Search Results1-20 of  28

  • 1 / 2
  • Nuttapong Attrapadung ID: 9000398249574

    Articles in CiNii:1

    • Secure Multi-party Computations to Realize Secure Data Sharing:4. Secure Computation via Garbled Circuit and Hybrid Constructions (2018)
  • Nuttapong Attrapadung ID: 9000405756338

    Articles in CiNii:1

    • Design and Implementation of Private Search over Shared Database (2019)
  • ATTRAPADUNG Nuttapong ID: 9000001380511

    Imai Laboratory, Information and Systems, Institute of Industrial Science, University of Tokyo (2003 from CiNii)

    Articles in CiNii:1

    • Optimally Mastering Keys in Various Broadcast Encryption Schemes (2003)
  • ATTRAPADUNG Nuttapong ID: 9000001651632

    Research Center for Information Security, National Institute of Advanced Industrial Science and Technology (2006 from CiNii)

    Articles in CiNii:3

    • Relationship between BDDH Assumption and Square BDDH Assumption (2006)
    • Relations Among Notions of Security for Identity Based Encryption Schemes (2005)
    • Relations Among Notions of Security for Identity Based Encryption Schemes (2005)
  • ATTRAPADUNG Nuttapong ID: 9000001673150

    Institute of Industrial Science, The University of Tokyo (2005 from CiNii)

    Articles in CiNii:1

    • Subset Incremental Chain Based Broadcast Encryption with Shorter Ciphertext (2005)
  • ATTRAPADUNG Nuttapong ID: 9000004955578

    Articles in CiNii:15

    • ID-based Encryption for Directed Acyclic Graph Hierarchies and Applications to Key-evolving Encryption Primitives (2004)
    • Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions (2009)
    • Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions (2009)
  • ATTRAPADUNG Nuttapong ID: 9000006192783

    東京大学 (2006 from CiNii)

    Articles in CiNii:1

    • Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys (2006)
  • ATTRAPADUNG Nuttapong ID: 9000016259825

    University of Tokyo (2007 from CiNii)

    Articles in CiNii:1

    • Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure (2007)
  • ATTRAPADUNG Nuttapong ID: 9000017690063

    RCIS, AIST (2010 from CiNii)

    Articles in CiNii:1

    • Dual-Policy Attribute Based Encryption : Simultaneous Access Control with Ciphertext and Key Policies (2010)
  • ATTRAPADUNG Nuttapong ID: 9000261025219

    Research Institute for Secure Systems, AIST (2014 from CiNii)

    Articles in CiNii:1

    • Methodology for designing cryptographic systems with advanced functionality based on a modular approach:— Towards reducing the barrier to introducing newly-designed cryptographic schemes into real-world systems — (2014)
  • ATTRAPADUNG Nuttapong ID: 9000283627336

    Research Institute for Secure Systems, AIST (2014 from CiNii)

    Articles in CiNii:1

    • Methodology for designing cryptographic systems with advanced functionality based on a modular approach:— Towards reducing the barrier to introducing newly-designed cryptographic schemes into real-world systems — (2014)
  • ATTRAPADUNG Nuttapong ID: 9000305590486

    Research Institute for Secure Systems (RISEC), National Institute of Advanced Industrial Science and Technology (AIST) (2014 from CiNii)

    Articles in CiNii:1

    • Dual System Encryption via Doubly Selective Security : A Generic Framework for Fully-Secure Predicate Encryption (2014)
  • ATTRAPADUNG Nuttapong ID: 9000365541616

    National Institute of Advanced Industrial Science and Technology (AIST) (2017 from CiNii)

    Articles in CiNii:1

    • New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security (2017)
  • ATTRAPADUNG Nuttapong ID: 9000367428609

    Information Technology Research Institute, National Institute of Advance Industrial Science and Technology (2017 from CiNii)

    Articles in CiNii:1

    • Private Similarity Searchable Encryption for Euclidean Distance (2017)
  • ATTRAPADUNG Nuttapong ID: 9000398137574

    National Institute of Advanced Industrial Science and Technology (AIST) (2018 from CiNii)

    Articles in CiNii:1

    • Generic Constructions for Fully Secure Revocable Attribute-Based Encryption (2018)
  • ATTRAPADUNG Nuttapong ID: 9000398137582

    Advanced Cryptosystems Research Group, National Institute of Advanced Industrial Science and Technology (AIST) (2018 from CiNii)

    Articles in CiNii:1

    • Attribute-Based Encryption for Range Attributes (2018)
  • ATTRAPADUNG Nuttapong ID: 9000404099213

    Advanced Cryptosystems Research Group, National Institute of Advanced Industrial Science and Technology (AIST) (2019 from CiNii)

    Articles in CiNii:1

    • A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions (2019)
  • ATTRAPADUNG Nuttapong ID: 9000405894632

    AIST (2020 from CiNii)

    Articles in CiNii:1

    • Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications (2020)
  • Attrapadung Nuttapong ID: 9000006359998

    University of Tokyo (2006 from CiNii)

    Articles in CiNii:1

    • AT-2-2 A Survey on Recent Advances in Broadcast Encryption (2006)
  • Attrapadung Nuttapong ID: 9000020837744

    Institute of Industrial Science, The University of Tokyo (2006 from CiNii)

    Articles in CiNii:1

    • Relations among Notions of Security for Identity Based Encryption Schemes (2006)
  • 1 / 2
Page Top