@inproceedings{KiyomotoFM09, title = {An Offline Peer-to-peer Broadcasting Scheme with Anonymity}, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Keith M. Martin}, year = {2009}, tags = {source-to-source, peer-to-peer, open-source}, researchr = {https://researchr.org/publication/KiyomotoFM09}, cites = {0}, citedby = {0}, pages = {75-82}, booktitle = {secrypt}, } @article{YoshitomiTKT08, title = {Efficient Implementation of the Pairing on Mobilephones Using BREW}, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, year = {2008}, doi = {10.1093/ietisy/e91-d.5.1330}, url = {http://dx.doi.org/10.1093/ietisy/e91-d.5.1330}, researchr = {https://researchr.org/publication/YoshitomiTKT08}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {91-D}, number = {5}, pages = {1330-1337}, } @inproceedings{KiyomotoTS08, title = {FPGA-Targeted Hardware Implementations of K2}, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, year = {2008}, researchr = {https://researchr.org/publication/KiyomotoTS08}, cites = {0}, citedby = {0}, pages = {270-277}, booktitle = {secrypt}, } @inproceedings{KiyomotoOT08, title = {On-the-Fly Automatic Generation of Security Protocols}, author = {Shinsaku Kiyomoto and Haruki Ota and Toshiaki Tanaka}, year = {2008}, tags = {protocol, security}, researchr = {https://researchr.org/publication/KiyomotoOT08}, cites = {0}, citedby = {0}, pages = {97-104}, booktitle = {ICEIS}, } @inproceedings{KiyomotoT08, title = {Anonymous attribute authentication scheme using self-blindable certificates}, author = {Shinsaku Kiyomoto and Toshiaki Tanaka}, year = {2008}, doi = {10.1109/ISI.2008.4565060}, url = {http://dx.doi.org/10.1109/ISI.2008.4565060}, tags = {certification}, researchr = {https://researchr.org/publication/KiyomotoT08}, cites = {0}, citedby = {0}, pages = {215-217}, booktitle = {isi}, } @inproceedings{KuriharaKFT08, title = {A New (k, n)-Threshold Secret Sharing Scheme and Its Extension}, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, year = {2008}, doi = {10.1007/978-3-540-85886-7_31}, url = {http://dx.doi.org/10.1007/978-3-540-85886-7_31}, researchr = {https://researchr.org/publication/KuriharaKFT08}, cites = {0}, citedby = {0}, pages = {455-470}, booktitle = {iiswc}, } @article{KiyomotoTMM07, title = {Development of security functions for a medical information sharing platform}, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Yutaka Miyake and Yoshinori Mitamura}, year = {2007}, doi = {10.1002/scj.20466}, url = {http://dx.doi.org/10.1002/scj.20466}, tags = {security}, researchr = {https://researchr.org/publication/KiyomotoTMM07}, cites = {0}, citedby = {0}, journal = {scjapan}, volume = {38}, number = {11}, pages = {49-63}, } @inproceedings{CidKK09, title = {The rakaposhi Stream Cipher}, author = {Carlos Cid and Shinsaku Kiyomoto and Jun Kurihara}, year = {2009}, doi = {10.1007/978-3-642-11145-7_5}, url = {http://dx.doi.org/10.1007/978-3-642-11145-7_5}, researchr = {https://researchr.org/publication/CidKK09}, cites = {0}, citedby = {0}, pages = {32-46}, booktitle = {icics}, } @article{YamadaKTN04, title = {New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients}, author = {Akira Yamada and Shinsaku Kiyomoto and Toshiaki Tanaka and Koji Nakao}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a_1_182&category=D&year=2004&lang=E&abst=}, researchr = {https://researchr.org/publication/YamadaKTN04}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {87-A}, number = {1}, pages = {182-189}, } @article{KuriharaKFT08:0, title = {A Fast (3, ::::n::::)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations}, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, year = {2008}, doi = {10.1093/ietfec/e91-a.1.127}, url = {http://dx.doi.org/10.1093/ietfec/e91-a.1.127}, researchr = {https://researchr.org/publication/KuriharaKFT08%3A0}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {91-A}, number = {1}, pages = {127-138}, } @article{KuriharaKFT08a, title = {On a Fast (::::k, n::::)-Threshold Secret Sharing Scheme}, author = {Jun Kurihara and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, year = {2008}, doi = {10.1093/ietfec/e91-a.9.2365}, url = {http://dx.doi.org/10.1093/ietfec/e91-a.9.2365}, researchr = {https://researchr.org/publication/KuriharaKFT08a}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {91-A}, number = {9}, pages = {2365-2378}, } @article{KiyomotoTS05, title = {Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers}, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, year = {2005}, doi = {10.1093/ietfec/e88-a.10.2778}, url = {http://dx.doi.org/10.1093/ietfec/e88-a.10.2778}, tags = {analysis}, researchr = {https://researchr.org/publication/KiyomotoTS05}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {88-A}, number = {10}, pages = {2778-2791}, } @inproceedings{FukushimaKTS08:0, title = {Ternary Subset Difference Method and Its Quantitative Analysis}, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, year = {2008}, doi = {10.1007/978-3-642-00306-6_17}, url = {http://dx.doi.org/10.1007/978-3-642-00306-6_17}, tags = {analysis}, researchr = {https://researchr.org/publication/FukushimaKTS08%3A0}, cites = {0}, citedby = {0}, pages = {225-239}, booktitle = {wisa}, } @inproceedings{KiyomotoTS07, title = {K2: A Stream Cipher Algorithm using Dynamic Feedback Control}, author = {Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, year = {2007}, researchr = {https://researchr.org/publication/KiyomotoTS07}, cites = {0}, citedby = {0}, pages = {204-213}, booktitle = {secrypt}, } @article{FukushimaKTS08, title = {Analysis of Program Obfuscation Schemes with Variable Encoding Technique}, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka and Kouichi Sakurai}, year = {2008}, doi = {10.1093/ietfec/e91-a.1.316}, url = {http://dx.doi.org/10.1093/ietfec/e91-a.1.316}, tags = {program analysis, analysis}, researchr = {https://researchr.org/publication/FukushimaKTS08}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {91-A}, number = {1}, pages = {316-329}, } @inproceedings{ShinGKFT09, title = {How to Bootstrap Security for Ad-Hoc Network: Revisited}, author = {Wook Shin and Carl A. Gunter and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, year = {2009}, doi = {10.1007/978-3-642-01244-0_11}, url = {http://dx.doi.org/10.1007/978-3-642-01244-0_11}, tags = {security}, researchr = {https://researchr.org/publication/ShinGKFT09}, cites = {0}, citedby = {0}, pages = {119-131}, booktitle = {isecs}, } @inproceedings{FukushimaKT06, title = {Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services}, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka}, year = {2006}, doi = {10.1109/MDM.2006.83}, url = {http://doi.ieeecomputersociety.org/10.1109/MDM.2006.83}, tags = {mobile}, researchr = {https://researchr.org/publication/FukushimaKT06}, cites = {0}, citedby = {0}, pages = {17}, booktitle = {MDM}, } @inproceedings{KiyomotoMF09, title = {Privacy-Aware Location Database Service for Granular Queries}, author = {Shinsaku Kiyomoto and Keith M. Martin and Kazuhide Fukushima}, year = {2009}, doi = {10.1007/978-3-642-03944-7_3}, url = {http://dx.doi.org/10.1007/978-3-642-03944-7_3}, tags = {database, context-aware}, researchr = {https://researchr.org/publication/KiyomotoMF09}, cites = {0}, citedby = {0}, pages = {28-37}, booktitle = {WISTP}, } @article{KiyomotoFT09, title = {Design of Anonymous Attribute Authentication Mechanism}, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka}, year = {2009}, url = {http://search.ieice.org/bin/summary.php?id=e92-b_4_1112&category=B&year=2009&lang=E&abst=}, tags = {design}, researchr = {https://researchr.org/publication/KiyomotoFT09}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {92-B}, number = {4}, pages = {1112-1118}, } @article{OtaYKTO07, title = {Universally Composable Hierarchical Hybrid Authenticated Key Exchange}, author = {Haruki Ota and Kazuki Yoneyama and Shinsaku Kiyomoto and Toshiaki Tanaka and Kazuo Ohta}, year = {2007}, doi = {10.1093/ietfec/e90-a.1.139}, url = {http://dx.doi.org/10.1093/ietfec/e90-a.1.139}, researchr = {https://researchr.org/publication/OtaYKTO07}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {90-A}, number = {1}, pages = {139-151}, } @inproceedings{YoshitomiTKT07, title = {Efficient Implementation of the Pairing on Mobilephones Using BREW}, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, year = {2007}, doi = {10.1007/978-3-540-77535-5_15}, url = {http://dx.doi.org/10.1007/978-3-540-77535-5_15}, researchr = {https://researchr.org/publication/YoshitomiTKT07}, cites = {0}, citedby = {0}, pages = {203-214}, booktitle = {wisa}, } @article{OtaKT05, title = {Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification}, author = {Haruki Ota and Shinsaku Kiyomoto and Toshiaki Tanaka}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a_1_287&category=D&year=2005&lang=E&abst=}, tags = {transformation}, researchr = {https://researchr.org/publication/OtaKT05}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {88-A}, number = {1}, pages = {287-295}, } @inproceedings{FukushimaKT09, title = {Obfuscation Mechanism in Conjunction with Tamper-Proof Module}, author = {Kazuhide Fukushima and Shinsaku Kiyomoto and Toshiaki Tanaka}, year = {2009}, doi = {10.1109/CSE.2009.20}, url = {http://dx.doi.org/10.1109/CSE.2009.20}, researchr = {https://researchr.org/publication/FukushimaKT09}, cites = {0}, citedby = {0}, pages = {665-670}, booktitle = {cse}, } @article{KiyomotoT06, title = {Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques}, author = {Shinsaku Kiyomoto and Toshiaki Tanaka}, year = {2006}, doi = {10.1093/ietfec/e89-a.1.222}, url = {http://dx.doi.org/10.1093/ietfec/e89-a.1.222}, researchr = {https://researchr.org/publication/KiyomotoT06}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {89-A}, number = {1}, pages = {222-226}, } @article{KiyomotoFTS07, title = {On Effectiveness of Clock Control in Stream Ciphers}, author = {Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka and Kouichi Sakurai}, year = {2007}, doi = {10.1093/ietfec/e90-a.9.1780}, url = {http://dx.doi.org/10.1093/ietfec/e90-a.9.1780}, researchr = {https://researchr.org/publication/KiyomotoFTS07}, cites = {0}, citedby = {0}, journal = {ieicet}, volume = {90-A}, number = {9}, pages = {1780-1787}, }