default search action
Shingo Sato
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Kazuhiko Minematsu, Shingo Sato, Junji Shikata:
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing. Des. Codes Cryptogr. 92(12): 4423-4451 (2024) - [j3]Kota Chin, Keita Emura, Shingo Sato, Kazumasa Omote:
A Sealed-Bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage. IEICE Trans. Inf. Syst. 107(5): 615-624 (2024) - [c19]Shingo Sato, Junji Shikata:
Compact Post-quantum Bounded-Collusion Identity-Based Encryption. CANS (1) 2024: 101-122 - [c18]Keita Emura, Shingo Sato, Atsushi Takayasu:
Attribute-Based Keyed Fully Homomorphic Encryption. SCN (2) 2024: 47-67 - [i11]Shannon Leigh Walston, Hiroshi Seki, Hirotaka Takita, Yasuhito Mitsuyama, Shingo Sato, Akifumi Hagiwara, Rintaro Ito, Shouhei Hanaoka, Yukio Miki, Daiju Ueda:
Data Set Terminology of Artificial Intelligence in Medicine: A Historical Review and Recommendation. CoRR abs/2404.19303 (2024) - [i10]Keita Emura, Shingo Sato, Atsushi Takayasu:
Attribute-based Keyed (Fully) Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2024: 226 (2024) - [i9]Shingo Sato, Junji Shikata:
Bounded CCA Secure Proxy Re-encryption Based on Kyber. IACR Cryptol. ePrint Arch. 2024: 1977 (2024) - 2023
- [c17]Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata:
A Tightly Secure Identity-Based Signature Scheme from Isogenies. PQCrypto 2023: 141-163 - [i8]Hyungrok Jo, Shingo Sato, Junji Shikata:
A Tightly Secure Identity-based Signature Scheme from Isogenies. IACR Cryptol. ePrint Arch. 2023: 426 (2023) - [i7]Shingo Sato, Junji Shikata:
Compact Bounded-Collusion Identity-based Encryption via Group Testing. IACR Cryptol. ePrint Arch. 2023: 444 (2023) - 2022
- [c16]Shingo Sato, Keita Emura, Atsushi Takayasu:
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation. ACNS 2022: 3-23 - [c15]Shingo Sato, Junji Shikata:
Quantum-Secure Aggregate One-time Signatures with Detecting Functionality. AINA (2) 2022: 573-585 - [c14]Kota Chin, Keita Emura, Kazumasa Omote, Shingo Sato:
A Sealed-bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage. Blockchain 2022: 398-405 - [c13]Shingo Sato, Junji Shikata, Tsutomu Matsumoto:
Group Testing Aggregate Signatures with Soundness. ICISC 2022: 363-381 - [c12]Shingo Sato, Junji Shikata:
Identity-based Interactive Aggregate Signatures from Lattices. ICISC 2022: 408-432 - [i6]Kota Chin, Keita Emura, Kazumasa Omote, Shingo Sato:
A Sealed-bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage. CoRR abs/2207.10823 (2022) - [i5]Shingo Sato, Keita Emura, Atsushi Takayasu:
Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2022: 17 (2022) - [i4]Shingo Sato, Junji Shikata:
Quantum-Secure Aggregate One-time Signatures with Detecting Functionality. IACR Cryptol. ePrint Arch. 2022: 272 (2022) - [i3]Shingo Sato, Junji Shikata:
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model. IACR Cryptol. ePrint Arch. 2022: 617 (2022) - 2020
- [b1]Shingo Sato:
A Study on Cryptography Resistant to Quantum Computing. Yokohama National University, Japan, 2020 - [c11]Yoshinori Ogawa, Shingo Sato, Junji Shikata, Hideki Imai:
Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes. ISIT 2020: 868-873 - [c10]Ken Mishina, Shingo Sato, Shohei Yamamoto, Yuki Yoshida, Daisuke Hisano, Akihiro Maruta:
Demodulation of Eigenvalue Modulated Signal Based on Eigenvalue-Domain Neural Network. OFC 2020: 1-3 - [i2]Shingo Sato, Junji Shikata:
Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing. IACR Cryptol. ePrint Arch. 2020: 1218 (2020) - [i1]Shingo Sato, Junji Shikata, Tsutomu Matsumoto:
Aggregate Signature with Detecting Functionality from Group Testing. IACR Cryptol. ePrint Arch. 2020: 1219 (2020)
2010 – 2019
- 2019
- [j2]Shingo Sato, Shoichi Hirose, Junji Shikata:
Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality. J. Internet Serv. Inf. Secur. 9(1): 2-23 (2019) - [c9]Shingo Sato, Junji Shikata:
Interactive Aggregate Message Authentication Scheme with Detecting Functionality. AINA 2019: 1316-1328 - [c8]Shingo Sato, Junji Shikata:
Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes. IMACC 2019: 295-316 - [c7]Shingo Sato, Junji Shikata:
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model. IMACC 2019: 317-341 - [c6]Shingo Sato, Shoichi Hirose, Junji Shikata:
Sequential Aggregate MACs with Detecting Functionality Revisited. NSS 2019: 387-407 - 2018
- [c5]Kyunghwa Lee, Hassan El Dirani, Pascal Fonteneau, Maryline Bawedin, Shingo Sato, Sorin Cristoloveanu:
Sharp switching, hysteresis-free characteristics of Z2-FET for fast logic applications. ESSDERC 2018: 74-77 - [c4]Shingo Sato, Junji Shikata:
Lattice-Based Signcryption Without Random Oracles. PQCrypto 2018: 331-351 - [c3]Shingo Sato, Shoichi Hirose, Junji Shikata:
Generic Construction of Sequential Aggregate MACs from Any MACs. ProvSec 2018: 295-312 - [c2]Shingo Sato, Junji Shikata:
Signcryption with Quantum Random Oracles. ProvSec 2018: 406-414 - 2016
- [c1]Shashank Jaiswal, Rajesh Reddy, Raja Banerjee, Shingo Sato, Daisuke Komagata, Makoto Ando, Jun Okada:
An Efficient GPU Parallelization for Arbitrary Collocated Polyhedral Finite Volume Grids and Its Application to Incompressible Fluid Flows. HiPC Workshops 2016: 81-89
2000 – 2009
- 2009
- [j1]Kyo Takahashi, Shingo Sato, Tadamichi Kudo, Yoshitaka Tsunekawa:
High-Performance VLSI Architecture of the LMS Adaptive Filter Using 4-2 Adders. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(2): 633-637 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 21:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint