BibTeX records: Kazuki Yoneyama

download as .bib file

@article{DBLP:journals/ieiceta/IshibashiY23,
  author       = {Ren Ishibashi and
                  Kazuki Yoneyama},
  title        = {Post-Quantum Anonymous One-Sided Authenticated Key Exchange without
                  Random Oracles},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {9},
  pages        = {1141--1163},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022dmp0001},
  doi          = {10.1587/TRANSFUN.2022DMP0001},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/IshibashiY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IshibashiY23,
  author       = {Ren Ishibashi and
                  Kazuki Yoneyama},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Compact Password Authenticated Key Exchange from Group Actions},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {220--247},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_11},
  doi          = {10.1007/978-3-031-35486-1\_11},
  timestamp    = {Wed, 21 Jun 2023 16:37:47 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IshibashiY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/ShiY22,
  author       = {Cheng Shi and
                  Kazuki Yoneyama},
  title        = {Formal Verification of Fair Exchange Based on Bitcoin Smart Contracts},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {3},
  pages        = {242--267},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021cip0005},
  doi          = {10.1587/TRANSFUN.2021CIP0005},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/ShiY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/IshibashiY22,
  author       = {Ren Ishibashi and
                  Kazuki Yoneyama},
  title        = {Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange
                  under Standard Assumptions without Random Oracles},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {9},
  pages        = {1252--1269},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021dmp0002},
  doi          = {10.1587/TRANSFUN.2021DMP0002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/IshibashiY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YuitoSY22,
  author       = {Makoto Yuito and
                  Kenta Suzuki and
                  Kazuki Yoneyama},
  editor       = {Cristina Alcaraz and
                  Liqun Chen and
                  Shujun Li and
                  Pierangela Samarati},
  title        = {Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises},
  booktitle    = {Information and Communications Security - 24th International Conference,
                  {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13407},
  pages        = {303--323},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15777-6\_17},
  doi          = {10.1007/978-3-031-15777-6\_17},
  timestamp    = {Fri, 02 Sep 2022 10:50:10 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YuitoSY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DaizaY22,
  author       = {Takanori Daiza and
                  Kazuki Yoneyama},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without
                  Quantum Encryption Oracles},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {128--144},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_7},
  doi          = {10.1007/978-3-031-15255-9\_7},
  timestamp    = {Thu, 18 Aug 2022 14:32:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DaizaY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IshibashiY22,
  author       = {Ren Ishibashi and
                  Kazuki Yoneyama},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {Post-quantum Anonymous One-Sided Authenticated Key Exchange Without
                  Random Oracles},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {35--65},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_2},
  doi          = {10.1007/978-3-030-97131-1\_2},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/IshibashiY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshibashiY22,
  author       = {Ren Ishibashi and
                  Kazuki Yoneyama},
  title        = {Post-Quantum Anonymous One-Sided Authenticated Key Exchange without
                  Random Oracles},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/616},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshibashiY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/Yoneyama21,
  author       = {Kazuki Yoneyama},
  title        = {Post-Quantum Variants of {ISO/IEC} Standards: Compact Chosen Ciphertext
                  Secure Key Encapsulation Mechanism from Isogenies},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {1},
  pages        = {69--78},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020CIP0011},
  doi          = {10.1587/TRANSFUN.2020CIP0011},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/Yoneyama21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/NoguchiHY21,
  author       = {Ryoga Noguchi and
                  Yoshikazu Hanatani and
                  Kazuki Yoneyama},
  title        = {Verification of Group Key Management of {IEEE} 802.21 Using ProVerif},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {104-D},
  number       = {10},
  pages        = {1533--1543},
  year         = {2021},
  url          = {https://doi.org/10.1587/transinf.2020fop0003},
  doi          = {10.1587/TRANSINF.2020FOP0003},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/NoguchiHY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/IshibashiY21,
  author       = {Ren Ishibashi and
                  Kazuki Yoneyama},
  editor       = {Kazue Sako and
                  Nils Ole Tippenhauer},
  title        = {Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange
                  Under Standard Assumptions Without Random Oracles},
  booktitle    = {Applied Cryptography and Network Security - 19th International Conference,
                  {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12726},
  pages        = {3--27},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-78372-3\_1},
  doi          = {10.1007/978-3-030-78372-3\_1},
  timestamp    = {Wed, 09 Jun 2021 10:50:14 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/IshibashiY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShibataY21,
  author       = {Toshiya Shibata and
                  Kazuki Yoneyama},
  editor       = {Keita Emura and
                  Yuntao Wang},
  title        = {Universally Composable Forward Secure Dynamic Searchable Symmetric
                  Encryption},
  booktitle    = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3457338.3458290},
  doi          = {10.1145/3457338.3458290},
  timestamp    = {Wed, 16 Jun 2021 07:21:06 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ShibataY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/OkanoTNYFS21,
  author       = {Yuki Okano and
                  Junichi Tomida and
                  Akira Nagai and
                  Kazuki Yoneyama and
                  Atsushi Fujioka and
                  Koutarou Suzuki},
  editor       = {Jong Hwan Park and
                  Seung{-}Hyun Seo},
  title        = {Revocable Hierarchical Identity-Based Authenticated Key Exchange},
  booktitle    = {Information Security and Cryptology - {ICISC} 2021 - 24th International
                  Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13218},
  pages        = {3--27},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-031-08896-4\_1},
  doi          = {10.1007/978-3-031-08896-4\_1},
  timestamp    = {Wed, 27 Jul 2022 22:15:46 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/OkanoTNYFS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/Yoneyama20,
  author       = {Kazuki Yoneyama},
  title        = {Password-Based Authenticated Key Exchange without Centralized Trusted
                  Setup},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {10},
  pages        = {1142--1156},
  year         = {2020},
  url          = {https://doi.org/10.1587/transfun.2019DMP0006},
  doi          = {10.1587/TRANSFUN.2019DMP0006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/Yoneyama20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/NoguchiHY20,
  author       = {Ryoga Noguchi and
                  Yoshikazu Hanatani and
                  Kazuki Yoneyama},
  editor       = {Keita Emura and
                  Naoto Yanai},
  title        = {Verification of Group Key Management of {IEEE} 802.21 using ProVerif},
  booktitle    = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {19--27},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384940.3388960},
  doi          = {10.1145/3384940.3388960},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/NoguchiHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/ShiY20,
  author       = {Cheng Shi and
                  Kazuki Yoneyama},
  editor       = {Karthikeyan Bhargavan and
                  Elisabeth Oswald and
                  Manoj Prabhakaran},
  title        = {Formal Verification of Fair Exchange Based on Bitcoin Smart Contracts},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference
                  on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12578},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65277-7\_5},
  doi          = {10.1007/978-3-030-65277-7\_5},
  timestamp    = {Wed, 17 Apr 2024 21:39:19 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/ShiY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/MotohashiY20,
  author       = {Hayami Motohashi and
                  Kazuki Yoneyama},
  title        = {Memory Efficient and Provably Secure Virus Detection},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020},
  pages        = {499--503},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/9366114},
  timestamp    = {Mon, 22 Mar 2021 15:48:59 +0100},
  biburl       = {https://dblp.org/rec/conf/isita/MotohashiY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShiY19,
  author       = {Cheng Shi and
                  Kazuki Yoneyama},
  title        = {Verification of {LINE} Encryption Version 1.0 Using ProVerif},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {102-D},
  number       = {8},
  pages        = {1439--1448},
  year         = {2019},
  url          = {https://doi.org/10.1587/transinf.2018FOP0001},
  doi          = {10.1587/TRANSINF.2018FOP0001},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShiY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TeradaY19,
  author       = {Shintaro Terada and
                  Kazuki Yoneyama},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {Password-Based Authenticated Key Exchange from Standard Isogeny Assumptions},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {41--56},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_3},
  doi          = {10.1007/978-3-030-31919-9\_3},
  timestamp    = {Thu, 26 Sep 2019 14:48:19 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/TeradaY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FujiokaTY19,
  author       = {Atsushi Fujioka and
                  Katsuyuki Takashima and
                  Kazuki Yoneyama},
  editor       = {Ron Steinfeld and
                  Tsz Hon Yuen},
  title        = {One-Round Authenticated Group Key Exchange from Isogenies},
  booktitle    = {Provable Security - 13th International Conference, ProvSec 2019, Cairns,
                  QLD, Australia, October 1-4, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11821},
  pages        = {330--338},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-31919-9\_20},
  doi          = {10.1007/978-3-030-31919-9\_20},
  timestamp    = {Thu, 26 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FujiokaTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/Yoneyama19,
  author       = {Kazuki Yoneyama},
  editor       = {Maryam Mehrnezhad and
                  Thyla van der Merwe and
                  Feng Hao},
  title        = {Post-Quantum Variants of {ISO/IEC} Standards: Compact Chosen Ciphertext
                  Secure Key Encapsulation Mechanism from Isogeny},
  booktitle    = {Proceedings of the 5th {ACM} Workshop on Security Standardisation
                  Research Workshop, London, UK, November 11, 2019},
  pages        = {13--21},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3338500.3360336},
  doi          = {10.1145/3338500.3360336},
  timestamp    = {Wed, 11 Aug 2021 15:12:36 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/Yoneyama19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yoneyama19,
  author       = {Kazuki Yoneyama},
  title        = {Post-Quantum Variants of {ISO/IEC} Standards: Compact Chosen Ciphertext
                  Secure Key Encapsulation Mechanism from Isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1036},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1036},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yoneyama19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoneyamaYKKFY18,
  author       = {Kazuki Yoneyama and
                  Reo Yoshida and
                  Yuto Kawahara and
                  Tetsutaro Kobayashi and
                  Hitoshi Fuji and
                  Tomohide Yamamoto},
  title        = {Exposure-Resilient Identity-Based Dynamic Multi-Cast Key Distribution},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {6},
  pages        = {929--944},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.929},
  doi          = {10.1587/TRANSFUN.E101.A.929},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoneyamaYKKFY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/Yoneyama18,
  author       = {Kazuki Yoneyama},
  title        = {Formal modeling of random oracle programmability and verification
                  of signature unforgeability using task-PIOAs},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {1},
  pages        = {43--66},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-016-0352-y},
  doi          = {10.1007/S10207-016-0352-Y},
  timestamp    = {Tue, 23 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijisec/Yoneyama18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SeoEXY18,
  author       = {Jae Hong Seo and
                  Keita Emura and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  title        = {Accumulable optimistic fair exchange from verifiably encrypted homomorphic
                  signatures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {2},
  pages        = {193--220},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0367-z},
  doi          = {10.1007/S10207-017-0367-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SeoEXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/YoneyamaYKKFY18,
  author       = {Kazuki Yoneyama and
                  Reo Yoshida and
                  Yuto Kawahara and
                  Tetsutaro Kobayashi and
                  Hitoshi Fuji and
                  Tomohide Yamamoto},
  title        = {Multi-cast key distribution: scalable, dynamic and provably secure
                  construction},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {513--532},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0389-6},
  doi          = {10.1007/S10207-017-0389-6},
  timestamp    = {Wed, 05 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/YoneyamaYKKFY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/FujiokaTTY18,
  author       = {Atsushi Fujioka and
                  Katsuyuki Takashima and
                  Shintaro Terada and
                  Kazuki Yoneyama},
  editor       = {Kwangsu Lee},
  title        = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {177--195},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_12},
  doi          = {10.1007/978-3-030-12146-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/FujiokaTTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/KanaiY18,
  author       = {Yuma Kanai and
                  Kazuki Yoneyama},
  title        = {On Hiding Access Timings in {ORAM}},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2018, Singapore, October 28-31, 2018},
  pages        = {516--519},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ISITA.2018.8664270},
  doi          = {10.23919/ISITA.2018.8664270},
  timestamp    = {Wed, 11 Aug 2021 11:51:25 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/KanaiY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/TeradaY18,
  author       = {Shintaro Terada and
                  Kazuki Yoneyama},
  title        = {Improved Verifiable Delegated Private Set Intersection},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2018, Singapore, October 28-31, 2018},
  pages        = {520--524},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ISITA.2018.8664310},
  doi          = {10.23919/ISITA.2018.8664310},
  timestamp    = {Thu, 28 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isita/TeradaY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ShiY18,
  author       = {Cheng Shi and
                  Kazuki Yoneyama},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Verification of {LINE} Encryption Version 1.0 Using ProVerif},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {158--173},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_11},
  doi          = {10.1007/978-3-319-97916-8\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ShiY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FujiokaY18,
  author       = {Atsushi Fujioka and
                  Kazuki Yoneyama},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Single Private-Key Generator Security Implies Multiple Private-Key
                  Generators Security},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11192},
  pages        = {56--74},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_4},
  doi          = {10.1007/978-3-030-01446-9\_4},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FujiokaY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaTTY18,
  author       = {Atsushi Fujioka and
                  Katsuyuki Takashima and
                  Shintaro Terada and
                  Kazuki Yoneyama},
  title        = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {730},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/730},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FujiokaTTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaTY18,
  author       = {Atsushi Fujioka and
                  Katsuyuki Takashima and
                  Kazuki Yoneyama},
  title        = {One-Round Authenticated Group Key Exchange from Isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1033},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1033},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FujiokaTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ItakuraKY17,
  author       = {Naoto Itakura and
                  Kaoru Kurosawa and
                  Kazuki Yoneyama},
  title        = {Oblivious Polynomial Evaluation in the Exponent, Revisited},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {1},
  pages        = {26--33},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.26},
  doi          = {10.1587/TRANSFUN.E100.A.26},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ItakuraKY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama17,
  author       = {Kazuki Yoneyama},
  title        = {Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1794--1803},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1794},
  doi          = {10.1587/TRANSFUN.E100.A.1794},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yoneyama17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OnoY17,
  author       = {Tomoyoshi Ono and
                  Kazuki Yoneyama},
  title        = {On Randomness Exposure Resilience of Group Signatures},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {100-D},
  number       = {10},
  pages        = {2357--2367},
  year         = {2017},
  url          = {https://doi.org/10.1587/transinf.2016INP0015},
  doi          = {10.1587/TRANSINF.2016INP0015},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OnoY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KobayashiYYNHKO17,
  author       = {Yukou Kobayashi and
                  Naoto Yanai and
                  Kazuki Yoneyama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Kwangjo Kim and
                  Eiji Okamoto},
  title        = {Provably Secure Gateway Threshold Password-Based Authenticated Key
                  Exchange Secure against Undetectable On-Line Dictionary Attack},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {12},
  pages        = {2991--3006},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.2991},
  doi          = {10.1587/TRANSFUN.E100.A.2991},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/KobayashiYYNHKO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/percom/YoneyamaH17,
  author       = {Kazuki Yoneyama and
                  Goichiro Hanaoka},
  title        = {Compact public key encryption without full random oracles},
  journal      = {Pervasive Mob. Comput.},
  volume       = {41},
  pages        = {286--299},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.pmcj.2016.03.004},
  doi          = {10.1016/J.PMCJ.2016.03.004},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/percom/YoneyamaH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/YoneyamaK17,
  author       = {Kazuki Yoneyama and
                  Shogo Kimura},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption
                  with Storage Efficiency},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {489--501},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_42},
  doi          = {10.1007/978-3-319-89500-0\_42},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/YoneyamaK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/Yoneyama16,
  author       = {Kazuki Yoneyama},
  title        = {One-Round Authenticated Key Exchange without Implementation Tricks},
  journal      = {J. Inf. Process.},
  volume       = {24},
  number       = {1},
  pages        = {9--19},
  year         = {2016},
  url          = {https://doi.org/10.2197/ipsjjip.24.9},
  doi          = {10.2197/IPSJJIP.24.9},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/Yoneyama16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/KimuraY16,
  author       = {Shogo Kimura and
                  Kazuki Yoneyama},
  title        = {Security proof of identity-based signature under {RSA} assumption,
                  reconsidered},
  booktitle    = {2016 International Symposium on Information Theory and Its Applications,
                  {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  pages        = {86--90},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7840391/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/KimuraY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaSOY16,
  author       = {Kaoru Kurosawa and
                  Keisuke Sasaki and
                  Kiyohiko Ohta and
                  Kazuki Yoneyama},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {UC-Secure Dynamic Searchable Symmetric Encryption Scheme},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_5},
  doi          = {10.1007/978-3-319-44524-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KurosawaSOY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaYKKFY16,
  author       = {Kazuki Yoneyama and
                  Reo Yoshida and
                  Yuto Kawahara and
                  Tetsutaro Kobayashi and
                  Hitoshi Fuji and
                  Tomohide Yamamoto},
  editor       = {Liqun Chen and
                  Jinguang Han},
  title        = {Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure
                  Construction},
  booktitle    = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
                  China, November 10-11, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10005},
  pages        = {207--226},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47422-9\_12},
  doi          = {10.1007/978-3-319-47422-9\_12},
  timestamp    = {Wed, 14 Jul 2021 15:56:25 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YoneyamaYKKFY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secsr/SakuradaYHY16,
  author       = {Hideki Sakurada and
                  Kazuki Yoneyama and
                  Yoshikazu Hanatani and
                  Maki Yoshida},
  editor       = {Lidong Chen and
                  David A. McGrew and
                  Chris J. Mitchell},
  title        = {Analyzing and Fixing the {QACCE} Security of {QUIC}},
  booktitle    = {Security Standardisation Research - Third International Conference,
                  {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10074},
  pages        = {1--31},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49100-4\_1},
  doi          = {10.1007/978-3-319-49100-4\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/secsr/SakuradaYHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoneyamaYKKFY16,
  author       = {Kazuki Yoneyama and
                  Reo Yoshida and
                  Yuto Kawahara and
                  Tetsutaro Kobayashi and
                  Hitoshi Fuji and
                  Tomohide Yamamoto},
  title        = {Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure
                  Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {833},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/833},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoneyamaYKKFY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FujiokaSXY15,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  title        = {Strongly secure authenticated key exchange from factoring, codes,
                  and lattices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {76},
  number       = {3},
  pages        = {469--504},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9972-2},
  doi          = {10.1007/S10623-014-9972-2},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/FujiokaSXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama15,
  author       = {Kazuki Yoneyama},
  title        = {Compact Authenticated Key Exchange from Bounded CCA-Secure {KEM}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {132--143},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.132},
  doi          = {10.1587/TRANSFUN.E98.A.132},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yoneyama15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SeoEXY15,
  author       = {Jae Hong Seo and
                  Keita Emura and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic
                  Signatures},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {192--214},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_10},
  doi          = {10.1007/978-3-319-28166-7\_10},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SeoEXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15,
  author       = {Yukou Kobayashi and
                  Naoto Yanai and
                  Kazuki Yoneyama and
                  Takashi Nishide and
                  Goichiro Hanaoka and
                  Kwangjo Kim and
                  Eiji Okamoto},
  editor       = {Mohammad S. Obaidat and
                  Pascal Lorenz and
                  Pierangela Samarati},
  title        = {Gateway Threshold Password-based Authenticated Key Exchange Secure
                  against Undetectable On-line Dictionary Attack},
  booktitle    = {{SECRYPT} 2015 - Proceedings of the 12th International Conference
                  on Security and Cryptography, Colmar, Alsace, France, 20-22 July,
                  2015},
  pages        = {39--52},
  publisher    = {SciTePress},
  year         = {2015},
  url          = {https://doi.org/10.5220/0005539300390052},
  doi          = {10.5220/0005539300390052},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KobayashiYYNHKO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama14,
  author       = {Kazuki Yoneyama},
  title        = {Practical and Exposure-Resilient Hierarchical ID-Based Authenticated
                  Key Exchange without Random Oracles},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {6},
  pages        = {1335--1344},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1335},
  doi          = {10.1587/TRANSFUN.E97.A.1335},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yoneyama14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SuzukiY14,
  author       = {Koutarou Suzuki and
                  Kazuki Yoneyama},
  title        = {Exposure-Resilient One-Round Tripartite Key Exchange without Random
                  Oracles},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {6},
  pages        = {1345--1355},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1345},
  doi          = {10.1587/TRANSFUN.E97.A.1345},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SuzukiY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Yoneyama14,
  author       = {Kazuki Yoneyama},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Password-Based Authenticated Key Exchange without Centralized Trusted
                  Setup},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_2},
  doi          = {10.1007/978-3-319-07536-5\_2},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Yoneyama14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NaitoYO14,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass
                  Hash Functions},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_15},
  doi          = {10.1007/978-3-319-07536-5\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NaitoYO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/OharaOSY14,
  author       = {Kazuma Ohara and
                  Kazuo Ohta and
                  Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {Constant Rounds Almost Linear Complexity Multi-party Computation for
                  Prefix Sum},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {285--299},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_18},
  doi          = {10.1007/978-3-319-06734-6\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/OharaOSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/SuzukiY14,
  author       = {Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {Dimitris Gritzalis and
                  Aggelos Kiayias and
                  Ioannis G. Askoxylakis},
  title        = {Converting PKI-Based Authenticated Key Exchange to Identity-Based},
  booktitle    = {Cryptology and Network Security - 13th International Conference, {CANS}
                  2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8813},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12280-9\_11},
  doi          = {10.1007/978-3-319-12280-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/SuzukiY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Yoneyama14,
  author       = {Kazuki Yoneyama},
  editor       = {Jooyoung Lee and
                  Jongsung Kim},
  title        = {Formal Modeling of Random Oracle Programmability and Verification
                  of Signature Unforgeability Using Task-PIOAs},
  booktitle    = {Information Security and Cryptology - {ICISC} 2014 - 17th International
                  Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8949},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15943-0\_3},
  doi          = {10.1007/978-3-319-15943-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Yoneyama14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuzukiY14,
  author       = {Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Secure Multi-Party Computation for Elliptic Curves},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {98--108},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_8},
  doi          = {10.1007/978-3-319-09843-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuzukiY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaH14,
  author       = {Kazuki Yoneyama and
                  Goichiro Hanaoka},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Compact Public Key Encryption with Minimum Ideal Property of Hash
                  Functions},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {178--193},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_13},
  doi          = {10.1007/978-3-319-12475-9\_13},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YoneyamaH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Yoneyama14,
  author       = {Kazuki Yoneyama},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {317--325},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_23},
  doi          = {10.1007/978-3-319-12475-9\_23},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Yoneyama14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama13,
  author       = {Kazuki Yoneyama},
  title        = {Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated
                  Key Exchange without Random Oracles},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {6},
  pages        = {1112--1123},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.1112},
  doi          = {10.1587/TRANSFUN.E96.A.1112},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yoneyama13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama13a,
  author       = {Kazuki Yoneyama},
  title        = {One-Round Authenticated Key Exchange with Strong Forward Secrecy in
                  the Standard Model against Constrained Adversary},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {6},
  pages        = {1124--1138},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.1124},
  doi          = {10.1587/TRANSFUN.E96.A.1124},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yoneyama13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaHKSUY13,
  author       = {Atsushi Fujioka and
                  Fumitaka Hoshino and
                  Tetsutaro Kobayashi and
                  Koutarou Suzuki and
                  Berkant Ustaoglu and
                  Kazuki Yoneyama},
  title        = {id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and
                  Asymmetric Pairing},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {6},
  pages        = {1139--1155},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.1139},
  doi          = {10.1587/TRANSFUN.E96.A.1139},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujiokaHKSUY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SuzukiY13,
  author       = {Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Exposure-Resilient One-Round Tripartite Key Exchange without Random
                  Oracles},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {458--474},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_29},
  doi          = {10.1007/978-3-642-38980-1\_29},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SuzukiY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FujiokaSXY13,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Practical and post-quantum authenticated key exchange from one-way
                  secure key encapsulation mechanism},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484323},
  doi          = {10.1145/2484313.2484323},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FujiokaSXY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Yoneyama13,
  author       = {Kazuki Yoneyama},
  editor       = {Goutam Paul and
                  Serge Vaudenay},
  title        = {Compact Authenticated Key Exchange from Bounded CCA-Secure {KEM}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference
                  on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8250},
  pages        = {161--178},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03515-4\_11},
  doi          = {10.1007/978-3-319-03515-4\_11},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Yoneyama13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Yoneyama13,
  author       = {Kazuki Yoneyama},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {One-Round Authenticated Key Exchange without Implementation Trick},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {272--289},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_18},
  doi          = {10.1007/978-3-642-41383-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Yoneyama13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Yoneyama13,
  author       = {Kazuki Yoneyama},
  editor       = {Pierangela Samarati},
  title        = {Practical and Exposure-resilient Hierarchical ID-based Authenticated
                  Key Exchange without Random Oracles},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {518--523},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223209/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Yoneyama13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaSY12,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Kazuki Yoneyama},
  title        = {Strongly Secure Predicate-Based Authenticated Key Exchange: Definition
                  and Constructions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {40--56},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.40},
  doi          = {10.1587/TRANSFUN.E95.A.40},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujiokaSY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama12,
  author       = {Kazuki Yoneyama},
  title        = {Indifferentiable Security Reconsidered: Role of Scheduling},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {185--195},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.185},
  doi          = {10.1587/TRANSFUN.E95.A.185},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yoneyama12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Yoneyama12,
  author       = {Kazuki Yoneyama},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {One-Round Authenticated Key Exchange with Strong Forward Secrecy in
                  the Standard Model against Constrained Adversary},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {69--86},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_5},
  doi          = {10.1007/978-3-642-34117-5\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Yoneyama12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FujiokaSXY12,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Strongly Secure Authenticated Key Exchange from Factoring, Codes,
                  and Lattices},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {467--484},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_28},
  doi          = {10.1007/978-3-642-30057-8\_28},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FujiokaSXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaSXY12,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  title        = {Strongly Secure Authenticated Key Exchange from Factoring, Codes,
                  and Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/211},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FujiokaSXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NaitoYWO11,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  title        = {Security of Cryptosystems Using Merkle-Damg{\aa}rd in the Random Oracle
                  Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {57--70},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.57},
  doi          = {10.1587/TRANSFUN.E94.A.57},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NaitoYWO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoneyamaTHO11,
  author       = {Kazuki Yoneyama and
                  Masayuki Terada and
                  Sadayuki Hongo and
                  Kazuo Ohta},
  title        = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile
                  Environments},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {6},
  pages        = {1263--1273},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1263},
  doi          = {10.1587/TRANSFUN.E94.A.1263},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoneyamaTHO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaSY11,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Kazuki Yoneyama},
  title        = {Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral
                  Key Leakage},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {6},
  pages        = {1306--1317},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1306},
  doi          = {10.1587/TRANSFUN.E94.A.1306},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujiokaSY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/UshidaKYO11,
  author       = {Mebae Ushida and
                  Yutaka Kawai and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  title        = {Proxiable Designated Verifier Signature},
  journal      = {J. Inf. Process.},
  volume       = {19},
  pages        = {430--440},
  year         = {2011},
  url          = {https://doi.org/10.2197/ipsjjip.19.430},
  doi          = {10.2197/IPSJJIP.19.430},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/UshidaKYO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Yoneyama11,
  author       = {Kazuki Yoneyama},
  editor       = {Howon Kim},
  title        = {Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated
                  Key Exchange without Random Oracles},
  booktitle    = {Information Security and Cryptology - {ICISC} 2011 - 14th International
                  Conference, Seoul, Korea, November 30 - December 2, 2011. Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7259},
  pages        = {467--489},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-31912-9\_31},
  doi          = {10.1007/978-3-642-31912-9\_31},
  timestamp    = {Wed, 01 Mar 2023 16:53:12 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/Yoneyama11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NaitoYWO11,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Security of Practical Cryptosystems Using Merkle-Damg{\aa}rd Hash
                  Function in the Ideal Cipher Model},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {281--296},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_20},
  doi          = {10.1007/978-3-642-24316-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NaitoYWO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaZ11,
  author       = {Kazuki Yoneyama and
                  Yunlei Zhao},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Taxonomical Security Consideration of Authenticated Key Exchange Resilient
                  to Intermediate Computation Leakage},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {348--365},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_25},
  doi          = {10.1007/978-3-642-24316-5\_25},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YoneyamaZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KawaiTKYOK10,
  author       = {Yutaka Kawai and
                  Shotaro Tanno and
                  Takahiro Kondo and
                  Kazuki Yoneyama and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone
                  Condition},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {6},
  pages        = {1122--1131},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1122},
  doi          = {10.1587/TRANSFUN.E93.A.1122},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KawaiTKYOK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YoneyamaUO10,
  author       = {Kazuki Yoneyama and
                  Mebae Ushida and
                  Kazuo Ohta},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Rigorous Security Requirements for Designated Verifier Signatures},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {318--335},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_22},
  doi          = {10.1007/978-3-642-21518-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YoneyamaUO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/UshidaKYO10,
  author       = {Mebae Ushida and
                  Yutaka Kawai and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Mohammad S. Obaidat and
                  George A. Tsihrintzis and
                  Joaquim Filipe},
  title        = {Proxiable Designated Verifier Signature},
  booktitle    = {e-Business and Telecommunications - 7th International Joint Conference,
                  {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {222},
  pages        = {220--232},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25206-8\_14},
  doi          = {10.1007/978-3-642-25206-8\_14},
  timestamp    = {Sat, 19 Oct 2019 20:35:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/UshidaKYO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Yoneyama10,
  author       = {Kazuki Yoneyama},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Indifferentiable Security Reconsidered: Role of Scheduling},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {430--444},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_36},
  doi          = {10.1007/978-3-642-18178-8\_36},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Yoneyama10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YoneyamaTHO10,
  author       = {Kazuki Yoneyama and
                  Masayuki Terada and
                  Sadayuki Hongo and
                  Kazuo Ohta},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile
                  Environments},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {42--59},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 15:14:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YoneyamaTHO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FujiokaSY10,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral
                  Key Leakage},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {164--180},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_12},
  doi          = {10.1007/978-3-642-16825-3\_12},
  timestamp    = {Mon, 15 Jun 2020 17:00:57 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FujiokaSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/Yoneyama10,
  author       = {Kazuki Yoneyama},
  editor       = {Marc Joye and
                  Atsuko Miyaji and
                  Akira Otsuka},
  title        = {Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange},
  booktitle    = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference,
                  Yamanaka Hot Spring, Japan, December 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6487},
  pages        = {147--166},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17455-1\_10},
  doi          = {10.1007/978-3-642-17455-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/Yoneyama10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UshidaOKY10,
  author       = {Mebae Ushida and
                  Kazuo Ohta and
                  Yutaka Kawai and
                  Kazuki Yoneyama},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Proxiable Designated Verifier Signature},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {344--353},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/UshidaOKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/FujiokaSY10,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Predicate-Based Authenticated Key Exchange Resilient to Ephemeral
                  Key Leakage},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {15--30},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_2},
  doi          = {10.1007/978-3-642-17955-6\_2},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/FujiokaSY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/Yoneyama10,
  author       = {Kazuki Yoneyama},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Cross-Realm Password-Based Server Aided Key Exchange},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {322--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_24},
  doi          = {10.1007/978-3-642-17955-6\_24},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/Yoneyama10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishideYO09,
  author       = {Takashi Nishide and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  title        = {Attribute-Based Encryption with Partially Hidden Ciphertext Policies},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {22--32},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.22},
  doi          = {10.1587/TRANSFUN.E92.A.22},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishideYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yoneyama09,
  author       = {Kazuki Yoneyama},
  title        = {Does Secure Password-Based Authenticated Key Exchange against Leakage
                  of Internal States Exist?},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {113--121},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.113},
  doi          = {10.1587/TRANSFUN.E92.A.113},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yoneyama09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoneyamaMO09,
  author       = {Kazuki Yoneyama and
                  Satoshi Miyagawa and
                  Kazuo Ohta},
  title        = {Leaky Random Oracle},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {8},
  pages        = {1795--1807},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1795},
  doi          = {10.1587/TRANSFUN.E92.A.1795},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoneyamaMO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/Yoneyama09,
  author       = {Kazuki Yoneyama},
  title        = {Efficient and Strongly Secure Password-based Server Aided Key Exchange},
  journal      = {J. Inf. Process.},
  volume       = {17},
  pages        = {202--215},
  year         = {2009},
  url          = {https://doi.org/10.2197/ipsjjip.17.202},
  doi          = {10.2197/IPSJJIP.17.202},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/Yoneyama09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaitoYWO09,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  editor       = {Mitsuru Matsui},
  title        = {How to Confirm Cryptosystems Security: The Original Merkle-Damg{\aa}rd
                  Is Still Alive!},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {382--398},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_23},
  doi          = {10.1007/978-3-642-10366-7\_23},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NaitoYWO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KawaiYO09,
  author       = {Yutaka Kawai and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Secret Handshake: Strong Anonymity Definition and Construction},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {219--229},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_20},
  doi          = {10.1007/978-3-642-00843-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KawaiYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoYWO09,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  title        = {How to Prove the Security of Practical Cryptosystems with Merkle-Damg{\aa}rd
                  Hashing by Adopting Indifferentiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoYWO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoYWO09a,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  title        = {Security of Practical Cryptosystems Using Merkle-Damgard Hash Function
                  in the Ideal Cipher Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoYWO09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawaiYO09,
  author       = {Yutaka Kawai and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  title        = {Secret Handshake: Strong Anonymity Definition and Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawaiYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NishideYO08,
  author       = {Takashi Nishide and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Attribute-Based Encryption with Partially Hidden Encryptor-Specified
                  Access Structures},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {111--129},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_7},
  doi          = {10.1007/978-3-540-68914-0\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NishideYO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Yoneyama08,
  author       = {Kazuki Yoneyama},
  editor       = {Dipanwita Roy Chowdhury and
                  Vincent Rijmen and
                  Abhijit Das},
  title        = {Efficient and Strongly Secure Password-Based Server Aided Key Exchange
                  (Extended Abstract)},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference
                  on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5365},
  pages        = {172--184},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89754-5\_14},
  doi          = {10.1007/978-3-540-89754-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Yoneyama08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaMO08,
  author       = {Kazuki Yoneyama and
                  Satoshi Miyagawa and
                  Kazuo Ohta},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Leaky Random Oracle (Extended Abstract)},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {226--240},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_16},
  doi          = {10.1007/978-3-540-88733-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YoneyamaMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/Yoneyama08,
  author       = {Kazuki Yoneyama},
  editor       = {Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek and
                  Javier Hernando},
  title        = {Anonymous Message Authentication - Universally Composable Definition
                  and Construction},
  booktitle    = {{SECRYPT} 2008, Proceedings of the International Conference on Security
                  and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {351--354},
  publisher    = {{INSTICC} Press},
  year         = {2008},
  timestamp    = {Fri, 04 Sep 2009 13:20:36 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/Yoneyama08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KawaiTKYKO08,
  author       = {Yutaka Kawai and
                  Shotaro Tanno and
                  Takahiro Kondo and
                  Kazuki Yoneyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone
                  Condition},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_12},
  doi          = {10.1007/978-3-642-00306-6\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KawaiTKYKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OtaYKTO07,
  author       = {Haruki Ota and
                  Kazuki Yoneyama and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kazuo Ohta},
  title        = {Universally Composable Hierarchical Hybrid Authenticated Key Exchange},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {139--151},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.139},
  doi          = {10.1093/IETFEC/E90-A.1.139},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OtaYKTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/YoneyamaOO07,
  author       = {Kazuki Yoneyama and
                  Haruki Ota and
                  Kazuo Ohta},
  editor       = {Serdar Boztas and
                  Hsiao{-}feng Lu},
  title        = {Secure Cross-Realm Client-to-Client Password-Based Authenticated Key
                  Exchange Against Undetectable On-Line Dictionary Attacks},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  17th International Symposium, AAECC-17, Bangalore, India, December
                  16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4851},
  pages        = {257--266},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77224-8\_30},
  doi          = {10.1007/978-3-540-77224-8\_30},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/YoneyamaOO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YoneyamaO07,
  author       = {Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Ring signatures: universally composable definitions and constructions},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {374--376},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229332},
  doi          = {10.1145/1229285.1229332},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YoneyamaO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TeradaYHO07,
  author       = {Masayuki Terada and
                  Kazuki Yoneyama and
                  Sadayuki Hongo and
                  Kazuo Ohta},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {Modeling Agreement Problems in the Universal Composability Framework},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {350--361},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_27},
  doi          = {10.1007/978-3-540-77048-0\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TeradaYHO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IwamotoWYKO06,
  author       = {Mitsugu Iwamoto and
                  Lei Wang and
                  Kazuki Yoneyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Visual Secret Sharing Schemes for Multiple Secret Images Allowing
                  the Rotation of Shares},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {5},
  pages        = {1382--1395},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.5.1382},
  doi          = {10.1093/IETFEC/E89-A.5.1382},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IwamotoWYKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics