default search action
Yoshiki Abe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j5]Takeshi Nakai, Keita Iwanari, Tomoki Ono, Yoshiki Abe, Yohei Watanabe, Mitsugu Iwamoto:
Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model. New Gener. Comput. 42(3): 345-358 (2024) - [j4]Anastasiia Doi, Tomoki Ono, Yoshiki Abe, Takeshi Nakai, Kazumasa Shinagawa, Yohei Watanabe, Koji Nuida, Mitsugu Iwamoto:
Card-Based Protocols for Private Set Intersection and Union. New Gener. Comput. 42(3): 359-380 (2024) - [j3]Kyosuke Hatsugai, Suthee Ruangwises, Kyoichi Asano, Yoshiki Abe:
NP-Completeness and Physical Zero-Knowledge Proofs for Sumplete, a Puzzle Generated by ChatGPT. New Gener. Comput. 42(3): 429-448 (2024) - [c4]Suthee Ruangwises, Tomoki Ono, Yoshiki Abe, Kyosuke Hatsugai, Mitsugu Iwamoto:
Card-Based Overwriting Protocol for Equality Function and Applications. UCNC 2024: 18-27 - [i3]Suthee Ruangwises, Tomoki Ono, Yoshiki Abe, Kyosuke Hatsugai, Mitsugu Iwamoto:
Card-Based Overwriting Protocol for Equality Function and Applications. CoRR abs/2402.16290 (2024) - 2023
- [j2]Yoshiki Abe, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Ohta:
A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 315-324 (2023) - [c3]Kyosuke Hatsugai, Kyoichi Asano, Yoshiki Abe:
A Physical Zero-Knowledge Proof for Sumplete, a Puzzle Generated by ChatGPT. COCOON (1) 2023: 398-410 - 2022
- [j1]Yoshiki Abe, Takeshi Nakai, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Card-Based Majority Voting Protocols. New Gener. Comput. 40(1): 173-198 (2022) - 2020
- [c2]Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta:
How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs. ISITA 2020: 377-381
2010 – 2019
- 2019
- [c1]Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Private PEZ Protocols for Symmetric Functions. TCC (1) 2019: 372-392 - [i2]A. J. Han Vinck, Kees A. Schouhamer Immink, Tadashi Wadayama, Van Khu Vu, Akiko Manada, Kui Cai, Shunsuke Horii, Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta, Xingwei Zhong, Zhen Mei, Renfei Bu, Jos H. Weber, Vitaly Skachek, Hiroyoshi Morita, N. Hovhannisyan, Hiroshi Kamabe, Shan Lu, Hirosuke Yamamoto, Kengo Hashimoto, Øyvind Ytrehus, Shigeaki Kuzuoka, Mikihiko Nishiara, Han Mao Kiah, Jun Muramatsu, Shigeki Miyake:
Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory. CoRR abs/1907.02944 (2019) - [i1]Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Private PEZ Protocols for Symmetric Functions. IACR Cryptol. ePrint Arch. 2019: 1069 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint