Follow
Bagus Santoso
Title
Cited by
Cited by
Year
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ...
International Workshop on Public Key Cryptography, 243-261, 2012
452012
Universally composable RFID mutual authentication
C Su, B Santoso, Y Li, RH Deng, X Huang
IEEE Transactions on Dependable and Secure Computing 14 (1), 83-94, 2015
132015
Factorization of square-free integers with high bits known
B Santoso, N Kunihiro, N Kanayama, K Ohta
International Conference on Cryptology in Vietnam, 115-130, 2006
102006
Factorization of square-free integers with high bits known
B Santoso, N Kunihiro, N Kanayama, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2008
72008
Information theoretic security for Shannon cipher system under side-channel attacks
B Santoso, Y Oohama
Entropy 21 (5), 469, 2019
62019
Information theoretic security for side-channel attacks to the Shannon cipher system
Y Oohama, B Santoso
arXiv preprint arXiv:1801.02563, 2018
62018
Privacy amplification of distributed encrypted sources with correlated keys
B Santoso, Y Oohama
2017 IEEE International Symposium on Information Theory (ISIT), 958-962, 2017
62017
A new'on the fly'identification scheme: an asymptoticity trade-off between ZK and correctness
B Santoso, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2009
42009
Generalization of isomorphism of polynomials with two secrets and its application to public key encryption
B Santoso
International Conference on Post-Quantum Cryptography, 340-359, 2020
32020
Cryptanalysis of Aggregate -Signature and Practical Countermeasures in Application to Bitcoin
G Hanaoka, K Ohta, Y Sakai, B Santoso, K Takemure, Y Zhao
Cryptology ePrint Archive, 2020
32020
Secrecy amplification of distributed encrypted sources with correlated keys using post-encryption-compression
B Santoso, Y Oohama
IEEE Transactions on Information Forensics and Security 14 (11), 3042-3056, 2019
32019
Post encryption compression with affine encoders for secrecy amplification in distributed source encryption with correlated keys
B Santoso, Y Oohama
2018 International Symposium on Information Theory and Its Applications …, 2018
32018
Improving efficiency of an ‘on the fly’identification scheme by perfecting zero-knowledgeness
B Santoso, K Ohta, K Sakiyama, G Hanaoka
Cryptographers’ Track at the RSA Conference, 284-301, 2010
32010
A new three-pass code-based zero-knowledge identification scheme with cheating probability of exactly half
B Santoso, T Yamaguchi
2018 International Symposium on Information Theory and Its Applications …, 2018
22018
Information theoretical analysis of side-channel attacks to the Shannon cipher system
Y Oohama, B Santoso
2018 IEEE International Symposium on Information Theory (ISIT), 581-585, 2018
22018
Reviving identification scheme based on isomorphism of polynomials with two secrets: a refined theoretical and practical analysis
B Santoso
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
22018
Provable secure post-quantum signature scheme based on isomorphism of polynomials in quantum random oracle model
B Santoso, C Su
International Conference on Provable Security, 271-284, 2017
22017
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability
B Santoso, Y Ikematsu, S Nakamura, T Yasuda
arXiv preprint arXiv:2205.03255, 2022
12022
Strong Converse Theorem for Source Encryption under Side-Channel Attacks
Y Oohama, B Santoso
arXiv preprint arXiv:2201.11670, 2022
12022
Achieving pairing-free aggregate signatures using pre-communication between signers
K Takemure, Y Sakai, B Santoso, G Hanaoka, K Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20