Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ... Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 48 | 2012 |
Universally composable RFID mutual authentication C Su, B Santoso, Y Li, RH Deng, X Huang IEEE Transactions on Dependable and Secure Computing 14 (1), 83-94, 2015 | 17 | 2015 |
Information theoretic security for Shannon cipher system under side-channel attacks B Santoso, Y Oohama Entropy 21 (5), 469, 2019 | 9 | 2019 |
Factorization of square-free integers with high bits known B Santoso, N Kunihiro, N Kanayama, K Ohta International Conference on Cryptology in Vietnam, 115-130, 2006 | 8 | 2006 |
Information theoretic security for side-channel attacks to the Shannon cipher system Y Oohama, B Santoso arXiv preprint arXiv:1801.02563, 2018 | 7 | 2018 |
Privacy amplification of distributed encrypted sources with correlated keys B Santoso, Y Oohama 2017 IEEE International Symposium on Information Theory (ISIT), 958-962, 2017 | 7 | 2017 |
Factorization of square-free integers with high bits known B Santoso, N Kunihiro, N Kanayama, K Ohta IEICE transactions on fundamentals of electronics, communications and …, 2008 | 6 | 2008 |
More efficient two-round multi-signature scheme with provably secure parameters K Takemure, Y Sakai, B Santoso, G Hanaoka, K Ohta Cryptology ePrint Archive, 2023 | 5 | 2023 |
Cryptanalysis of Aggregate -Signature and Practical Countermeasures in Application to Bitcoin G Hanaoka, K Ohta, Y Sakai, B Santoso, K Takemure, Y Zhao Cryptology ePrint Archive, 2020 | 5 | 2020 |
A framework for Shannon ciphers under side-channel attacks: A strong converse and more Y Oohama, B Santoso 2022 IEEE International Symposium on Information Theory (ISIT), 862-867, 2022 | 4 | 2022 |
Three-pass identification scheme based on MinRank problem with half cheating probability B Santoso, Y Ikematsu, S Nakamura, T Yasuda arXiv preprint arXiv:2205.03255, 2022 | 4 | 2022 |
Generalization of isomorphism of polynomials with two secrets and its application to public key encryption B Santoso Post-Quantum Cryptography: 11th International Conference, PQCrypto 2020 …, 2020 | 4 | 2020 |
Secrecy amplification of distributed encrypted sources with correlated keys using post-encryption-compression B Santoso, Y Oohama IEEE Transactions on Information Forensics and Security 14 (11), 3042-3056, 2019 | 4 | 2019 |
A systematic study of bulletin board and its application M Suwito, B Tama, B Santoso, S Dutta, H Tan, U Yoshifumi, K Sakurai Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 3 | 2022 |
Achieving pairing-free aggregate signatures using pre-communication between signers K Takemure, Y Sakai, B Santoso, G Hanaoka, K Ohta IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021 | 3 | 2021 |
Security analysis on an elgamal-like multivariate encryption scheme based on isomorphism of polynomials Y Ikematsu, S Nakamura, B Santoso, T Yasuda Information Security and Cryptology: 17th International Conference, Inscrypt …, 2021 | 3 | 2021 |
Post encryption compression with affine encoders for secrecy amplification in distributed source encryption with correlated keys B Santoso, Y Oohama 2018 International Symposium on Information Theory and Its Applications …, 2018 | 3 | 2018 |
Improving efficiency of an ‘on the fly’identification scheme by perfecting zero-knowledgeness B Santoso, K Ohta, K Sakiyama, G Hanaoka Topics in Cryptology-CT-RSA 2010: The Cryptographers’ Track at the RSA …, 2010 | 3 | 2010 |
A new'on the fly'identification scheme: an asymptoticity trade-off between ZK and correctness B Santoso, K Ohta IEICE transactions on fundamentals of electronics, communications and …, 2009 | 3 | 2009 |
Strong converse theorem for source encryption under side-channel attacks Y Oohama, B Santoso arXiv preprint arXiv:2201.11670, 2022 | 2 | 2022 |