Follow
Bagus Santoso
Title
Cited by
Cited by
Year
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ...
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
482012
Universally composable RFID mutual authentication
C Su, B Santoso, Y Li, RH Deng, X Huang
IEEE Transactions on Dependable and Secure Computing 14 (1), 83-94, 2015
172015
Information theoretic security for Shannon cipher system under side-channel attacks
B Santoso, Y Oohama
Entropy 21 (5), 469, 2019
92019
Factorization of square-free integers with high bits known
B Santoso, N Kunihiro, N Kanayama, K Ohta
International Conference on Cryptology in Vietnam, 115-130, 2006
82006
Information theoretic security for side-channel attacks to the Shannon cipher system
Y Oohama, B Santoso
arXiv preprint arXiv:1801.02563, 2018
72018
Privacy amplification of distributed encrypted sources with correlated keys
B Santoso, Y Oohama
2017 IEEE International Symposium on Information Theory (ISIT), 958-962, 2017
72017
More efficient two-round multi-signature scheme with provably secure parameters
K Takemure, Y Sakai, B Santoso, G Hanaoka, K Ohta
Cryptology ePrint Archive, 2023
62023
Factorization of square-free integers with high bits known
B Santoso, N Kunihiro, N Kanayama, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2008
62008
Cryptanalysis of Aggregate -Signature and Practical Countermeasures in Application to Bitcoin
G Hanaoka, K Ohta, Y Sakai, B Santoso, K Takemure, Y Zhao
Cryptology ePrint Archive, 2020
52020
A framework for Shannon ciphers under side-channel attacks: A strong converse and more
Y Oohama, B Santoso
2022 IEEE International Symposium on Information Theory (ISIT), 862-867, 2022
42022
Three-pass identification scheme based on MinRank problem with half cheating probability
B Santoso, Y Ikematsu, S Nakamura, T Yasuda
arXiv preprint arXiv:2205.03255, 2022
42022
Generalization of isomorphism of polynomials with two secrets and its application to public key encryption
B Santoso
Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020 …, 2020
42020
Secrecy amplification of distributed encrypted sources with correlated keys using post-encryption-compression
B Santoso, Y Oohama
IEEE Transactions on Information Forensics and Security 14 (11), 3042-3056, 2019
42019
A systematic study of bulletin board and its application
M Suwito, B Tama, B Santoso, S Dutta, H Tan, U Yoshifumi, K Sakurai
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
32022
Achieving pairing-free aggregate signatures using pre-communication between signers
K Takemure, Y Sakai, B Santoso, G Hanaoka, K Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
32021
Security analysis on an elgamal-like multivariate encryption scheme based on isomorphism of polynomials
Y Ikematsu, S Nakamura, B Santoso, T Yasuda
Information Security and Cryptology: 17th International Conference, Inscrypt …, 2021
32021
Post encryption compression with affine encoders for secrecy amplification in distributed source encryption with correlated keys
B Santoso, Y Oohama
2018 International Symposium on Information Theory and Its Applications …, 2018
32018
Improving efficiency of an ‘on the fly’identification scheme by perfecting zero-knowledgeness
B Santoso, K Ohta, K Sakiyama, G Hanaoka
Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010
32010
A new'on the fly'identification scheme: an asymptoticity trade-off between ZK and correctness
B Santoso, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2009
32009
Strong converse theorem for source encryption under side-channel attacks
Y Oohama, B Santoso
arXiv preprint arXiv:2201.11670, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20