Yusuke

Results: 144



#Item
21

Computationally Sound Symbolic Anonymity of a Ring Signature Yusuke Kawamoto † Hideki Sakurada ‡

Add to Reading List

Source URL: www.cs.bham.ac.uk

- Date: 2013-08-01 12:14:39
    22

    LeakWatch: Estimating Information Leakage from Java Programs Tom Chothia1 , Yusuke Kawamoto2⋆ , and Chris Novakovic1 1 School of Computer Science, University of Birmingham, UK

    Add to Reading List

    Source URL: www.cs.bham.ac.uk

    - Date: 2015-08-02 23:01:51
      23

      Computational Soundness of Symbolic XOR in the Presence of Active Adversaries (Abstract) Hideki Sakurada1 , Yusuke Kawamoto∗,2 , and Masami Hagiya2 sakurada at theory.brl.ntt.co.jp, {y kwmt, hagiya} at is.s.u-tokyo.ac.

      Add to Reading List

      Source URL: www.cs.bham.ac.uk

      - Date: 2014-09-13 07:14:29
        24

        Formal Verification of Cryptography (I) -- Introduction to basic concepts in cryptography Yusuke Kawamoto INRIA Saclay & LIX, École Polytechnique, France In University of Tokyo

        Add to Reading List

        Source URL: www.cs.bham.ac.uk

        - Date: 2014-05-18 16:48:57
          25

          Computationally Sound Symbolic Analysis of Anonymity in the Presence of Active Adversaries Yusuke Kawamoto1 and Hideki Sakurada2 1

          Add to Reading List

          Source URL: www.cs.bham.ac.uk

          - Date: 2014-09-13 07:14:15
            26

            Computational Soundness of (Interactive) Zero-Knowledge Proof Systems in the Presence of Active Adversaries Yusuke Kawamoto1 (Jointly with Gergei Bana2 and Hideki Sakurada3) 1

            Add to Reading List

            Source URL: www.rcis.aist.go.jp

            - Date: 2009-04-13 05:46:31
              27

              Probabilistic Point-to-Point Information Leakage Tom Chothia∗ , Yusuke Kawamoto∗ , Chris Novakovic∗ and David Parker∗ ∗ School of Computer Science University of Birmingham, Birmingham, UK Abstract—The output

              Add to Reading List

              Source URL: www.cs.bham.ac.uk

              - Date: 2013-08-01 12:14:39
                28

                Quantitative Information Flow for Scheduler-Dependent Systems ∗ Yusuke Kawamoto Thomas Given-Wilson

                Add to Reading List

                Source URL: www.cs.bham.ac.uk

                - Date: 2015-02-10 06:19:43
                  29

                  Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption Yusuke Kawamoto1 Hideki Sakurada2 Masami Hagiya1 1 Department of Computer Science, Graduate School of Information Science and Technology,

                  Add to Reading List

                  Source URL: www.cs.bham.ac.uk

                  - Date: 2013-08-01 12:14:39
                    30

                    A Tool for Estimating Information Leakage? Tom Chothia, Yusuke Kawamoto, and Chris Novakovic School of Computer Science, University of Birmingham, Birmingham, UK Abstract. We present leakiEst, a tool that estimates how m

                    Add to Reading List

                    Source URL: www.cs.bham.ac.uk

                    - Date: 2013-08-01 12:14:38
                      UPDATE