Login / Signup
Kengo Mori
Publication Activity (10 Years)
Years Active: 2002-2023
Publications (10 Years): 5
Top Topics
Fingerprint Authentication
Privacy Preserving
Naive Bayesian Classification
Steepest Ascent
Top Venues
IEICE Trans. Inf. Syst.
SAC
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
ESORICS (1)
</>
Publications
</>
Yukimasa Sugizaki
,
Hikaru Tsuchida
,
Takuya Hayashi
,
Koji Nuida
,
Akira Nakashima
,
Toshiyuki Isshiki
,
Kengo Mori
Threshold Fully Homomorphic Encryption Over the Torus.
ESORICS (1)
(2023)
Hiroto Tamiya
,
Toshiyuki Isshiki
,
Kengo Mori
,
Satoshi Obana
,
Tetsushi Ohki
Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption.
BIOSIG
(2021)
Haruna Higo
,
Toshiyuki Isshiki
,
Kengo Mori
,
Satoshi Obana
Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2018)
Yasunori Ishihara
,
Yasuhiro Ushirozako
,
Kengo Mori
,
Jun Furukawa
A Secrecy Criterion for Outsourcing Encrypted Databases Based on Inference Analysis.
IEICE Trans. Inf. Syst.
(6) (2015)
Haruna Higo
,
Toshiyuki Isshiki
,
Kengo Mori
,
Satoshi Obana
Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks.
SAC
(2015)
Toshiyuki Isshiki
,
Toshinori Araki
,
Kengo Mori
,
Satoshi Obana
,
Tetsushi Ohki
,
Shizuo Sakamoto
New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems.
BIOSIG
(2013)
Jun Furukawa
,
Kengo Mori
,
Kazue Sako
An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization.
Towards Trustworthy Elections
(2010)
Toshiyuki Isshiki
,
Kengo Mori
,
Kazue Sako
,
Isamu Teranishi
,
Shoko Yonezawa
Using group signatures for identity management and its implementation.
Digital Identity Management
(2006)
Jun Furukawa
,
Hiroshi Miyauchi
,
Kengo Mori
,
Satoshi Obana
,
Kazue Sako
An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling.
Financial Cryptography
(2002)