default search action
Hideaki Sone
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j30]Ken Takashima, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone:
Actively revealing card attack on card-based protocols. Nat. Comput. 21(4): 615-628 (2022) - 2021
- [j29]Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Evaluating card-based protocols in terms of execution time. Int. J. Inf. Sec. 20(5): 729-740 (2021) - [j28]Yuta Abe, Takaaki Mizuki, Hideaki Sone:
Committed-format AND protocol using only random cuts. Nat. Comput. 20(4): 639-645 (2021) - [j27]Yuta Abe, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Five-Card AND Computations in Committed Format Using Only Uniform Cyclic Shuffles. New Gener. Comput. 39(1): 97-114 (2021) - [j26]Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Léo Robert, Tatsuya Sasaki, Hideaki Sone:
How to construct physical zero-knowledge proofs for puzzles with a "single loop" condition. Theor. Comput. Sci. 888: 41-55 (2021) - [c50]Daiki Miyahara, Yuichi Komano, Takaaki Mizuki, Hideaki Sone:
Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags. CSF 2021: 1-16 - [c49]Hiroto Koyama, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone:
A Secure Three-Input AND Protocol with a Standard Deck of Minimal Cards. CSR 2021: 242-256 - [c48]Daiki Miyahara, Léo Robert, Pascal Lafourcade, So Takeshige, Takaaki Mizuki, Kazumasa Shinagawa, Atsuki Nagao, Hideaki Sone:
Card-Based ZKP Protocols for Takuzu and Juosan. FUN 2021: 20:1-20:21 - [c47]Dai Sato, Hideaki Sone:
Proposal of Information Hub Models for Effective Disaster Support Activities. ICT-DM 2021: 171-174 - [c46]Soma Murata, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone:
Efficient Generation of a Card-Based Uniformly Distributed Random Derangement. WALCOM 2021: 78-89 - 2020
- [j25]Itaru Ueda, Daiki Miyahara, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Secure implementations of a random bisection cut. Int. J. Inf. Sec. 19(4): 445-452 (2020) - [j24]Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Practical card-based implementations of Yao's millionaire protocol. Theor. Comput. Sci. 803: 207-221 (2020) - [j23]Tatsuya Sasaki, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone:
Efficient card-based zero-knowledge proof for Sudoku. Theor. Comput. Sci. 839: 135-142 (2020) - [j22]Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, Hideaki Sone:
Card-based protocols for secure ranking computations. Theor. Comput. Sci. 845: 122-135 (2020) - [c45]Kodai Toyoda, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone:
Six-Card Finite-Runtime XOR Protocol with Only Random Cut. APKC@AsiaCCS 2020: 2-8 - [c44]Soma Murata, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone:
Public-PEZ Cryptography. ISC 2020: 59-74 - [c43]Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, Hideaki Sone:
Card-Based Covert Lottery. SECITC 2020: 257-270
2010 – 2019
- 2019
- [j21]Daiki Miyahara, Tatsuya Sasaki, Takaaki Mizuki, Hideaki Sone:
Card-Based Physical Zero-Knowledge Proof for Kakuro. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1072-1078 (2019) - [c42]Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, Hideaki Sone:
Card-Based Secure Ranking Computations. COCOA 2019: 461-472 - [c41]Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, Hideaki Sone:
Interactive Physical Zero-Knowledge Proof for Norinori. COCOON 2019: 166-177 - [c40]Dai Sato, Shoko Miyagawa, Michinori Hatayama, Yoichi Kayama, Hideaki Sone:
Sharing Information to Eliminate Support Irregularities and Omissions: - Cases from Disaster Information Supporters in Japan -. ICT-DM 2019: 1-6 - [c39]Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, Hideaki Sone:
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation. ISPEC 2019: 135-151 - [c38]Ken Takashima, Daiki Miyahara, Takaaki Mizuki, Hideaki Sone:
Card-Based Protocol Against Actively Revealing Card Attack. TPNC 2019: 95-106 - 2018
- [j20]Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Pile-Shifting Scramble for Card-Based Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1494-1502 (2018) - [j19]Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Card-based protocols using unequal division shuffles. Soft Comput. 22(2): 361-371 (2018) - [c37]Yuta Abe, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles. APKC@AsiaCCS 2018: 3-8 - [c36]Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol. COCOA 2018: 246-261 - [c35]Tatsuya Sasaki, Takaaki Mizuki, Hideaki Sone:
Card-Based Zero-Knowledge Proof for Sudoku. FUN 2018: 29:1-29:10 - [c34]Dai Sato, Hideaki Sone:
Online Media Usage by Disaster Volunteer Centers. ICT-DM 2018: 1-4 - [c33]Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki, Kazumasa Shinagawa, Hideaki Sone:
Physical Zero-Knowledge Proof for Makaro. SSS 2018: 111-125 - [c32]Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Analyzing Execution Time of Card-Based Protocols. UCNC 2018: 145-158 - [c31]Tatsuya Sasaki, Bateh Mathias Agbor, Shingo Masuda, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Secret Key Amplification from Uniformly Leaked Key Exchange Complete Graph. WALCOM 2018: 20-31 - 2017
- [j18]Hideaki Sone:
Foreword. IEICE Trans. Electron. 100-C(9): 694 (2017) - [c30]Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
The Minimum Number of Cards in Practical Card-Based Protocols. ASIACRYPT (3) 2017: 126-155 - [i2]Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Card-Based Protocols Using Unequal Division Shuffle. IACR Cryptol. ePrint Arch. 2017: 425 (2017) - [i1]Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
The Minimum Number of Cards in Practical Card-based Protocols. IACR Cryptol. ePrint Arch. 2017: 863 (2017) - 2016
- [c29]Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
An Implementation of Non-Uniform Shuffle for Secure Multi-Party Computation. AsiaPKC@AsiaCCS 2016: 49-55 - [c28]Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions. Mycrypt 2016: 193-211 - [c27]Itaru Ueda, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
How to Implement a Random Bisection Cut. TPNC 2016: 58-69 - 2015
- [j17]Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Securely Computing Three-Input Functions with Eight Cards. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(6): 1145-1152 (2015) - [c26]Shoichi Ando, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Basic Study on the Method for Real-Time Video Streaming with Low Latency and High Bandwidth Efficiency. COMPSAC Workshops 2015: 79-82 - [c25]Megumi Saito, Takaaki Mizuki, Hideaki Sone, Yu-ichi Hayashi:
Fundamental study on randomized processing in cryptographic IC using variable clock against Correlation Power Analysis. EMC Compo 2015: 39-43 - [c24]Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Card-Based Protocols for Any Boolean Function. TAMC 2015: 110-121 - [c23]Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Five-Card Secure Computations Using Unequal Division Shuffle. TPNC 2015: 109-120 - 2014
- [j16]Takaaki Mizuki, Daizo Mikami, Hideaki Sone:
Minimizing ESCT forms for two-variable multiple-valued input binary output functions. Discret. Appl. Math. 169: 186-194 (2014) - [j15]Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Investigation of Noise Interference due to Connector Contact Failure in a Coaxial Cable. IEICE Trans. Electron. 97-C(9): 900-903 (2014) - [c22]Yu-ichi Hayashi, Naofumi Homma, Mamoru Miura, Takafumi Aoki, Hideaki Sone:
A Threat for Tablet PCs in Public Space: Remote Visualization of Screen Images Using EM Emanation. CCS 2014: 954-965 - 2013
- [j14]Kazuya Uehara, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Evaluation of Resistance and Inductance of Loose Connector Contact. IEICE Trans. Electron. 96-C(9): 1148-1150 (2013) - [j13]Masahiro Kinugawa, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard. IEICE Trans. Commun. 96-B(10): 2633-2638 (2013) - [c21]Toshiki Watanabe, Shunichi Kinoshita, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone:
Flexible Access and Priority Control System Based on 802.1X Authentication in Time of Disaster. COMPSAC Workshops 2013: 385-390 - [c20]Shunichi Kinoshita, Toshiki Watanabe, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone:
Fault-Tolerant Wireless LAN Roaming System Using Client Certificates. COMPSAC 2013: 822-823 - [c19]Takuya Nishida, Takaaki Mizuki, Hideaki Sone:
Securely Computing the Three-Input Majority Function with Eight Cards. TPNC 2013: 193-204 - [c18]Takaaki Mizuki, Isaac Kobina Asiedu, Hideaki Sone:
Voting with a Logarithmic Number of Cards. UCNC 2013: 162-173 - 2012
- [j12]Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takeshi Sugawara, Yoshiki Kayano, Takafumi Aoki, Shigeki Minegishi, Akashi Satoh, Hideaki Sone, Hiroshi Inoue:
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current. IEICE Trans. Electron. 95-C(6): 1089-1097 (2012) - [j11]Kazuki Matsuda, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Mechanism of Increase in Inductance at Loosened Connector Contact Boundary. IEICE Trans. Electron. 95-C(9): 1502-1507 (2012) - [c17]Takaaki Mizuki, Michihito Kumamoto, Hideaki Sone:
The Five-Card Trick Can Be Done with Four Cards. ASIACRYPT 2012: 598-606 - [c16]Toshiki Watanabe, Shunichi Kinoshita, Junichi Yamato, Hideaki Goto, Hideaki Sone:
Flexible Access Control Framework Considering IdP-Side's Authorization Policy in Roaming Environment. COMPSAC Workshops 2012: 76-81 - [c15]Shunichi Kinoshita, Toshiki Watanabe, Junichi Yamato, Hideaki Goto, Hideaki Sone:
Implementation and Evaluation of an OpenFlow-Based Access Control System for Wireless LAN Roaming. COMPSAC Workshops 2012: 82-87 - 2011
- [j10]Yu-ichi Hayashi, Yoshiki Kayano, Takaaki Mizuki, Hideaki Sone, Hiroshi Inoue:
Contact Conditions in Connectors that Cause Common Mode Radiation. IEICE Trans. Electron. 94-C(9): 1369-1374 (2011) - [j9]Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone:
Analysis of Electromagnetic Radiation from Transmission Line with Loose Contact of Connector. IEICE Trans. Electron. 94-C(9): 1427-1430 (2011) - [j8]Takaaki Mizuki, Satoru Nakayama, Hideaki Sone:
An Application of ST-Numbering to Secret Key Agreement. Int. J. Found. Comput. Sci. 22(5): 1211-1227 (2011) - [c14]Yoshinori Miyamoto, Yasuhiro Yamasaki, Hideaki Goto, Hideaki Sone:
Optimization System of IP Address Using Terminal ID in Eduroam. SAINT 2011: 342-346 - [c13]Yasuhiro Yamasaki, Yoshinori Miyamoto, Junichi Yamato, Hideaki Goto, Hideaki Sone:
Flexible Access Management System for Campus VLAN Based on OpenFlow. SAINT 2011: 347-351 - 2010
- [c12]Hitoshi Okada, Hideaki Sone, Masaru Ogawa:
Teaching Internet Safety at Universities using "Hikari & Tsubasa's Information Security Game". CSEDU (1) 2010: 431-433 - [c11]Ichiro Yamaguchi, Takaaki Suzuki, Hideaki Goto, Hideaki Sone:
Centralized Authentication System for Location Privacy Protection and Low Operational Cost of Large Scale WLAN Roaming. SAINT 2010: 297-299
2000 – 2009
- 2009
- [j7]Yu-ichi Hayashi, Hideaki Sone:
The Effect of Position of a Connector Contact Failure on Electromagnetic Near-Field around a Coaxial Cable. IEICE Trans. Commun. 92-B(6): 1969-1973 (2009) - [j6]Takaaki Mizuki, Takuya Sato, Hideaki Sone:
A one-round secure message broadcasting protocol through a key sharing tree. Inf. Process. Lett. 109(15): 842-845 (2009) - [c10]Takaaki Mizuki, Hideaki Sone:
Six-Card Secure AND and Four-Card Secure XOR. FAW 2009: 358-369 - [c9]Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Akashi Satoh:
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules. WISA 2009: 66-78 - 2008
- [j5]Yu-ichi Hayashi, Hideaki Sone:
Fundamental Measurement of Electromagnetic Field Radiated from a Coaxial Transmission Line Caused by Connector Contact Failure. IEICE Trans. Electron. 91-C(8): 1306-1312 (2008) - [c8]Yoshikazu Watanabe, Hideaki Goto, Hideaki Sone:
Resource Access Control for Wireless LAN Roaming Systems. SAINT 2008: 281-284 - 2007
- [j4]Takaaki Mizuki, Taro Otagiri, Hideaki Sone:
An Application of ESOP Expressions to Secure Computations. J. Circuits Syst. Comput. 16(2): 191-198 (2007) - [c7]Takaaki Mizuki, Yoshinori Kugimoto, Hideaki Sone:
Secure Multiparty Computations Using the 15 Puzzle. COCOA 2007: 255-266 - [c6]Tetsuo Imai, Hideaki Goto, Hideaki Sone:
A Policy-Based, Secure Access Control Mechanism for Network Roaming Infrastructures. SAINT Workshops 2007: 30 - [c5]Takaaki Mizuki, Yoshinori Kugimoto, Hideaki Sone:
Secure Multiparty Computations Using a Dial Lock. TAMC 2007: 499-510 - 2006
- [j3]Takaaki Mizuki, Fumishige Uchiike, Hideaki Sone:
Securely computing XOR with 10 cards. Australas. J Comb. 36: 279-294 (2006) - [j2]Hiroyuki Ishida, Shosuke Suzuki, Hideaki Sone, Hiroshi Inoue, Masanari Taniguchi, Tasuku Takagi:
Formation Mechanism of Dark Bridge between Contacts with Very Slow Opening Speed. IEICE Trans. Electron. 89-C(8): 1136-1140 (2006) - [c4]Takaaki Mizuki, Taro Otagiri, Hideaki Sone:
Secure Computations in a Minimal Model Using Multiple-Valued ESOP Expressions. TAMC 2006: 547-554 - 2005
- [j1]Hiroyuki Ishida, Masanari Taniguchi, Hideaki Sone, Hiroshi Inoue, Tasuku Takagi:
Relationship between Length and Diameter of Contact Bridge Formed under Thermal Equilibrium Condition. IEICE Trans. Electron. 88-C(8): 1566-1572 (2005) - [c3]Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, Yousuke Toyota:
Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion. DRMTICS 2005: 203-216 - [c2]Yu Ichifuji, Susumu Konno, Hideaki Sone:
A Method to Monitor a BBS Using Feature Extraction of Text Data. Human.Society@Internet 2005: 349-352
1990 – 1999
- 1997
- [c1]Kohei Ohta, Takumi Mori, Nei Kato, Hideaki Sone, Glenn Mansfield, Yoshiaki Nemoto:
Divide and Conquer Technique for Network Fault Management. Integrated Network Management 1997: 675-687
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint