Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ... International Workshop on Public Key Cryptography, 243-261, 2012 | 47 | 2012 |
Universally composable RFID mutual authentication C Su, B Santoso, Y Li, RH Deng, X Huang IEEE Transactions on Dependable and Secure Computing 14 (1), 83-94, 2015 | 18 | 2015 |
Information theoretic security for Shannon cipher system under side-channel attacks B Santoso, Y Oohama Entropy 21 (5), 469, 2019 | 10 | 2019 |
Factorization of square-free integers with high bits known B Santoso, N Kunihiro, N Kanayama, K Ohta International Conference on Cryptology in Vietnam, 115-130, 2006 | 9 | 2006 |
Information theoretic security for side-channel attacks to the Shannon cipher system Y Oohama, B Santoso arXiv preprint arXiv:1801.02563, 2018 | 7 | 2018 |
Privacy amplification of distributed encrypted sources with correlated keys B Santoso, Y Oohama 2017 IEEE International Symposium on Information Theory (ISIT), 958-962, 2017 | 7 | 2017 |
More efficient two-round multi-signature scheme with provably secure parameters K Takemure, Y Sakai, B Santoso, G Hanaoka, K Ohta Cryptology ePrint Archive, 2023 | 6 | 2023 |
Generalization of isomorphism of polynomials with two secrets and its application to public key encryption B Santoso Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020 …, 2020 | 6 | 2020 |
Factorization of square-free integers with high bits known B Santoso, N Kunihiro, N Kanayama, K Ohta IEICE transactions on fundamentals of electronics, communications and …, 2008 | 6 | 2008 |
Cryptanalysis of Aggregate -Signature and Practical Countermeasures in Application to Bitcoin G Hanaoka, K Ohta, Y Sakai, B Santoso, K Takemure, Y Zhao Cryptology ePrint Archive, 2020 | 5 | 2020 |
Three-pass identification scheme based on MinRank problem with half cheating probability B Santoso, Y Ikematsu, S Nakamura, T Yasuda 2022 International Symposium on Information Theory and Its Applications …, 2022 | 4 | 2022 |
A framework for Shannon ciphers under side-channel attacks: a strong converse and more Y Oohama, B Santoso 2022 IEEE International Symposium on Information Theory (ISIT), 862-867, 2022 | 4 | 2022 |
A systematic study of bulletin board and its application M Suwito, B Tama, B Santoso, S Dutta, H Tan, U Yoshifumi, K Sakurai Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 4 | 2022 |
Achieving pairing-free aggregate signatures using pre-communication between signers K Takemure, Y Sakai, B Santoso, G Hanaoka, K Ohta IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021 | 4 | 2021 |
Security analysis on an elgamal-like multivariate encryption scheme based on isomorphism of polynomials Y Ikematsu, S Nakamura, B Santoso, T Yasuda Information Security and Cryptology: 17th International Conference, Inscrypt …, 2021 | 4 | 2021 |
Secrecy amplification of distributed encrypted sources with correlated keys using post-encryption-compression B Santoso, Y Oohama IEEE Transactions on Information Forensics and Security 14 (11), 3042-3056, 2019 | 4 | 2019 |
Post encryption compression with affine encoders for secrecy amplification in distributed source encryption with correlated keys B Santoso, Y Oohama 2018 International Symposium on Information Theory and Its Applications …, 2018 | 3 | 2018 |
Reviving identification scheme based on isomorphism of polynomials with two secrets: a refined theoretical and practical analysis B Santoso IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018 | 3 | 2018 |
Provable secure post-quantum signature scheme based on isomorphism of polynomials in quantum random oracle model B Santoso, C Su International Conference on Provable Security, 271-284, 2017 | 3 | 2017 |
Improving efficiency of an ‘on the fly’identification scheme by perfecting zero-knowledgeness B Santoso, K Ohta, K Sakiyama, G Hanaoka Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010 | 3 | 2010 |