Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kazuki Yoneyama
@article{DBLP:journals/ieiceta/IshibashiY23, author = {Ren Ishibashi and Kazuki Yoneyama}, title = {Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {9}, pages = {1141--1163}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022dmp0001}, doi = {10.1587/TRANSFUN.2022DMP0001}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/IshibashiY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IshibashiY23, author = {Ren Ishibashi and Kazuki Yoneyama}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Compact Password Authenticated Key Exchange from Group Actions}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {220--247}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_11}, doi = {10.1007/978-3-031-35486-1\_11}, timestamp = {Wed, 21 Jun 2023 16:37:47 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IshibashiY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/ShiY22, author = {Cheng Shi and Kazuki Yoneyama}, title = {Formal Verification of Fair Exchange Based on Bitcoin Smart Contracts}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {3}, pages = {242--267}, year = {2022}, url = {https://doi.org/10.1587/transfun.2021cip0005}, doi = {10.1587/TRANSFUN.2021CIP0005}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/ShiY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/IshibashiY22, author = {Ren Ishibashi and Kazuki Yoneyama}, title = {Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange under Standard Assumptions without Random Oracles}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {9}, pages = {1252--1269}, year = {2022}, url = {https://doi.org/10.1587/transfun.2021dmp0002}, doi = {10.1587/TRANSFUN.2021DMP0002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/IshibashiY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YuitoSY22, author = {Makoto Yuito and Kenta Suzuki and Kazuki Yoneyama}, editor = {Cristina Alcaraz and Liqun Chen and Shujun Li and Pierangela Samarati}, title = {Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises}, booktitle = {Information and Communications Security - 24th International Conference, {ICICS} 2022, Canterbury, UK, September 5-8, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13407}, pages = {303--323}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15777-6\_17}, doi = {10.1007/978-3-031-15777-6\_17}, timestamp = {Fri, 02 Sep 2022 10:50:10 +0200}, biburl = {https://dblp.org/rec/conf/icics/YuitoSY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DaizaY22, author = {Takanori Daiza and Kazuki Yoneyama}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {128--144}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_7}, doi = {10.1007/978-3-031-15255-9\_7}, timestamp = {Thu, 18 Aug 2022 14:32:38 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DaizaY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IshibashiY22, author = {Ren Ishibashi and Kazuki Yoneyama}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {35--65}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_2}, doi = {10.1007/978-3-030-97131-1\_2}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/IshibashiY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshibashiY22, author = {Ren Ishibashi and Kazuki Yoneyama}, title = {Post-Quantum Anonymous One-Sided Authenticated Key Exchange without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2022}, url = {https://eprint.iacr.org/2022/616}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshibashiY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/Yoneyama21, author = {Kazuki Yoneyama}, title = {Post-Quantum Variants of {ISO/IEC} Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {1}, pages = {69--78}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020CIP0011}, doi = {10.1587/TRANSFUN.2020CIP0011}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/Yoneyama21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/NoguchiHY21, author = {Ryoga Noguchi and Yoshikazu Hanatani and Kazuki Yoneyama}, title = {Verification of Group Key Management of {IEEE} 802.21 Using ProVerif}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {104-D}, number = {10}, pages = {1533--1543}, year = {2021}, url = {https://doi.org/10.1587/transinf.2020fop0003}, doi = {10.1587/TRANSINF.2020FOP0003}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/NoguchiHY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/IshibashiY21, author = {Ren Ishibashi and Kazuki Yoneyama}, editor = {Kazue Sako and Nils Ole Tippenhauer}, title = {Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange Under Standard Assumptions Without Random Oracles}, booktitle = {Applied Cryptography and Network Security - 19th International Conference, {ACNS} 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12726}, pages = {3--27}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-78372-3\_1}, doi = {10.1007/978-3-030-78372-3\_1}, timestamp = {Wed, 09 Jun 2021 10:50:14 +0200}, biburl = {https://dblp.org/rec/conf/acns/IshibashiY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ShibataY21, author = {Toshiya Shibata and Kazuki Yoneyama}, editor = {Keita Emura and Yuntao Wang}, title = {Universally Composable Forward Secure Dynamic Searchable Symmetric Encryption}, booktitle = {Proceedings of the 8th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021}, pages = {41--50}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3457338.3458290}, doi = {10.1145/3457338.3458290}, timestamp = {Wed, 16 Jun 2021 07:21:06 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ShibataY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/OkanoTNYFS21, author = {Yuki Okano and Junichi Tomida and Akira Nagai and Kazuki Yoneyama and Atsushi Fujioka and Koutarou Suzuki}, editor = {Jong Hwan Park and Seung{-}Hyun Seo}, title = {Revocable Hierarchical Identity-Based Authenticated Key Exchange}, booktitle = {Information Security and Cryptology - {ICISC} 2021 - 24th International Conference, Seoul, South Korea, December 1-3, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13218}, pages = {3--27}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-031-08896-4\_1}, doi = {10.1007/978-3-031-08896-4\_1}, timestamp = {Wed, 27 Jul 2022 22:15:46 +0200}, biburl = {https://dblp.org/rec/conf/icisc/OkanoTNYFS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/Yoneyama20, author = {Kazuki Yoneyama}, title = {Password-Based Authenticated Key Exchange without Centralized Trusted Setup}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {10}, pages = {1142--1156}, year = {2020}, url = {https://doi.org/10.1587/transfun.2019DMP0006}, doi = {10.1587/TRANSFUN.2019DMP0006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/Yoneyama20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/NoguchiHY20, author = {Ryoga Noguchi and Yoshikazu Hanatani and Kazuki Yoneyama}, editor = {Keita Emura and Naoto Yanai}, title = {Verification of Group Key Management of {IEEE} 802.21 using ProVerif}, booktitle = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {19--27}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384940.3388960}, doi = {10.1145/3384940.3388960}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/NoguchiHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/ShiY20, author = {Cheng Shi and Kazuki Yoneyama}, editor = {Karthikeyan Bhargavan and Elisabeth Oswald and Manoj Prabhakaran}, title = {Formal Verification of Fair Exchange Based on Bitcoin Smart Contracts}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2020 - 21st International Conference on Cryptology in India, Bangalore, India, December 13-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12578}, pages = {89--106}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65277-7\_5}, doi = {10.1007/978-3-030-65277-7\_5}, timestamp = {Wed, 17 Apr 2024 21:39:19 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/ShiY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/MotohashiY20, author = {Hayami Motohashi and Kazuki Yoneyama}, title = {Memory Efficient and Provably Secure Virus Detection}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020}, pages = {499--503}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/document/9366114}, timestamp = {Mon, 22 Mar 2021 15:48:59 +0100}, biburl = {https://dblp.org/rec/conf/isita/MotohashiY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShiY19, author = {Cheng Shi and Kazuki Yoneyama}, title = {Verification of {LINE} Encryption Version 1.0 Using ProVerif}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {102-D}, number = {8}, pages = {1439--1448}, year = {2019}, url = {https://doi.org/10.1587/transinf.2018FOP0001}, doi = {10.1587/TRANSINF.2018FOP0001}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/ShiY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TeradaY19, author = {Shintaro Terada and Kazuki Yoneyama}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {Password-Based Authenticated Key Exchange from Standard Isogeny Assumptions}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {41--56}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_3}, doi = {10.1007/978-3-030-31919-9\_3}, timestamp = {Thu, 26 Sep 2019 14:48:19 +0200}, biburl = {https://dblp.org/rec/conf/provsec/TeradaY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/FujiokaTY19, author = {Atsushi Fujioka and Katsuyuki Takashima and Kazuki Yoneyama}, editor = {Ron Steinfeld and Tsz Hon Yuen}, title = {One-Round Authenticated Group Key Exchange from Isogenies}, booktitle = {Provable Security - 13th International Conference, ProvSec 2019, Cairns, QLD, Australia, October 1-4, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11821}, pages = {330--338}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-31919-9\_20}, doi = {10.1007/978-3-030-31919-9\_20}, timestamp = {Thu, 26 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/FujiokaTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/Yoneyama19, author = {Kazuki Yoneyama}, editor = {Maryam Mehrnezhad and Thyla van der Merwe and Feng Hao}, title = {Post-Quantum Variants of {ISO/IEC} Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogeny}, booktitle = {Proceedings of the 5th {ACM} Workshop on Security Standardisation Research Workshop, London, UK, November 11, 2019}, pages = {13--21}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3338500.3360336}, doi = {10.1145/3338500.3360336}, timestamp = {Wed, 11 Aug 2021 15:12:36 +0200}, biburl = {https://dblp.org/rec/conf/secsr/Yoneyama19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yoneyama19, author = {Kazuki Yoneyama}, title = {Post-Quantum Variants of {ISO/IEC} Standards: Compact Chosen Ciphertext Secure Key Encapsulation Mechanism from Isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1036}, year = {2019}, url = {https://eprint.iacr.org/2019/1036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yoneyama19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoneyamaYKKFY18, author = {Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide Yamamoto}, title = {Exposure-Resilient Identity-Based Dynamic Multi-Cast Key Distribution}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {6}, pages = {929--944}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.929}, doi = {10.1587/TRANSFUN.E101.A.929}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoneyamaYKKFY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/Yoneyama18, author = {Kazuki Yoneyama}, title = {Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {1}, pages = {43--66}, year = {2018}, url = {https://doi.org/10.1007/s10207-016-0352-y}, doi = {10.1007/S10207-016-0352-Y}, timestamp = {Tue, 23 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisec/Yoneyama18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SeoEXY18, author = {Jae Hong Seo and Keita Emura and Keita Xagawa and Kazuki Yoneyama}, title = {Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {2}, pages = {193--220}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0367-z}, doi = {10.1007/S10207-017-0367-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SeoEXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/YoneyamaYKKFY18, author = {Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide Yamamoto}, title = {Multi-cast key distribution: scalable, dynamic and provably secure construction}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {513--532}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0389-6}, doi = {10.1007/S10207-017-0389-6}, timestamp = {Wed, 05 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/YoneyamaYKKFY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/FujiokaTTY18, author = {Atsushi Fujioka and Katsuyuki Takashima and Shintaro Terada and Kazuki Yoneyama}, editor = {Kwangsu Lee}, title = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {177--195}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_12}, doi = {10.1007/978-3-030-12146-4\_12}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/FujiokaTTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/KanaiY18, author = {Yuma Kanai and Kazuki Yoneyama}, title = {On Hiding Access Timings in {ORAM}}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2018, Singapore, October 28-31, 2018}, pages = {516--519}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ISITA.2018.8664270}, doi = {10.23919/ISITA.2018.8664270}, timestamp = {Wed, 11 Aug 2021 11:51:25 +0200}, biburl = {https://dblp.org/rec/conf/isita/KanaiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/TeradaY18, author = {Shintaro Terada and Kazuki Yoneyama}, title = {Improved Verifiable Delegated Private Set Intersection}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2018, Singapore, October 28-31, 2018}, pages = {520--524}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ISITA.2018.8664310}, doi = {10.23919/ISITA.2018.8664310}, timestamp = {Thu, 28 Mar 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isita/TeradaY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ShiY18, author = {Cheng Shi and Kazuki Yoneyama}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Verification of {LINE} Encryption Version 1.0 Using ProVerif}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {158--173}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_11}, doi = {10.1007/978-3-319-97916-8\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ShiY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/FujiokaY18, author = {Atsushi Fujioka and Kazuki Yoneyama}, editor = {Joonsang Baek and Willy Susilo and Jongkil Kim}, title = {Single Private-Key Generator Security Implies Multiple Private-Key Generators Security}, booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju, South Korea, October 25-28, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11192}, pages = {56--74}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01446-9\_4}, doi = {10.1007/978-3-030-01446-9\_4}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/FujiokaY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujiokaTTY18, author = {Atsushi Fujioka and Katsuyuki Takashima and Shintaro Terada and Kazuki Yoneyama}, title = {Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {730}, year = {2018}, url = {https://eprint.iacr.org/2018/730}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FujiokaTTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujiokaTY18, author = {Atsushi Fujioka and Katsuyuki Takashima and Kazuki Yoneyama}, title = {One-Round Authenticated Group Key Exchange from Isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1033}, year = {2018}, url = {https://eprint.iacr.org/2018/1033}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FujiokaTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ItakuraKY17, author = {Naoto Itakura and Kaoru Kurosawa and Kazuki Yoneyama}, title = {Oblivious Polynomial Evaluation in the Exponent, Revisited}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {1}, pages = {26--33}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.26}, doi = {10.1587/TRANSFUN.E100.A.26}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ItakuraKY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yoneyama17, author = {Kazuki Yoneyama}, title = {Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1794--1803}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1794}, doi = {10.1587/TRANSFUN.E100.A.1794}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yoneyama17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OnoY17, author = {Tomoyoshi Ono and Kazuki Yoneyama}, title = {On Randomness Exposure Resilience of Group Signatures}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {100-D}, number = {10}, pages = {2357--2367}, year = {2017}, url = {https://doi.org/10.1587/transinf.2016INP0015}, doi = {10.1587/TRANSINF.2016INP0015}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OnoY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KobayashiYYNHKO17, author = {Yukou Kobayashi and Naoto Yanai and Kazuki Yoneyama and Takashi Nishide and Goichiro Hanaoka and Kwangjo Kim and Eiji Okamoto}, title = {Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {12}, pages = {2991--3006}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.2991}, doi = {10.1587/TRANSFUN.E100.A.2991}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/KobayashiYYNHKO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/percom/YoneyamaH17, author = {Kazuki Yoneyama and Goichiro Hanaoka}, title = {Compact public key encryption without full random oracles}, journal = {Pervasive Mob. Comput.}, volume = {41}, pages = {286--299}, year = {2017}, url = {https://doi.org/10.1016/j.pmcj.2016.03.004}, doi = {10.1016/J.PMCJ.2016.03.004}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/percom/YoneyamaH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/YoneyamaK17, author = {Kazuki Yoneyama and Shogo Kimura}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {489--501}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_42}, doi = {10.1007/978-3-319-89500-0\_42}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/YoneyamaK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/Yoneyama16, author = {Kazuki Yoneyama}, title = {One-Round Authenticated Key Exchange without Implementation Tricks}, journal = {J. Inf. Process.}, volume = {24}, number = {1}, pages = {9--19}, year = {2016}, url = {https://doi.org/10.2197/ipsjjip.24.9}, doi = {10.2197/IPSJJIP.24.9}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/Yoneyama16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/KimuraY16, author = {Shogo Kimura and Kazuki Yoneyama}, title = {Security proof of identity-based signature under {RSA} assumption, reconsidered}, booktitle = {2016 International Symposium on Information Theory and Its Applications, {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016}, pages = {86--90}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7840391/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/KimuraY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KurosawaSOY16, author = {Kaoru Kurosawa and Keisuke Sasaki and Kiyohiko Ohta and Kazuki Yoneyama}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {UC-Secure Dynamic Searchable Symmetric Encryption Scheme}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {73--90}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_5}, doi = {10.1007/978-3-319-44524-3\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KurosawaSOY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YoneyamaYKKFY16, author = {Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide Yamamoto}, editor = {Liqun Chen and Jinguang Han}, title = {Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {207--226}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_12}, doi = {10.1007/978-3-319-47422-9\_12}, timestamp = {Wed, 14 Jul 2021 15:56:25 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YoneyamaYKKFY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secsr/SakuradaYHY16, author = {Hideki Sakurada and Kazuki Yoneyama and Yoshikazu Hanatani and Maki Yoshida}, editor = {Lidong Chen and David A. McGrew and Chris J. Mitchell}, title = {Analyzing and Fixing the {QACCE} Security of {QUIC}}, booktitle = {Security Standardisation Research - Third International Conference, {SSR} 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10074}, pages = {1--31}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49100-4\_1}, doi = {10.1007/978-3-319-49100-4\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/secsr/SakuradaYHY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoneyamaYKKFY16, author = {Kazuki Yoneyama and Reo Yoshida and Yuto Kawahara and Tetsutaro Kobayashi and Hitoshi Fuji and Tomohide Yamamoto}, title = {Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {833}, year = {2016}, url = {http://eprint.iacr.org/2016/833}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoneyamaYKKFY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FujiokaSXY15, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, title = {Strongly secure authenticated key exchange from factoring, codes, and lattices}, journal = {Des. Codes Cryptogr.}, volume = {76}, number = {3}, pages = {469--504}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9972-2}, doi = {10.1007/S10623-014-9972-2}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/FujiokaSXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yoneyama15, author = {Kazuki Yoneyama}, title = {Compact Authenticated Key Exchange from Bounded CCA-Secure {KEM}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {132--143}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.132}, doi = {10.1587/TRANSFUN.E98.A.132}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yoneyama15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SeoEXY15, author = {Jae Hong Seo and Keita Emura and Keita Xagawa and Kazuki Yoneyama}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {192--214}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_10}, doi = {10.1007/978-3-319-28166-7\_10}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SeoEXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/KobayashiYYNHKO15, author = {Yukou Kobayashi and Naoto Yanai and Kazuki Yoneyama and Takashi Nishide and Goichiro Hanaoka and Kwangjo Kim and Eiji Okamoto}, editor = {Mohammad S. Obaidat and Pascal Lorenz and Pierangela Samarati}, title = {Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack}, booktitle = {{SECRYPT} 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015}, pages = {39--52}, publisher = {SciTePress}, year = {2015}, url = {https://doi.org/10.5220/0005539300390052}, doi = {10.5220/0005539300390052}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/KobayashiYYNHKO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yoneyama14, author = {Kazuki Yoneyama}, title = {Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {6}, pages = {1335--1344}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1335}, doi = {10.1587/TRANSFUN.E97.A.1335}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yoneyama14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SuzukiY14, author = {Koutarou Suzuki and Kazuki Yoneyama}, title = {Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {6}, pages = {1345--1355}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1345}, doi = {10.1587/TRANSFUN.E97.A.1345}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SuzukiY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Yoneyama14, author = {Kazuki Yoneyama}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Password-Based Authenticated Key Exchange without Centralized Trusted Setup}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {19--36}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_2}, doi = {10.1007/978-3-319-07536-5\_2}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/Yoneyama14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NaitoYO14, author = {Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {235--252}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_15}, doi = {10.1007/978-3-319-07536-5\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NaitoYO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/OharaOSY14, author = {Kazuma Ohara and Kazuo Ohta and Koutarou Suzuki and Kazuki Yoneyama}, editor = {David Pointcheval and Damien Vergnaud}, title = {Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {285--299}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_18}, doi = {10.1007/978-3-319-06734-6\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/OharaOSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/SuzukiY14, author = {Koutarou Suzuki and Kazuki Yoneyama}, editor = {Dimitris Gritzalis and Aggelos Kiayias and Ioannis G. Askoxylakis}, title = {Converting PKI-Based Authenticated Key Exchange to Identity-Based}, booktitle = {Cryptology and Network Security - 13th International Conference, {CANS} 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8813}, pages = {159--174}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12280-9\_11}, doi = {10.1007/978-3-319-12280-9\_11}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/SuzukiY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Yoneyama14, author = {Kazuki Yoneyama}, editor = {Jooyoung Lee and Jongsung Kim}, title = {Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs}, booktitle = {Information Security and Cryptology - {ICISC} 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8949}, pages = {37--52}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15943-0\_3}, doi = {10.1007/978-3-319-15943-0\_3}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Yoneyama14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuzukiY14, author = {Koutarou Suzuki and Kazuki Yoneyama}, editor = {Maki Yoshida and Koichi Mouri}, title = {Secure Multi-Party Computation for Elliptic Curves}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {98--108}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_8}, doi = {10.1007/978-3-319-09843-2\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuzukiY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YoneyamaH14, author = {Kazuki Yoneyama and Goichiro Hanaoka}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Compact Public Key Encryption with Minimum Ideal Property of Hash Functions}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {178--193}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_13}, doi = {10.1007/978-3-319-12475-9\_13}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YoneyamaH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Yoneyama14, author = {Kazuki Yoneyama}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {317--325}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_23}, doi = {10.1007/978-3-319-12475-9\_23}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Yoneyama14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yoneyama13, author = {Kazuki Yoneyama}, title = {Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated Key Exchange without Random Oracles}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {6}, pages = {1112--1123}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.1112}, doi = {10.1587/TRANSFUN.E96.A.1112}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yoneyama13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yoneyama13a, author = {Kazuki Yoneyama}, title = {One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {6}, pages = {1124--1138}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.1124}, doi = {10.1587/TRANSFUN.E96.A.1124}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yoneyama13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FujiokaHKSUY13, author = {Atsushi Fujioka and Fumitaka Hoshino and Tetsutaro Kobayashi and Koutarou Suzuki and Berkant Ustaoglu and Kazuki Yoneyama}, title = {id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {6}, pages = {1139--1155}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.1139}, doi = {10.1587/TRANSFUN.E96.A.1139}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/FujiokaHKSUY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SuzukiY13, author = {Koutarou Suzuki and Kazuki Yoneyama}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {458--474}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_29}, doi = {10.1007/978-3-642-38980-1\_29}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SuzukiY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FujiokaSXY13, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {83--94}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484323}, doi = {10.1145/2484313.2484323}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FujiokaSXY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Yoneyama13, author = {Kazuki Yoneyama}, editor = {Goutam Paul and Serge Vaudenay}, title = {Compact Authenticated Key Exchange from Bounded CCA-Secure {KEM}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8250}, pages = {161--178}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03515-4\_11}, doi = {10.1007/978-3-319-03515-4\_11}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Yoneyama13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Yoneyama13, author = {Kazuki Yoneyama}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {One-Round Authenticated Key Exchange without Implementation Trick}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {272--289}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_18}, doi = {10.1007/978-3-642-41383-4\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Yoneyama13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Yoneyama13, author = {Kazuki Yoneyama}, editor = {Pierangela Samarati}, title = {Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {518--523}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223209/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Yoneyama13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FujiokaSY12, author = {Atsushi Fujioka and Koutarou Suzuki and Kazuki Yoneyama}, title = {Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {40--56}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.40}, doi = {10.1587/TRANSFUN.E95.A.40}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/FujiokaSY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yoneyama12, author = {Kazuki Yoneyama}, title = {Indifferentiable Security Reconsidered: Role of Scheduling}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {185--195}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.185}, doi = {10.1587/TRANSFUN.E95.A.185}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yoneyama12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Yoneyama12, author = {Kazuki Yoneyama}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {69--86}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_5}, doi = {10.1007/978-3-642-34117-5\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Yoneyama12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FujiokaSXY12, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {467--484}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_28}, doi = {10.1007/978-3-642-30057-8\_28}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FujiokaSXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujiokaSXY12, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, title = {Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2012}, url = {http://eprint.iacr.org/2012/211}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FujiokaSXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NaitoYWO11, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, title = {Security of Cryptosystems Using Merkle-Damg{\aa}rd in the Random Oracle Model}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {57--70}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.57}, doi = {10.1587/TRANSFUN.E94.A.57}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NaitoYWO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoneyamaTHO11, author = {Kazuki Yoneyama and Masayuki Terada and Sadayuki Hongo and Kazuo Ohta}, title = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {6}, pages = {1263--1273}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1263}, doi = {10.1587/TRANSFUN.E94.A.1263}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoneyamaTHO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FujiokaSY11, author = {Atsushi Fujioka and Koutarou Suzuki and Kazuki Yoneyama}, title = {Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {6}, pages = {1306--1317}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1306}, doi = {10.1587/TRANSFUN.E94.A.1306}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/FujiokaSY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/UshidaKYO11, author = {Mebae Ushida and Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta}, title = {Proxiable Designated Verifier Signature}, journal = {J. Inf. Process.}, volume = {19}, pages = {430--440}, year = {2011}, url = {https://doi.org/10.2197/ipsjjip.19.430}, doi = {10.2197/IPSJJIP.19.430}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/UshidaKYO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Yoneyama11, author = {Kazuki Yoneyama}, editor = {Howon Kim}, title = {Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles}, booktitle = {Information Security and Cryptology - {ICISC} 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7259}, pages = {467--489}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31912-9\_31}, doi = {10.1007/978-3-642-31912-9\_31}, timestamp = {Wed, 01 Mar 2023 16:53:12 +0100}, biburl = {https://dblp.org/rec/conf/icisc/Yoneyama11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NaitoYWO11, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Security of Practical Cryptosystems Using Merkle-Damg{\aa}rd Hash Function in the Ideal Cipher Model}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {281--296}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_20}, doi = {10.1007/978-3-642-24316-5\_20}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NaitoYWO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YoneyamaZ11, author = {Kazuki Yoneyama and Yunlei Zhao}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {348--365}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_25}, doi = {10.1007/978-3-642-24316-5\_25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YoneyamaZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KawaiTKYOK10, author = {Yutaka Kawai and Shotaro Tanno and Takahiro Kondo and Kazuki Yoneyama and Kazuo Ohta and Noboru Kunihiro}, title = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {6}, pages = {1122--1131}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1122}, doi = {10.1587/TRANSFUN.E93.A.1122}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KawaiTKYOK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YoneyamaUO10, author = {Kazuki Yoneyama and Mebae Ushida and Kazuo Ohta}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Rigorous Security Requirements for Designated Verifier Signatures}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {318--335}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_22}, doi = {10.1007/978-3-642-21518-6\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YoneyamaUO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/UshidaKYO10, author = {Mebae Ushida and Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta}, editor = {Mohammad S. Obaidat and George A. Tsihrintzis and Joaquim Filipe}, title = {Proxiable Designated Verifier Signature}, booktitle = {e-Business and Telecommunications - 7th International Joint Conference, {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {222}, pages = {220--232}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25206-8\_14}, doi = {10.1007/978-3-642-25206-8\_14}, timestamp = {Sat, 19 Oct 2019 20:35:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/UshidaKYO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Yoneyama10, author = {Kazuki Yoneyama}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Indifferentiable Security Reconsidered: Role of Scheduling}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {430--444}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_36}, doi = {10.1007/978-3-642-18178-8\_36}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/Yoneyama10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YoneyamaTHO10, author = {Kazuki Yoneyama and Masayuki Terada and Sadayuki Hongo and Kazuo Ohta}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {42--59}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 15:14:43 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YoneyamaTHO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FujiokaSY10, author = {Atsushi Fujioka and Koutarou Suzuki and Kazuki Yoneyama}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {164--180}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_12}, doi = {10.1007/978-3-642-16825-3\_12}, timestamp = {Mon, 15 Jun 2020 17:00:57 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FujiokaSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/Yoneyama10, author = {Kazuki Yoneyama}, editor = {Marc Joye and Atsuko Miyaji and Akira Otsuka}, title = {Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange}, booktitle = {Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6487}, pages = {147--166}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17455-1\_10}, doi = {10.1007/978-3-642-17455-1\_10}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/Yoneyama10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/UshidaOKY10, author = {Mebae Ushida and Kazuo Ohta and Yutaka Kawai and Kazuki Yoneyama}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Proxiable Designated Verifier Signature}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {344--353}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/UshidaOKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/FujiokaSY10, author = {Atsushi Fujioka and Koutarou Suzuki and Kazuki Yoneyama}, editor = {Yongwha Chung and Moti Yung}, title = {Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {15--30}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_2}, doi = {10.1007/978-3-642-17955-6\_2}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/FujiokaSY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/Yoneyama10, author = {Kazuki Yoneyama}, editor = {Yongwha Chung and Moti Yung}, title = {Cross-Realm Password-Based Server Aided Key Exchange}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {322--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_24}, doi = {10.1007/978-3-642-17955-6\_24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/Yoneyama10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishideYO09, author = {Takashi Nishide and Kazuki Yoneyama and Kazuo Ohta}, title = {Attribute-Based Encryption with Partially Hidden Ciphertext Policies}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {22--32}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.22}, doi = {10.1587/TRANSFUN.E92.A.22}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishideYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yoneyama09, author = {Kazuki Yoneyama}, title = {Does Secure Password-Based Authenticated Key Exchange against Leakage of Internal States Exist?}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {113--121}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.113}, doi = {10.1587/TRANSFUN.E92.A.113}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yoneyama09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoneyamaMO09, author = {Kazuki Yoneyama and Satoshi Miyagawa and Kazuo Ohta}, title = {Leaky Random Oracle}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {8}, pages = {1795--1807}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1795}, doi = {10.1587/TRANSFUN.E92.A.1795}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoneyamaMO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/Yoneyama09, author = {Kazuki Yoneyama}, title = {Efficient and Strongly Secure Password-based Server Aided Key Exchange}, journal = {J. Inf. Process.}, volume = {17}, pages = {202--215}, year = {2009}, url = {https://doi.org/10.2197/ipsjjip.17.202}, doi = {10.2197/IPSJJIP.17.202}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/Yoneyama09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NaitoYWO09, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, editor = {Mitsuru Matsui}, title = {How to Confirm Cryptosystems Security: The Original Merkle-Damg{\aa}rd Is Still Alive!}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {382--398}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_23}, doi = {10.1007/978-3-642-10366-7\_23}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/NaitoYWO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KawaiYO09, author = {Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Secret Handshake: Strong Anonymity Definition and Construction}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {219--229}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_20}, doi = {10.1007/978-3-642-00843-6\_20}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KawaiYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoYWO09, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, title = {How to Prove the Security of Practical Cryptosystems with Merkle-Damg{\aa}rd Hashing by Adopting Indifferentiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2009}, url = {http://eprint.iacr.org/2009/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoYWO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoYWO09a, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, title = {Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2009}, url = {http://eprint.iacr.org/2009/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoYWO09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawaiYO09, author = {Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta}, title = {Secret Handshake: Strong Anonymity Definition and Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2009}, url = {http://eprint.iacr.org/2009/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawaiYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NishideYO08, author = {Takashi Nishide and Kazuki Yoneyama and Kazuo Ohta}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {111--129}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_7}, doi = {10.1007/978-3-540-68914-0\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NishideYO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Yoneyama08, author = {Kazuki Yoneyama}, editor = {Dipanwita Roy Chowdhury and Vincent Rijmen and Abhijit Das}, title = {Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5365}, pages = {172--184}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89754-5\_14}, doi = {10.1007/978-3-540-89754-5\_14}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Yoneyama08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YoneyamaMO08, author = {Kazuki Yoneyama and Satoshi Miyagawa and Kazuo Ohta}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Leaky Random Oracle (Extended Abstract)}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {226--240}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_16}, doi = {10.1007/978-3-540-88733-1\_16}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YoneyamaMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/Yoneyama08, author = {Kazuki Yoneyama}, editor = {Eduardo Fern{\'{a}}ndez{-}Medina and Manu Malek and Javier Hernando}, title = {Anonymous Message Authentication - Universally Composable Definition and Construction}, booktitle = {{SECRYPT} 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {351--354}, publisher = {{INSTICC} Press}, year = {2008}, timestamp = {Fri, 04 Sep 2009 13:20:36 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/Yoneyama08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KawaiTKYKO08, author = {Yutaka Kawai and Shotaro Tanno and Takahiro Kondo and Kazuki Yoneyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {160--173}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_12}, doi = {10.1007/978-3-642-00306-6\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KawaiTKYKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OtaYKTO07, author = {Haruki Ota and Kazuki Yoneyama and Shinsaku Kiyomoto and Toshiaki Tanaka and Kazuo Ohta}, title = {Universally Composable Hierarchical Hybrid Authenticated Key Exchange}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {139--151}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.139}, doi = {10.1093/IETFEC/E90-A.1.139}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OtaYKTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/YoneyamaOO07, author = {Kazuki Yoneyama and Haruki Ota and Kazuo Ohta}, editor = {Serdar Boztas and Hsiao{-}feng Lu}, title = {Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4851}, pages = {257--266}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77224-8\_30}, doi = {10.1007/978-3-540-77224-8\_30}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/YoneyamaOO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YoneyamaO07, author = {Kazuki Yoneyama and Kazuo Ohta}, editor = {Feng Bao and Steven Miller}, title = {Ring signatures: universally composable definitions and constructions}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {374--376}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229332}, doi = {10.1145/1229285.1229332}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YoneyamaO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TeradaYHO07, author = {Masayuki Terada and Kazuki Yoneyama and Sadayuki Hongo and Kazuo Ohta}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {Modeling Agreement Problems in the Universal Composability Framework}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {350--361}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_27}, doi = {10.1007/978-3-540-77048-0\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/TeradaYHO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IwamotoWYKO06, author = {Mitsugu Iwamoto and Lei Wang and Kazuki Yoneyama and Noboru Kunihiro and Kazuo Ohta}, title = {Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {5}, pages = {1382--1395}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.5.1382}, doi = {10.1093/IETFEC/E89-A.5.1382}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IwamotoWYKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.