Takaaki Mizuki


Papers

  1. L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Physical ZKP protocols for Nurimisaki and Kurodoko
    Theoretical Computer Science, Elsevier, vol.972, 114071, 2023.
    [DOI]
    [PDF] (This is an accepted manuscript.)

  2. Ken Takashima, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Actively Revealing Card Attack on Card-based Protocols
    Natural Computing, Springer, vol.21, no.4, pp.615-628, 2022.
    [DOI] (Open access)

  3. Yuichi Komano and Takaaki Mizuki
    Coin-based Secure Computations
    International Journal of Information Security, Springer, vol.21, no.4, pp.833-846, 2022.
    [DOI] (Open access)

  4. Takaaki Mizuki and Yuichi Komano
    Information Leakage Due to Operative Errors in Card-based Protocols
    Information and Computation, Elsevier, vol.285, 104910, 2022.
    [DOI] (Open access)

  5. L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, Luc Libralesso, and Takaaki Mizuki
    Physical Zero-knowledge Proof and NP-completeness Proof of Suguru Puzzle
    Information and Computation, Elsevier, vol.285, 104858, 2022.
    [DOI] (Open access)

  6. L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake
    New Generation Computing, Springer, vol.40, no.1, pp.149-171, 2022.
    [DOI] (Open access)

  7. Yuta Abe, Takaaki Mizuki, and Hideaki Sone
    Committed-format AND Protocol Using Only Random Cuts
    Natural Computing, Springer, vol.20, no.4, pp.639-645, 2021.
    [DOI]
    [PDF] (This is an Author's Accepted Manuscript (AAM).)

  8. Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, L{\'e}o Robert, Tatsuya Sasaki, and Hideaki Sone
    How to Construct Physical Zero-Knowledge Proofs for Puzzles with a "Single Loop" Condition
    Theoretical Computer Science, Elsevier, vol.888, pp.41-55, 2021.
    [DOI] (Open access)

  9. Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Evaluating Card-based Protocols in Terms of Execution Time
    International Journal of Information Security, Springer, vol.20, no.5, pp.729-740, 2021.
    [DOI] (Open access)

  10. Yuta Abe, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Five-Card AND Computations in Committed Format Using Only Uniform Cyclic Shuffles
    New Generation Computing, Springer, vol.39, no.1, pp.97-114, 2021.
    [DOI] (Open access)

  11. Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, and Hideaki Sone
    Card-based Protocols for Secure Ranking Computations
    Theoretical Computer Science, Elsevier, vol.845, pp.122-135, 2020.
    [DOI] (Open access)

  12. Tatsuya Sasaki, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Efficient Card-based Zero-knowledge Proof for Sudoku
    Theoretical Computer Science, Elsevier, vol.839, pp.135-142, 2020.
    [DOI] (Open access)

  13. Itaru Ueda, Daiki Miyahara, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Secure Implementations of a Random Bisection Cut
    International Journal of Information Security, Springer, vol.19, no.4, pp.445-452, 2020.
    [DOI]
    [PDF] (This is an Author's Accepted Manuscript (AAM).)

  14. Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Practical Card-Based Implementations of Yao's Millionaire Protocol
    Theoretical Computer Science, Elsevier, vol.803, pp.207-221, 2020.
    [DOI]
    [PDF] (This is an accepted manuscript.)

  15. Daiki Miyahara, Tatsuya Sasaki, Takaaki Mizuki, and Hideaki Sone
    Card-based Physical Zero-knowledge Proof for Kakuro
    IEICE Trans. Fundamentals, vol.102-A, no.9, pp.1072-1078, 2019.
    [DOI] [TOUR]
    [PDF] Copyright © 2019, IEICE.

  16. Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Pile-Shifting Scramble for Card-Based Protocols
    IEICE Trans. Fundamentals, vol.E101-A, no.9, pp.1494-1502, 2018.
    [DOI] [TOUR]

  17. Ko Nakamura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Information Leakage Threats for Cryptographic Devices Using IEMI and EM Emission
    IEEE Transactions on Electromagnetic Compatibility,vol.60, no.5, pp.1340-1347, 2018.
    [DOI]

  18. Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Card-Based Protocols Using Unequal Division Shuffles
    Soft Computing, Springer, vol.22, no.2, pp.361-371, 2018.
    [DOI] [ePrint]

  19. Kazumasa Shinagawa, Takaaki Mizuki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
    Card-Based Protocols Using Regular Polygon Cards
    IEICE Trans. Fundamentals, vol.E100-A, no.9, pp.1900-1909, 2017.
    [DOI]

  20. [Invited Paper] Takaaki Mizuki and Hiroki Shizuya
    Computational Model of Card-Based Cryptographic Protocols and Its Applications
    IEICE Trans. Fundamentals, vol.E100-A, no.1, pp.3-11, 2017.
    [DOI]
    [PDF] Copyright © 2017, IEICE.

  21. Kazumasa Shinagawa, Takaaki Mizuki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
    Secure Computation Protocols Using Polarizing Cards
    IEICE Trans. Fundamentals, vol.E99-A, no.6, pp.1122-1131, 2016.
    [DOI]

  22. Takaaki Mizuki
    Card-Based Protocols for Securely Computing the Conjunction of Multiple Variables
    Theoretical Computer Science, Elsevier, vol.622, pp.34-44, 2016.
    [DOI]
    [PDF] (This is an accepted manuscript.)

  23. Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Securely Computing Three-input Functions with Eight Cards
    IEICE Trans. Fundamentals, vol.E98-A, no.6, pp.1145-1152, 2015.
    [DOI]

  24. Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Investigation of Noise Interference due to Connector Contact Failure in a Coaxial Cable
    IEICE Trans. Electronics, vol.E97-C, no.9, pp.900-903, 2014.
    [DOI]

  25. Takaaki Mizuki, Daizo Mikami, and Hideaki Sone
    Minimizing ESCT Forms for Two-Variable Multiple-Valued Input Binary Output Functions
    Discrete Applied Mathematics, Elsevier, vol.169, pp.186-194, 2014.
    [DOI]
    [PDF] (This is an Accepted Author Manuscript.)

  26. Takaaki Mizuki and Hiroki Shizuya
    A Formalization of Card-Based Cryptographic Protocols via Abstract Machine
    International Journal of Information Security, Springer-Verlag, vol.13, no.1, pp.15-23, 2014.
    [DOI]
    [PDF] (The final publication is available at link.springer.com.)

  27. Masahiro Kinugawa, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard
    IEICE Trans. Communications, vol.E96-B, no.10, pp.2633-2638, 2013.
    [DOI]

  28. Kazuya Uehara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Evaluation of Resistance and Inductance of Loose Connector Contact
    IEICE Trans. Electronics, vol.E96-C, no.9, pp.1148-1150, 2013.
    [DOI]

  29. Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Haruki Shimada, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger
    Efficient Evaluation of EM Radiation Associated with Information Leakage from Cryptographic Devices
    IEEE Transactions on Electromagnetic Compatibility, vol.55, no.3, pp.555-563, 2013.
    [DOI]

  30. Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger
    Analysis of Electromagnetic Information Leakage from Cryptographic Devices with Different Physical Structures
    IEEE Transactions on Electromagnetic Compatibility, vol.55, no.3, pp.571-580, 2013.
    [DOI]

  31. Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone
    Transient IEMI Threats for Cryptographic Devices
    IEEE Transactions on Electromagnetic Compatibility, vol.55, no.1, pp.140-148, 2013.
    [DOI]

  32. Yoshihiro Indo, Takaaki Mizuki, and Takao Nishizeki
    Absolutely Secure Message Transmission Using a Key Sharing Graph
    Discrete Mathematics, Algorithms and Applications, World Scientific, vol.4, no.4, 1250053 (15 pages), 2012.
    [DOI]

  33. Kazuki Matsuda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Mechanism of Increase in Inductance at Loosened Connector Contact Boundary
    IEICE Trans. Electronics, vol.E95-C, no.9, pp.1502-1507, 2012.
    [DOI]

  34. Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takeshi Sugawara, Yoshiki Kayano, Takafumi Aoki, Shigeki Minegishi, Akashi Satoh, Hideaki Sone, and Hiroshi Inoue
    Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current
    IEICE Trans. Electronics, vol.95-C, no.6, pp.1089-1097, 2012.
    [DOI]

  35. Yu-ichi Hayashi, Yoshiki Kayano, Takaaki Mizuki, Hideaki Sone, and Hiroshi Inoue
    Contact Conditions in Connectors that Cause Common Mode Radiation
    IEICE Trans. Electronics, vol.E94-C, no.9, pp.1369-1374, 2011.
    [DOI]

  36. Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Analysis of Electromagnetic Radiation from Transmission Line with Loose Contact of Connector
    IEICE Trans. Electronics, vol.E94-C, no.9, pp.1427-1430, 2011.
    [DOI]

  37. Takaaki Mizuki, Satoru Nakayama, and Hideaki Sone
    An Application of st-Numbering to Secret Key Agreement
    International Journal of Foundations of Computer Science, World Scientific, vol.22, no.5, pp.1211-1227, 2011.
    [DOI] [MR2826231]

  38. Takaaki Mizuki, Hitoshi Tsubata, and Takao Nishizeki
    Minimizing AND-EXOR Expressions for Two-Variable Multiple-Valued Input Binary Output Functions
    Journal of Multiple-Valued Logic and Soft Computing, Old City Publishing, vol.16, pp.197-208, 2010.

  39. Takaaki Mizuki, Takuya Sato, and Hideaki Sone
    A One-Round Secure Message Broadcasting Protocol through a Key Sharing Tree
    Information Processing Letters, Elsevier, vol.109, no.15, pp.842-845, 2009.
    [DOI]

  40. Koichi Koizumi, Takaaki Mizuki, and Takao Nishizeki
    A Revised Transformation Protocol for Unconditionally Secure Secret Key Exchange
    Theory of Computing Systems, Springer, vol.42, no.2, pp.187-221, 2008.
    [DOI]

  41. Takaaki Mizuki, Taro Otagiri, and Hideaki Sone
    An Application of ESOP Expressions to Secure Computations
    Journal of Circuits, Systems, and Computers, World Scientific, vol.16, no.2, pp.191-198, 2007.
    [DOI]

  42. Takaaki Mizuki, Fumishige Uchiike, and Hideaki Sone
    Securely Computing XOR with 10 Cards
    Australasian Journal of Combinatorics, vol.36, pp.279-293, 2006.
    [MR2262626]
    [PDF] (Acknowledgement: the file has been supplied by the Australasian Journal of Combinatorics.)

  43. Kozo Banno, Shingo Orihara, Takaaki Mizuki, and Takao Nishizeki
    Best Security Index for Digital Fingerprinting
    IEICE Trans. Fundamentals, vol.E89-A, no.1, pp.169-177, 2006.

  44. Shingo Orihara, Takaaki Mizuki, and Takao Nishizeki
    New Security Index for Digital Fingerprinting and Its Bounds
    IEICE Trans. Fundamentals, vol.E86-A, no.5, pp.1156-1163, 2003.

  45. Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki
    Characterization of Optimal Key Set Protocols
    Discrete Applied Mathematics, Elsevier, vol.131, no.1, pp.213-236, 2003.
    [DOI] [MR2018210]

  46. Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki
    A Complete Characterization of a Family of Key Exchange Protocols
    International Journal of Information Security, Springer-Verlag, vol.1, no.2, pp.131-142, 2002.
    [DOI]

  47. Takaaki Mizuki and Takao Nishizeki
    Necessary and Sufficient Numbers of Cards for Sharing Secret Keys on Hierarchical Groups
    IEICE Trans. Inf. & Syst., vol.E85-D, no.2, pp.333-345, 2002.

  48. Takaaki Mizuki, Zhi-Bo Sui, Hiroki Shizuya, and Takao Nishizeki
    On the Average Length of Secret Key Exchange Eulerian Circuits
    IEICE Trans. Fundamentals, vol.E83-A, no.4, pp.662-670, 2000.

International Conferences

  1. Takuto Yoshida, Kodai Tanaka, Keisuke Nakabayashi, Eikoh Chida, and Takaaki Mizuki
    Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input AND Protocols
    Cryptology and Network Security (CANS 2023), Lecture Notes in Computer Science, Springer, vol.14342, pp.211-231, 2023.
    [DOI]

  2. Kodai Tanaka and Takaaki Mizuki
    Two UNO Decks Efficiently Perform Zero-Knowledge Proof for Sudoku
    Fundamentals of Computation Theory (FCT 2023), Lecture Notes in Computer Science, Springer, vol.14292, pp.406-420, 2023.
    [DOI]
    [PDF] (This is an Accepted Manuscript.)

  3. Hayato Shikata, Daiki Miyahara, and Takaaki Mizuki
    Few-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges
    Proceedings of the 10th ACM International Workshop on ASIA Public-Key Cryptography (APKC '23), pp.33-41, 2023.
    [DOI]
    [PDF]

  4. Kazunari Tozawa, Hiraku Morita, and Takaaki Mizuki
    Single-Shuffle Card-based Protocol with Eight Cards per Gate
    Unconventional Computation and Natural Computation (UCNC 2023), Lecture Notes in Computer Science, Springer, vol.14003, pp.171-185, 2023.
    [DOI]
    [PDF] (This is an Accepted Manuscript.)

  5. Yuichi Komano and Takaaki Mizuki
    Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting
    Innovative Security Solutions for Information Technology and Communications (SecITC 2022), Lecture Notes in Computer Science, Springer, vol.13809, pp.222-239, 2023.
    [DOI]
    [PDF] (This is an Accepted Manuscript.)

  6. L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Hide a liar: Card-Based ZKP Protocol for Usowan
    Theory and Applications of Models of Computation (TAMC 2022), Lecture Notes in Computer Science, Springer, vol.13571, pp.201-217, 2023.
    [DOI]
    [PDF] (This is an Accepted Manuscript.)

  7. Daiki Miyahara and Takaaki Mizuki
    Secure Computations through Checking Suits of Playing Cards
    Frontiers of Algorithmic Wisdom (FAW 2022), Lecture Notes in Computer Science, Springer, vol.13461, pp.110-128, 2023.
    [DOI]

  8. Yuichi Komano and Takaaki Mizuki
    Physical Zero-Knowledge Proof Protocol for Topswops
    Information Security Practice and Experience (ISPEC 2022), Lecture Notes in Computer Science, Springer, vol.13620, pp.537-553, 2022.
    [DOI]
    [PDF] (This is an Accepted Manuscript.)

  9. L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Card-Based ZKP Protocol for Nurimisaki
    Stabilization, Safety, and Security of Distributed Systems (SSS 2022), Lecture Notes in Computer Science, Springer, vol.13751, pp.285-298, 2022.
    [DOI]
    [PDF] (This is an Accepted Manuscript.)

  10. Rikuo Haga, Yuichi Hayashi, Daiki Miyahara, and Takaaki Mizuki
    Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards
    Progress in Cryptology -- AFRICACRYPT 2022, Lecture Notes in Computer Science, Springer, vol.13503, pp.448-468, 2022.
    [DOI]

  11. Hayato Shikata, Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
    Card-Minimal Protocols for Symmetric Boolean Functions of More than Seven Inputs
    Theoretical Aspects of Computing (ICTAC 2022), Lecture Notes in Computer Science, Springer, vol.13572, pp.388-406, 2022.
    [DOI]

  12. Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yuichi Hayashi, and Takaaki Mizuki
    Card-Based Secure Sorting Protocol
    Advances in Information and Computer Security (IWSEC 2022), Lecture Notes in Computer Science, Springer, vol.13504, pp.224-240, 2022.
    [DOI]

  13. Tomoki Kuzuma, Raimu Isuzugawa, Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
    Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR Computations
    Proceedings of the 9th ACM International Workshop on ASIA Public-Key Cryptography (APKC '22), pp.51-58, 2022.
    [DOI]
    [PDF]

  14. Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
    Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation
    Progress in Cryptology -- INDOCRYPT 2021, Lecture Notes in Computer Science, Springer, vol.13143, pp.536-555, 2021.
    [DOI]
    [PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-92518-5_24.)

  15. Daiki Miyahara, Hiromichi Haneda, and Takaaki Mizuki
    Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational Model
    Provable and Practical Security (ProvSec 2021), Lecture Notes in Computer Science, Springer, vol.13059, pp.136-152, 2021.
    [DOI]
    [PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-90402-9_8.)

  16. Raimu Isuzugawa, Kodai Toyoda, Yu Sasaki, Daiki Miyahara, and Takaaki Mizuki
    A Card-Minimal Three-Input AND Protocol Using Two Shuffles
    Computing and Combinatorics (COCOON 2021), Lecture Notes in Computer Science, Springer, vol.13025, pp.668-679, 2021.
    [DOI]
    [PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-89543-3_55.)

  17. Raimu Isuzugawa, Daiki Miyahara, and Takaaki Mizuki
    Zero-Knowledge Proof Protocol for Cryptarithmetic Using Dihedral Cards
    Unconventional Computation and Natural Computation (UCNC 2021), Lecture Notes in Computer Science, Springer, vol.12984, pp.51-67, 2021.
    [DOI]
    [PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-87993-8_4.)

  18. Daiki Miyahara, Yuichi Komano, Takaaki Mizuki, and Hideaki Sone
    Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags
    IEEE Computer Security Foundations Symposium (CSF 2021), pp.1-16, 2021.
    [DOI]
    [PDF]

  19. L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori
    Beyond the Horizon of Computability (CiE 2021), Lecture Notes in Computer Science, Springer, vol.12813, pp.373-384, 2021.
    [DOI]
    [PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-80049-9_37.)

  20. Hiroto Koyama, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    A Secure Three-Input AND Protocol with a Standard Deck of Minimal Cards
    Computer Science -- Theory and Applications (CSR 2021), Lecture Notes in Computer Science, Springer, vol.12730, pp.242-256, 2021.
    [DOI]
    [PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-79416-3_14.)

  21. Hiroto Koyama, Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
    New Card-based Copy Protocols Using Only Random Cuts
    Proceedings of the 8th ACM International Workshop on ASIA Public-Key Cryptography (APKC '21), pp.13-22, 2021.
    [DOI]
    [PDF]

  22. Soma Murata, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Efficient Generation of a Card-Based Uniformly Distributed Random Derangement
    Algorithms and Computation (WALCOM 2021), Lecture Notes in Computer Science, Springer, vol.12635, pp.78-89, 2021.
    [DOI]
    [PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-68211-8_7.)

  23. Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, and Hideaki Sone
    Card-Based Covert Lottery
    Innovative Security Solutions for Information Technology and Communications (SecITC 2020), Lecture Notes in Computer Science, Springer, vol.12596, pp.257-270, 2021.
    [DOI]
    [PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-69255-1_17.)

  24. Takahiro Saito, Daiki Miyahara, Yuta Abe, Takaaki Mizuki, and Hiroki Shizuya
    How to Implement a Non-uniform or Non-closed Shuffle
    Theory and Practice of Natural Computing (TPNC 2020), Lecture Notes in Computer Science, Springer, vol.12494, pp.107-118, 2020.
    [DOI]
    [PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-63000-3_9.)

  25. Soma Murata, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Public-PEZ Cryptography
    Information Security (ISC 2020), Lecture Notes in Computer Science, Springer, vol.12472, pp.59-74, 2020.
    [DOI]
    [PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-62974-8_4.)

  26. L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Physical Zero-Knowledge Proof for Suguru Puzzle
    Stabilization, Safety, and Security of Distributed Systems (SSS 2020), Lecture Notes in Computer Science, Springer, vol.12514, pp.235-247, 2020.
    [DOI]
    [PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-64348-5_19.)

  27. Kodai Toyoda, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Six-Card Finite-Runtime XOR Protocol with Only Random Cut
    Proceedings of the 7th ACM International Workshop on ASIA Public-Key Cryptography (APKC '20), pp.2-8, 2020.
    [DOI]
    [PDF]

  28. Daiki Miyahara, L{\'e}o Robert, Pascal Lafourcade, So Takeshige, Takaaki Mizuki, Kazumasa Shinagawa, Atsuki Nagao, and Hideaki Sone
    Card-Based ZKP Protocols for Takuzu and Juosan
    Fun with Algorithms (FUN 2021), Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, vol.157, pp.20:1-20:21, 2020.
    [DOI]

  29. Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, and Hideaki Sone
    Card-Based Secure Ranking Computations
    Combinatorial Optimization and Applications (COCOA 2019), Lecture Notes in Computer Science, Springer, vol.11949, pp.461-472, 2019.
    [DOI]
    [PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-36412-0_37.)

  30. Ken Takashima, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Card-Based Protocol Against Actively Revealing Card Attack
    Theory and Practice of Natural Computing (TPNC 2019), Lecture Notes in Computer Science, Springer, vol.11934, pp.95-106, 2019.
    [DOI]
    [PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-34500-6_6.)

  31. Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, and Hideaki Sone
    A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation
    Information Security Practice and Experience (ISPEC 2019), Lecture Notes in Computer Science, Springer, vol.11879, pp.135-151, 2019.
    [DOI]
    [PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-34339-2_8.)

  32. Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, and Hideaki Sone
    Interactive Physical Zero-Knowledge Proof for Norinori
    Computing and Combinatorics (COCOON 2019), Lecture Notes in Computer Science, Springer, vol.11653, pp.166-177, 2019.
    [DOI] [HAL]
    [PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-26176-4_14.)

  33. Pascal Lafourcade, Takaaki Mizuki, Atsuki Nagao, and Kazumasa Shinagawa
    Light Cryptography
    Information Security Education (WISE 2019), IFIP Advances in Information and Communication Technology, Springer, vol.557, pp.89-101, 2019.
    [DOI] [HAL]

  34. Kazumasa Shinagawa and Takaaki Mizuki
    Secure Computation of Any Boolean Function Based on Any Deck of Cards
    Frontiers in Algorithmics (FAW 2019), Lecture Notes in Computer Science, Springer, vol.11458, pp.63-75, 2019.
    [DOI]
    [PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-18126-0_6.)

  35. Kazumasa Shinagawa and Takaaki Mizuki
    The Six-Card Trick: Secure Computation of Three-Input Equality
    Information Security and Cryptology (ICISC 2018), Lecture Notes in Computer Science, Springer, vol.11396, pp.123-131, 2019.
    [DOI]

  36. Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol
    Combinatorial Optimization and Applications (COCOA 2018), Lecture Notes in Computer Science, Springer, vol.11346, pp.246-261, 2018.
    [DOI]

  37. Yuichi Komano and Takaaki Mizuki
    Multi-party Computation Based on Physical Coins
    Theory and Practice of Natural Computing (TPNC 2018), Lecture Notes in Computer Science, Springer, vol.11324, pp.87-98, 2018.
    [DOI]

  38. Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki, Kazumasa Shinagawa, and Hideaki Sone
    Physical Zero-Knowledge Proof for Makaro
    Stabilization, Safety, and Security of Distributed Systems (SSS 2018), Lecture Notes in Computer Science, Springer, vol.11201, pp.111-125, 2018.
    [DOI] [HAL]

  39. Takaaki Mizuki and Yuichi Komano
    Analysis of Information Leakage Due to Operative Errors in Card-Based Protocols
    Combinatorial Algorithms (IWOCA 2018), Lecture Notes in Computer Science, Springer, vol.10979, pp.250-262, 2018.
    [DOI]

  40. Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Analyzing Execution Time of Card-Based Protocols
    Unconventional Computation and Natural Computation (UCNC 2018), Lecture Notes in Computer Science, Springer, vol.10867, pp.145-158, 2018.
    [DOI]
    [PDF] (The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-92435-9_11.)

  41. Tatsuya Sasaki, Takaaki Mizuki, and Hideaki Sone
    Card-Based Zero-Knowledge Proof for Sudoku
    Fun with Algorithms (FUN 2018), Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, vol.100, pp.29:1-29:10, 2018.
    [DOI]

  42. Kazumasa Shinagawa and Takaaki Mizuki
    Card-based Protocols Using Triangle Cards
    Fun with Algorithms (FUN 2018), Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, vol.100, pp.31:1-31:13, 2018.
    [DOI]

  43. Yuta Abe, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Five-Card AND Protocol in Committed Format Using Only Practical Shuffles
    Proceedings of the 5th ACM International Workshop on ASIA Public-Key Cryptography (APKC '18), pp.3-8, 2018.
    [DOI]
    [PDF]

  44. Tatsuya Sasaki, Bateh Mathias Agbor, Shingo Masuda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Secret Key Amplification from Uniformly Leaked Key Exchange Complete Graph
    Algorithms and Computation (WALCOM 2018), Lecture Notes in Computer Science, Springer, vol.10755, pp.20-31, 2018.
    [DOI]

  45. Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    The Minimum Number of Cards in Practical Card-Based Protocols
    Advances in Cryptology -- ASIACRYPT 2017, Part III, Lecture Notes in Computer Science, Springer, vol.10626, pp.126-155, 2017.
    [DOI] [ePrint]

  46. Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions
    Paradigms in Cryptology (Mycrypt 2016), Lecture Notes in Computer Science, Springer-Verlag, vol.10311, pp.193-211, 2017.
    [DOI]

  47. Itaru Ueda, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    How to Implement a Random Bisection Cut
    Theory and Practice of Natural Computing (TPNC 2016), Lecture Notes in Computer Science, Springer-Verlag, vol.10071, pp.58-69, 2016.
    [DOI]
    [PDF] (The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-49001-4_5.)

  48. Takaaki Mizuki
    Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards
    Cryptology and Network Security (CANS 2016), Lecture Notes in Computer Science, Springer-Verlag, vol.10052, pp.484-499, 2016.
    [DOI] [slide]
    [PDF] (The final publication is available at link.springer.com.)

  49. Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    An Implementation of Non-Uniform Shuffle for Secure Multi-Party Computation
    Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography (APKC '16), pp.49-55, 2016.
    [DOI]
    [PDF]

  50. Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Five-Card Secure Computations Using Unequal Division Shuffle
    Theory and Practice of Natural Computing (TPNC 2015), Lecture Notes in Computer Science, Springer-Verlag, vol.9477, pp.109-120, 2015.
    [DOI]
    [PDF] (The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-26841-5_9.)

  51. Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
    Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards
    International Conference on Provable Security (ProvSec 2015), Lecture Notes in Computer Science, Springer-Verlag, vol.9451, pp.127-146, 2015.
    [DOI]

  52. Rie Ishikawa, Eikoh Chida, and Takaaki Mizuki
    Efficient Card-based Protocols for Generating a Hidden Random Permutation without Fixed Points
    Unconventional Computation and Natural Computation (UCNC 2015), Lecture Notes in Computer Science, Springer-Verlag, vol.9252, pp.215-226, 2015.
    [DOI]
    [PDF] (The final publication is available at link.springer.com.)

  53. Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
    Secure Multi-Party Computation Using Polarizing Cards
    Advances in Information and Computer Security (IWSEC 2015), Lecture Notes in Computer Science, Springer-Verlag, vol.9241, pp.281-297, 2015.
    [DOI]

  54. Ko Nakamura, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone
    Method for Estimating Fault Injection Time on Cryptographic Devices from EM Leakage
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2015), pp.235-240, 2015.
    [DOI]

  55. Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Card-Based Protocols for Any Boolean Function
    Theory and Applications of Models of Computation (TAMC 2015), Lecture Notes in Computer Science, Springer-Verlag, vol.9076, pp.110-121, 2015.
    [DOI] [slide]
    [PDF] (The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-17142-5_11.)

  56. Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone
    Precisely Timed IEMI Fault Injection Synchronized with EM Information Leakage
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2014), pp.738-742, 2014.
    [DOI]

  57. Takaaki Mizuki and Hiroki Shizuya
    Practical Card-Based Cryptography
    Fun with Algorithms (FUN 2014), Lecture Notes in Computer Science, Springer-Verlag, vol.8496, pp.313-324, 2014.
    [DOI] [slide]
    [PDF] (The final publication is available at link.springer.com.)

  58. Takuya Nishida, Takaaki Mizuki, and Hideaki Sone
    Securely Computing the Three-Input Majority Function with Eight Cards
    Theory and Practice of Natural Computing (TPNC 2013), Lecture Notes in Computer Science, Springer-Verlag, vol.8273, pp.193-204, 2013.
    [DOI] [slide]
    [PDF] (The original publication is available at www.springerlink.com.)

  59. Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone
    Map-Based Analysis of IEMI Fault Injection into Cryptographic Devices
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2013), pp.829-833, 2013.
    [DOI]

  60. Takaaki Mizuki, Isaac Kobina Asiedu, and Hideaki Sone
    Voting with a Logarithmic Number of Cards
    Unconventional Computation and Natural Computation (UCNC 2013), Lecture Notes in Computer Science, Springer-Verlag, vol.7956, pp.162-173, 2013.
    [DOI] [slide]

  61. Takaaki Mizuki, Michihito Kumamoto, and Hideaki Sone
    The Five-Card Trick Can Be Done with Four Cards
    Advances in Cryptology -- ASIACRYPT 2012, Lecture Notes in Computer Science, Springer-Verlag, vol.7658, pp.598-606, 2012.
    [DOI] [slide]
    [PDF] Copyright © 2012, IACR.

  62. Haruki Shimada, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger
    Efficient Mapping of EM Radiation Associated with Information Leakage for Cryptographic Devices
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2012), pp.794-799, 2012.
    [DOI]

  63. Yu-ichi Hayashi, Naofumi Homma, Taishi Ikematsu, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, and Jean-Luc Danger
    An Efficient Method for Estimating the Area of Information Propagation through Electromagnetic Radiation
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2012), pp.800-805, 2012.
    [DOI]

  64. Yu-ichi Hayashi, Naofumi Homma, Takeshi Sugawara, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone
    Non-Invasive EMI-Based Fault Injection Attack against Cryptographic Modules
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2011), pp.763-767, 2011.
    [DOI]

  65. Taishi Ikematsu, Yu-ichi Hayashi, Takaaki Mizuki, Naofumi Homma, Takafumi Aoki, and Hideaki Sone
    Suppression of Information Leakage from Electronic Devices Based on SNR
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2011), pp.920-924, 2011.
    [DOI]

  66. Yu-ichi Hayashi, Takeshi Sugawara, Yoshiki Kayano, Naofumi Homma, Takaaki Mizuki, Akashi Satoh, Takafumi Aoki, Shigeki Minegishi, Hideaki Sone, and Hiroshi Inoue
    Information Leakage from Cryptographic Hardware via Common-Mode Current
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2010), pp.109-114, 2010.
    [DOI]

  67. Yu-ichi Hayashi, Songping Wu, Jun Fan, Takaaki Mizuki, and Hideaki Sone
    Modeling Connector Contact Condition Using a Contact Failure Model with Equivalent Inductance
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2010), pp.743-747, 2010.
    [DOI]

  68. Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, and Akashi Satoh
    Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules
    Information Security Applications (WISA 2009), Lecture Notes in Computer Science, Springer-Verlag, vol.5932, pp.66-78, 2009.
    [DOI]

  69. Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Relationship between Connector Contact Points and Common-Mode Current on a Coaxial Transmission Line
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2009), pp.209-212, 2009.
    [DOI]

  70. Takaaki Mizuki and Hideaki Sone
    Six-Card Secure AND and Four-Card Secure XOR
    Frontiers in Algorithmics (FAW 2009), Lecture Notes in Computer Science, Springer-Verlag, vol.5598, pp.358-369, 2009.
    [DOI]

  71. Takaaki Mizuki, Hitoshi Tsubata, and Takao Nishizeki
    Minimizing AND-EXOR Expressions for Multiple-Valued Two-Input Logic Functions (Extended Abstract)
    Theory and Applications of Models of Computation (TAMC 2009), Lecture Notes in Computer Science, Springer-Verlag, vol.5532, pp.301-310, 2009.
    [DOI]

  72. Yu-ichi Hayashi, Yoshiki Kayano, Takaaki Mizuki, Hideaki Sone, and Hiroshi Inoue
    On Contact Conditions in Connectors to Cause Common Mode Radiation
    IEEE International Symposium on Electromagnetic Compatibility (EMC 2008), pp.1-4, 2008.
    [DOI]

  73. Takaaki Mizuki, Yoshinori Kugimoto, and Hideaki Sone
    Secure Multiparty Computations Using the 15 Puzzle (Extended Abstract)
    Combinatorial Optimization and Applications (COCOA 2007), Lecture Notes in Computer Science, Springer-Verlag, vol.4616, pp.255-266, 2007.
    [DOI]

  74. Takaaki Mizuki, Yoshinori Kugimoto, and Hideaki Sone
    Secure Multiparty Computations Using a Dial Lock (Extended Abstract)
    Theory and Applications of Models of Computation (TAMC 2007), Lecture Notes in Computer Science, Springer-Verlag, vol.4484, pp.499-510, 2007.
    [DOI]

  75. Takaaki Mizuki, Taro Otagiri, and Hideaki Sone
    Secure Computations in a Minimal Model Using Multiple-Valued ESOP Expressions
    Theory and Applications of Models of Computation (TAMC 2006), Lecture Notes in Computer Science, Springer-Verlag, vol.3959, pp.547-554, 2006.
    [DOI]

  76. Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, and Yousuke Toyota
    Worst-Case Optimal Fingerprinting Codes for Non-Threshold Collusion
    Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS 2005), Lecture Notes in Computer Science, Springer-Verlag, vol.3919, pp.203-216, 2006.
    [DOI]

  77. Kozo Banno, Shingo Orihara, Takaaki Mizuki, and Takao Nishizeki
    Best Security Index for Digital Fingerprinting (Extended Abstract)
    Information Hiding Workshop (IH 2005), Lecture Notes in Computer Science, Springer-Verlag, vol.3727, pp.398-412, 2005.
    [DOI]

  78. Koichi Koizumi, Takaaki Mizuki, and Takao Nishizeki
    Necessary and Sufficient Numbers of Cards for the Transformation Protocol (Extended Abstract)
    Computing and Combinatorics (COCOON 2004), Lecture Notes in Computer Science, Springer-Verlag, vol.3106, pp.92-101, 2004.
    [DOI] [MR2162024]

  79. Takaaki Mizuki and Takao Nishizeki
    Necessary and Sufficient Numbers of Cards for Sharing Secret Keys on Hierarchical Groups (Extended Abstract)
    Algorithms and Computation (ISAAC 2001), Lecture Notes in Computer Science, Springer-Verlag, vol.2223, pp.196-207, 2001.
    [DOI]

  80. Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki
    Characterization of Optimal Key Set Protocols (Extended Abstract)
    Theoretical Computer Science: Exploring New Frontiers of Theoretical Informatics (IFIP TCS 2000), pLecture Notes in Computer Science, Springer-Verlag, vol.1872, pp.273-285, 2000.
    [DOI]

  81. Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki
    Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key (Extended Abstract)
    Advances in Cryptology -- Eurocrypt '99, Lecture Notes in Computer Science, Springer-Verlag, vol.1592, pp.389-401, 1999.
    [DOI]

  82. Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki
    Eulerian Secret Key Exchange (Extended Abstract)
    Computing and Combinatorics (COCOON '98), Lecture Notes in Computer Science, Springer-Verlag, vol.1449, pp.349-360, 1998.
    [DOI]