default search action
Yoshifumi Manabe
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Yoshifumi Manabe, Hibiki Ono:
Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations. New Gener. Comput. 42(3): 305-329 (2024) - 2023
- [c35]Yoshifumi Manabe, Kazumasa Shinagawa:
Free-XOR in Card-Based Garbled Circuits. CANS 2023: 232-248 - [c34]Tomoya Morooka, Yoshifumi Manabe, Kazumasa Shinagawa:
Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations. ISPEC 2023: 332-346 - 2022
- [j22]Yoshifumi Manabe, Hibiki Ono:
Card-Based Cryptographic Protocols with Malicious Players Using Private Operations. New Gener. Comput. 40(1): 67-93 (2022) - [c33]Musashi Takanezawa, Yoshifumi Manabe:
Many-to-many perfect matching. AISS 2022: 4:1-4:7 - [c32]Takuro Fukasawa, Yoshifumi Manabe:
Card-Based Zero-Knowledge Proof for the Nearest Neighbor Property: Zero-Knowledge Proof of ABC End View. SPACE 2022: 147-161 - 2021
- [j21]Hibiki Ono, Yoshifumi Manabe:
Minimum Round Card-Based Cryptographic Protocols Using Private Operations. Cryptogr. 5(3): 17 (2021) - [j20]Hibiki Ono, Yoshifumi Manabe:
Card-Based Cryptographic Logical Computations Using Private Operations. New Gener. Comput. 39(1): 19-40 (2021) - [c31]Yoshifumi Manabe, Hibiki Ono:
Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations. ICTAC 2021: 256-274 - [c30]Yoshifumi Manabe, Hibiki Ono:
Card-Based Cryptographic Protocols for Three-Input Functions Using Private Operations. IWOCA 2021: 469-484 - 2020
- [c29]Yoshifumi Manabe, Hibiki Ono:
Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players. SECITC 2020: 55-70 - [c28]Yuki Okano, Yoshifumi Manabe:
A Three-Player Envy-Free Discrete Division Protocol for Mixed Manna. TPNC 2020: 42-53
2010 – 2019
- 2019
- [c27]Hibiki Ono, Yoshifumi Manabe:
Card-Based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations. DPM/CBT@ESORICS 2019: 156-173 - 2018
- [j19]Takuya Ibaraki, Yoshifumi Manabe:
Privacy-Preserving Group Matching Protocol. J. Comput. 13(9): 1037-1041 (2018) - [c26]Hibiki Ono, Yoshifumi Manabe:
Efficient Card-Based Cryptographic Protocols for the Millionaires' Problem Using Private Input Operations. AsiaJCIS 2018: 23-28 - [c25]Hibiki Ono, Yoshifumi Manabe:
Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations. FPS 2018: 193-207 - 2016
- [j18]Yasuyuki Tsukada, Hideki Sakurada, Ken Mano, Yoshifumi Manabe:
On compositional reasoning about anonymity and privacy in epistemic logic. Ann. Math. Artif. Intell. 78(2): 101-129 (2016) - [j17]Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto:
A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(8): 1591-1599 (2016) - [c24]Tsuyoshi Komatsubara, Yoshifumi Manabe:
Game-Theoretic Security of Commitment Protocols under a Realistic Cost Model. AINA 2016: 776-783 - 2015
- [j16]Yoshifumi Manabe, Risako Otsuka, Tatsuaki Okamoto:
A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social Surplus. J. Inf. Process. 23(3): 299-304 (2015) - [c23]Yuji Mochizuki, Yoshifumi Manabe:
A privacy-preserving collaborative filtering protocol considering updates. APSITT 2015: 1-3 - [c22]Kohei Shimizu, Yoshifumi Manabe:
An allocation algorithm of indivisible goods. APSITT 2015: 1-3 - [c21]Yuta Urushiyama, Yoshifumi Manabe:
A Double-Private epsilon-Fuzzy Matching Protocol. ICITCS 2015: 1-4 - 2014
- [c20]Ryo Iguchi, Yoshifumi Manabe:
An Efficient Edge-Based Authentication for Network Coding against Entropy Attacks. ICDCS Workshops 2014: 133-139 - [c19]Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto:
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol. TCC 2014: 343-367 - 2013
- [j15]Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto:
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 68-75 (2013) - [c18]Yasuyuki Tsukada, Hideki Sakurada, Ken Mano, Yoshifumi Manabe:
An Epistemic Approach to Compositional Reasoning about Anonymity and Privacy. TARK 2013 - [i3]Yasuyuki Tsukada, Hideki Sakurada, Ken Mano, Yoshifumi Manabe:
An Epistemic Approach to Compositional Reasoning about Anonymity and Privacy. CoRR abs/1310.6441 (2013) - [i2]Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto:
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol. IACR Cryptol. ePrint Arch. 2013: 811 (2013) - 2012
- [j14]Yoshifumi Manabe, Tatsuaki Okamoto:
Meta-envy-free Cake-cutting and Pie-cutting Protocols. Inf. Media Technol. 7(3): 992-999 (2012) - [j13]Yoshifumi Manabe, Tatsuaki Okamoto:
Meta-envy-free Cake-cutting and Pie-cutting Protocols. J. Inf. Process. 20(3): 686-693 (2012) - [c17]Susumu Kiyoshima, Yoshifumi Manabe, Tatsuaki Okamoto:
Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security. IWSEC 2012: 216-232 - [c16]Yoshifumi Manabe, Tatsuaki Okamoto:
A Cryptographic Moving-Knife Cake-Cutting Protocol. IWIGP 2012: 15-23 - 2011
- [c15]Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto:
A Secure M + 1st Price Auction Protocol Based on Bit Slice Circuits. IWSEC 2011: 51-64 - 2010
- [c14]Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto:
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption. IWSEC 2010: 149-163 - [c13]Yoshifumi Manabe, Tatsuaki Okamoto:
Meta-Envy-Free Cake-Cutting Protocols. MFCS 2010: 501-512
2000 – 2009
- 2008
- [j12]Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto:
Universally Composable Identity-Based Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 262-271 (2008) - [j11]Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
On the Equivalence of Several Security Notions of KEM and DEM. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 283-297 (2008) - [j10]Yusuke Okada, Yoshifumi Manabe, Tatsuaki Okamoto:
An optimistic fair exchange protocol and its security in the universal composability framework. Int. J. Appl. Cryptogr. 1(1): 70-77 (2008) - [c12]Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto:
An Efficient Anonymous Credential System. Financial Cryptography 2008: 272-286 - [c11]Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
Relationship of Three Cryptographic Channels in the UC Framework. ProvSec 2008: 268-282 - [c10]Yoshifumi Manabe, Tatsuaki Okamoto:
Anonymous return route information for onion based mix-nets. SecureComm 2008 - 2006
- [j9]Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
A Universally Composable Secure Channel Based on the KEM-DEM Framework. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 28-38 (2006) - [c9]Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto:
Universally Composable Identity-Based Encryption. VIETCRYPT 2006: 337-353 - [i1]Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
On the Equivalence of Several Security Notions of Key Encapsulation Mechanism. IACR Cryptol. ePrint Arch. 2006: 268 (2006) - 2005
- [c8]Joong Man Kim, Yoshifumi Manabe:
A Byzantine Fault-Tolerant Mutual Exclusion Algorithm and Its Application to Byzantine Fault-Tolerant Storage Systems. ICDCS Workshops 2005: 12-19 - [c7]Waka Nagao, Yoshifumi Manabe, Tatsuaki Okamoto:
A Universally Composable Secure Channel Based on the KEM-DEM Framework. TCC 2005: 426-444 - 2004
- [j8]Yoshifumi Manabe, Naka Tajima:
(h, k)-Arbiters for h-out-of-k mutual exclusion problem. Theor. Comput. Sci. 310(1-3): 379-392 (2004) - [c6]Yoshifumi Manabe, JaeHyrk Park:
A Quorum-Based Extended Group Mutual Exclusion Algorithm without Unnecessary Blocking. ICPADS 2004: 341-348 - 2001
- [c5]Yoshifumi Manabe:
A Distributed Consistent Global Checkpoint Algorithm for Distributed Mobile Systems. ICPADS 2001: 125-134
1990 – 1999
- 1999
- [c4]Yoshifumi Manabe, Naka Tajima:
(h-k)-Arbiter for h-out of-k Mutual Exclusion Problem. ICDCS 1999: 216-223 - 1998
- [j7]Yoshifumi Manabe, Shigemi Aoyagi:
A Feasibility Decision Algorithm for Rate Monotonic and Deadline Monotonic Scheduling. Real Time Syst. 14(2): 171-181 (1998) - [j6]Yoshifumi Manabe, Roberto Baldoni, Michel Raynal, Shigemi Aoyagi:
k-Arbiter: A Safe and General Scheme for h-out of-k Mutual Exclusion. Theor. Comput. Sci. 193(1-2): 97-112 (1998) - 1996
- [j5]Terunao Soneoka, Makoto Imase, Yoshifumi Manabe:
Design of a D-connected Digraph with a Minimum Number of Edges and a Quasiminimal Diameter: II. Discret. Appl. Math. 64(3): 267-279 (1996) - 1995
- [c3]Yoshifumi Manabe, Shigemi Aoyagi:
A truant failure detection algorithm for multi-policy distributed systems. ISADS 1995: 297-303 - [c2]Yoshifumi Manabe, Shigemi Aoyagi:
A feasibility decision algorithm for rate monotonic scheduling of periodic real-time tasks. IEEE Real Time Technology and Applications Symposium 1995: 212-218 - 1992
- [j4]Yoshifumi Manabe, Makoto Imase:
Gloabl Condtions in Debugging Distributed Programs. J. Parallel Distributed Comput. 15(1): 62-69 (1992) - [c1]Yoshifumi Manabe, Shigemi Aoyagi:
Debugging Dynamic Distributed Programs Using Global Predicates. SPDP 1992: 402-407 - 1991
- [j3]Kenji Moriyasu, Terunao Soneoka, Yoshifumi Manabe:
Global states monitoring algorithm for distributed system. Syst. Comput. Jpn. 22(14): 45-56 (1991)
1980 – 1989
- 1988
- [j2]Makoto Imase, Yoshifumi Manabe:
Fault-Tolerant Routings in a kappa-Connected Network. Inf. Process. Lett. 28(4): 171-175 (1988) - 1986
- [j1]Yoshifumi Manabe, Kenichi Hagihara, Nobuki Tokura:
Minimum separation layout for cmos circuits realizing tree-shape monotone decreasing logic circuits. Syst. Comput. Jpn. 17(9): 1-10 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint