Yamamura, Kazuki; Wang, Yuntao; Fujisaki, Eiichiro Improved lattice enumeration algorithms by primal and dual reordering methods. (English) Zbl 07628048 Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 159-174 (2022). MSC: 68M25 68P25 94A60 PDFBibTeX XMLCite \textit{K. Yamamura} et al., Lect. Notes Comput. Sci. 13218, 159--174 (2022; Zbl 07628048) Full Text: DOI
Fujisaki, Eiichiro Improving practical UC-secure commitments based on the DDH assumption. (English) Zbl 1416.94049 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 257-272 (2016). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{E. Fujisaki}, Lect. Notes Comput. Sci. 9841, 257--272 (2016; Zbl 1416.94049) Full Text: DOI
Matsuura, Kanta (ed.); Fujisaki, Eiichiro (ed.) Advances in information and computer security. Third international workshop on security, IWSEC 2008, Kagawa, Japan, November 25–27, 2008. Proceedings. (English) Zbl 1152.68308 Lecture Notes in Computer Science 5312. Berlin: Springer (ISBN 978-3-540-89597-8/pbk). xii, 299 p. (2008). MSC: 68-06 94-06 68P25 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{K. Matsuura} (ed.) and \textit{E. Fujisaki} (ed.), Advances in information and computer security. Third international workshop on security, IWSEC 2008, Kagawa, Japan, November 25--27, 2008. Proceedings. Berlin: Springer (2008; Zbl 1152.68308) Full Text: DOI
Fujisaki, Eiichiro; Okamoto, Tatsuaki; Pointcheval, David; Stern, Jacques RSA-OAEP is secure under the RSA assumption. (English) Zbl 1083.68038 J. Cryptology 17, No. 2, 81-104 (2004). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{E. Fujisaki} et al., J. Cryptology 17, No. 2, 81--104 (2004; Zbl 1083.68038) Full Text: DOI
Fujisaki, Eiichiro; Okamoto, Tatsuaki Statistical zero knowledge protocols to prove modular polynomial relations. (English) Zbl 0880.94007 Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 16-30 (1997). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{E. Fujisaki} and \textit{T. Okamoto}, Lect. Notes Comput. Sci. 1294, 16--30 (1997; Zbl 0880.94007)
Abe, Masayuki; Fujisaki, Eiichiro How to date blind signatures. (English) Zbl 0994.68588 Kim, Kwangjo (ed.) et al., Advances in cryptology - ASIACRYPT ’96. International conference on the theory and applications of cryptology and information security, Kyongju, Korea, November 3-7, 1996. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1163, 244-251 (1996). MSC: 68U99 68P25 94A60 PDFBibTeX XMLCite \textit{M. Abe} and \textit{E. Fujisaki}, Lect. Notes Comput. Sci. 1163, 244--251 (1996; Zbl 0994.68588)