Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ...
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
46 2012 Universally composable RFID mutual authentication C Su, B Santoso, Y Li, RH Deng, X Huang
IEEE Transactions on Dependable and Secure Computing 14 (1), 83-94, 2015
17 2015 Factorization of square-free integers with high bits known B Santoso, N Kunihiro, N Kanayama, K Ohta
International Conference on Cryptology in Vietnam, 115-130, 2006
9 2006 Information theoretic security for Shannon cipher system under side-channel attacks B Santoso, Y Oohama
Entropy 21 (5), 469, 2019
8 2019 Information theoretic security for side-channel attacks to the Shannon cipher system Y Oohama, B Santoso
arXiv preprint arXiv:1801.02563, 2018
6 2018 Privacy amplification of distributed encrypted sources with correlated keys B Santoso, Y Oohama
2017 IEEE International Symposium on Information Theory (ISIT), 958-962, 2017
6 2017 Factorization of square-free integers with high bits known B Santoso, N Kunihiro, N Kanayama, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2008
6 2008 Cryptanalysis of Aggregate -Signature and Practical Countermeasures in Application to Bitcoin G Hanaoka, K Ohta, Y Sakai, B Santoso, K Takemure, Y Zhao
Cryptology ePrint Archive, 2020
5 2020 More efficient two-round multi-signature scheme with provably secure parameters K Takemure, Y Sakai, B Santoso, G Hanaoka, K Ohta
Cryptology ePrint Archive, 2023
4 2023 Generalization of isomorphism of polynomials with two secrets and its application to public key encryption B Santoso
Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020 …, 2020
4 2020 Three-pass identification scheme based on MinRank problem with half cheating probability B Santoso, Y Ikematsu, S Nakamura, T Yasuda
arXiv preprint arXiv:2205.03255, 2022
3 2022 Achieving pairing-free aggregate signatures using pre-communication between signers K Takemure, Y Sakai, B Santoso, G Hanaoka, K Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
3 2021 Secrecy amplification of distributed encrypted sources with correlated keys using post-encryption-compression B Santoso, Y Oohama
IEEE Transactions on Information Forensics and Security 14 (11), 3042-3056, 2019
3 2019 Post encryption compression with affine encoders for secrecy amplification in distributed source encryption with correlated keys B Santoso, Y Oohama
2018 International Symposium on Information Theory and Its Applications …, 2018
3 2018 Improving efficiency of an ‘on the fly’identification scheme by perfecting zero-knowledgeness B Santoso, K Ohta, K Sakiyama, G Hanaoka
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
3 2010 A new'on the fly'identification scheme: an asymptoticity trade-off between ZK and correctness B Santoso, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2009
3 2009 A framework for Shannon ciphers under side-channel attacks: A strong converse and more Y Oohama, B Santoso
2022 IEEE International Symposium on Information Theory (ISIT), 862-867, 2022
2 2022 A systematic study of bulletin board and its application M Suwito, B Tama, B Santoso, S Dutta, H Tan, U Yoshifumi, K Sakurai
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
2 2022 Strong converse theorem for source encryption under side-channel attacks Y Oohama, B Santoso
arXiv preprint arXiv:2201.11670, 2022
2 2022 Security analysis on an elgamal-like multivariate encryption scheme based on isomorphism of polynomials Y Ikematsu, S Nakamura, B Santoso, T Yasuda
Information Security and Cryptology: 17th International Conference, Inscrypt …, 2021
2 2021