Proxy re-encryption in a stronger security model extended from CT-RSA2012 T Isshiki, MH Nguyen, K Tanaka Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013 | 52 | 2013 |
Proxy re-encryption schemes with key privacy from LWE L Wang, Y Aono, MH Nguyen, X Boyen Cryptology ePrint Archive, 2016 | 29 | 2016 |
Attacks to the proxy re-encryption schemes from IWSEC2011 T Isshiki, MH Nguyen, K Tanaka Advances in Information and Computer Security: 8th International Workshop on …, 2013 | 9 | 2013 |
Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs MH Nguyen, K Tanaka, K Yasunaga Information Security and Privacy - 17th Australasian Conference, ACISP 2012 …, 2012 | 9 | 2012 |
Factoring-based proxy re-encryption schemes T Isshiki, MH Nguyen, K Tanaka Provable Security: 7th International Conference, ProvSec 2013, Melaka …, 2013 | 2 | 2013 |
Leakage-resilient CCA2 public-key encryption from 4-wise independent hash functions MH Nguyen, K Yasunaga, K Tanaka The 2011 International Conference on Advanced Technologies for …, 2011 | 2 | 2011 |
Generic Constructions of Public-Key Encryption in the Presence of Key Leakage MH Nguyen, K Yasunaga, K Tanaka 情報処理学会第 73 回全国大会 1, 1, 2011 | | 2011 |