Follow
Takaaki Mizuki
Takaaki Mizuki
Verified email at cc.tohoku.ac.jp
Title
Cited by
Cited by
Year
Six-Card Secure AND and Four-Card Secure XOR.
T Mizuki, H Sone
FAW 5598, 358-369, 2009
1372009
The five-card trick can be done with four cards
T Mizuki, M Kumamoto, H Sone
Advances in Cryptology–ASIACRYPT 2012: 18th International Conference on the …, 2012
862012
A formalization of card-based cryptographic protocols via abstract machine
T Mizuki, H Shizuya
International Journal of Information Security 13, 15-23, 2014
802014
Analysis of electromagnetic information leakage from cryptographic devices with different physical structures
YI Hayashi, N Homma, T Mizuki, T Aoki, H Sone, L Sauvage, JL Danger
IEEE Transactions on Electromagnetic Compatibility 55 (3), 571-580, 2012
762012
Efficient card-based protocols for generating a hidden random permutation without fixed points
R Ishikawa, E Chida, T Mizuki
Unconventional Computation and Natural Computation: 14th International …, 2015
642015
Voting with a logarithmic number of cards
T Mizuki, IK Asiedu, H Sone
Unconventional Computation and Natural Computation: 12th International …, 2013
542013
Computational model of card-based cryptographic protocols and its applications
T Mizuki, H Shizuya
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
512017
Practical card-based cryptography
T Mizuki, H Shizuya
Fun with Algorithms: 7th International Conference, FUN 2014, Lipari Island …, 2014
502014
Card-based protocols for any boolean function
T Nishida, Y Hayashi, T Mizuki, H Sone
Theory and Applications of Models of Computation: 12th Annual Conference …, 2015
492015
The minimum number of cards in practical card-based protocols
J Kastner, A Koch, S Walzer, D Miyahara, Y Hayashi, T Mizuki, H Sone
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
472017
Physical zero-knowledge proof for Makaro
X Bultel, J Dreier, JG Dumas, P Lafourcade, D Miyahara, T Mizuki, ...
Stabilization, Safety, and Security of Distributed Systems: 20th …, 2018
452018
Efficient card-based zero-knowledge proof for Sudoku
T Sasaki, D Miyahara, T Mizuki, H Sone
Theoretical Computer Science 839, 135-142, 2020
442020
How to implement a random bisection cut
I Ueda, A Nishimura, Y Hayashi, T Mizuki, H Sone
Theory and Practice of Natural Computing: 5th International Conference, TPNC …, 2016
442016
Securely computing the three-input majority function with eight cards
T Nishida, T Mizuki, H Sone
Theory and Practice of Natural Computing: Second International Conference …, 2013
432013
Efficient evaluation of EM radiation associated with information leakage from cryptographic devices
Y Hayashi, N Homma, T Mizuki, H Shimada, T Aoki, H Sone, L Sauvage, ...
IEEE Transactions on Electromagnetic Compatibility 55 (3), 555-563, 2012
402012
Non-invasive EMI-based fault injection attack against cryptographic modules
Y Hayashi, N Homma, T Sugawara, T Mizuki, T Aoki, H Sone
2011 IEEE International Symposium on Electromagnetic Compatibility, 763-767, 2011
402011
Securely computing XOR with 10 cards
T Mizuki, F Uchiike, H Sone
Australasian Journal of Combinatorics 36, 279-293, 2006
392006
Practical card-based implementations of Yao's millionaire protocol
D Miyahara, Y Hayashi, T Mizuki, H Sone
Theoretical Computer Science 803, 207-221, 2020
372020
Card-based ZKP protocols for Takuzu and Juosan
D Miyahara, L Robert, P Lafourcade, S Takeshige, T Mizuki, K Shinagawa, ...
10th International Conference on Fun with Algorithms (FUN 2021), 2020
372020
Transient IEMI threats for cryptographic devices
Y Hayashi, N Homma, T Mizuki, T Aoki, H Sone
IEEE transactions on Electromagnetic Compatibility 55 (1), 140-148, 2012
352012
The system can't perform the operation now. Try again later.
Articles 1–20