Nakasone
(1)
Yang Li
(2)
Yohei Watanabe
(8)
Yoshihiro Koseki
(2)
Yoshiki Abe
(2)
Yu Sasaki
(3)
Yuki Sawai
(2)
Yusuke Sakai
(2)
Yutaka Kawai
(3)
Yuto Misawa
(1)
Yuuki Tokushige
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to