​
Login / Signup
Yuji Suga
ORCID
Publication Activity (10 Years)
Years Active: 2005-2023
Publications (10 Years): 17
Top Topics
Countermeasures
Visual Cryptography
Linearly Independent
Secret Sharing Scheme
Top Venues
IMIS
NBiS
ICCE-TW
WINSYS
</>
Publications
</>
Yuji Suga
POSTER: A Card-Based Protocol that Lets You Know How Close Two Parties are in their Opinions (agree/disagree) by Using a Four-Point Likert Scale.
ACNS Workshops
(2023)
Yuji Suga
A classification for commutative three-element semigroups with local XOR structure and its implementability of card-based protocols.
ICCE-Taiwan
(2023)
Yuji Suga
How to implement non-committed card protocols to realize AND operations satisfying the three-valued logics.
CANDARW
(2022)
Yuji Suga
ICH 3-party model for claims distribution on the blockchain and their application to the e-KYC-e model.
LifeTech
(2022)
Dan Yamamoto
,
Yuji Suga
,
Kazue Sako
Formalising Linked-Data based Verifiable Credentials for Selective Disclosure.
EuroS&P Workshops
(2022)
Yuji Suga
A classification proof for commutative three-element semigroups with local AND structure and its application to card-based protocols.
ICCE-TW
(2022)
Yuji Suga
,
Masaki Shimaoka
,
Masashi Sato
,
Hirotaka Nakajima
Securing Cryptocurrency Exchange: Building up Standard from Huge Failures.
Financial Cryptography Workshops
(2020)
Yuji Suga
Editor's Message to Special Issue of Real World Cryptography, Security and Privacy.
J. Inf. Process.
28 (2020)
Yuji Suga
Simple authentication methods with pseudo IDs and derivative passwords.
ICCE-TW
(2020)
Yuji Suga
Formulation of Information Hiding Model for One-Time Authentication Methods Using the Merkle Tree.
EIDWT
(2019)
Yuji Suga
An algebraic interpretation of the XOR-based Secret Sharing Schemes.
ISITA
(2018)
Yuji Suga
Status Survey of SSL/TLS Sites in 2018 After Pointing Out About "Search form" Issues.
CANDAR Workshops
(2018)
Yuji Suga
Browser's "search form" issues and countermeasures.
APNOMS
(2017)
Yuji Suga
An Extension of \((2, m(m+1)/2)\)-Threshold Secret Sharing Schemes.
NBiS
(2017)
Yuji Suga
Sausage-Style One-Time Authentication Schemes.
BWCCA
(2017)
Shinichi Goto
,
Keiichi Iwamura
,
Yuji Suga
,
Kitahiro Kaneda
Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks.
WINSYS
(2016)
Yuji Suga
Generalized Graph-Based Visual Secret Sharing Schemes for Multiple Secrets.
IMIS
(2016)
Yuji Suga
Consideration of the XOR-operation Based Secure Multiparty Computation.
IMIS
(2015)
Yuji Suga
Visualization of SSL Setting Status Such as the FQDN Mismatch.
IMIS
(2014)
Yuji Suga
SSL/TLS Servers Status Survey about Enabling Forward Secrecy.
NBiS
(2014)
Yuji Suga
Classification of Generalized Graph-type (2, n)-Visual Secret Sharing Schemes and Optimal Construction for Multiple Secrets.
ICS
(2014)
Yuji Suga
New Constructions of (2, n)-Threshold Secret Sharing Schemes Using Exclusive-OR Operations.
IMIS
(2013)
Yuji Suga
A Fast (2, 2^m)-Threshold Secret Sharing Scheme Using m Linearly Independent Binary Vectors.
NBiS
(2013)
Yuji Suga
SSL/TLS Status Survey in Japan - Transitioning against the Renegotiation Vulnerability and Short RSA Key Length Problem.
AsiaJCIS
(2012)
Yuji Suga
Countermeasures and Tactics for Transitioning against the SSL/TLS Renegotiation Vulnerability.
IMIS
(2012)
Yuji Suga
Access Control Methods Suitable for Stream Contents Delivery Cloud Services by Using Hash-Chain Based Key Derivation Schemes.
NBiS
(2012)
Yuji Suga
Interactive Fingerprint.
AINA Workshops
(2012)
Yuji Suga
A Fair Exchange Protocol for Attribute Certification.
INCoS
(2011)
Yuji Suga
Optimal Constructions of Visual Secret Sharing Schemes for the Graph Access Structure.
IMIS
(2011)
Yuji Suga
Encryption Methods for Restricted Data Limited in Value Range.
ICCSA (4)
(2010)
Yuji Suga
A Low-Cost Key Derivation Scheme for Hierarchy-Based Access.
NBiS
(2010)
Yuji Suga
New Paradigm in Graph-Based Visual Secret Sharing Scheme by Accepting Reversal in Black-White Images.
SEC
(2005)