Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kazuo Ohta
@article{DBLP:journals/ieiceta/AbeNWIO23, author = {Yoshiki Abe and Takeshi Nakai and Yohei Watanabe and Mitsugu Iwamoto and Kazuo Ohta}, title = {A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {3}, pages = {315--324}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022cip0021}, doi = {10.1587/TRANSFUN.2022CIP0021}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/AbeNWIO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakemureSSHO23, author = {Kaoru Takemure and Yusuke Sakai and Bagus Santoso and Goichiro Hanaoka and Kazuo Ohta}, title = {More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2023}, url = {https://eprint.iacr.org/2023/155}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/TakemureSSHO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/WatanabeNONLIO22, author = {Yohei Watanabe and Takeshi Nakai and Kazuma Ohara and Takuya Nojima and Yexuan Liu and Mitsugu Iwamoto and Kazuo Ohta}, title = {How to Make a Secure Index for Searchable Symmetric Encryption, Revisited}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {12}, pages = {1559--1577}, year = {2022}, url = {https://doi.org/10.1587/transfun.2021eap1163}, doi = {10.1587/TRANSFUN.2021EAP1163}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/WatanabeNONLIO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/NakaiSTIO22, author = {Takeshi Nakai and Satoshi Shirouchi and Yuuki Tokushige and Mitsugu Iwamoto and Kazuo Ohta}, title = {Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations}, journal = {New Gener. Comput.}, volume = {40}, number = {1}, pages = {95--113}, year = {2022}, url = {https://doi.org/10.1007/s00354-022-00153-7}, doi = {10.1007/S00354-022-00153-7}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/NakaiSTIO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/AbeNKSKWIO22, author = {Yoshiki Abe and Takeshi Nakai and Yoshihisa Kuroki and Shinnosuke Suzuki and Yuta Koga and Yohei Watanabe and Mitsugu Iwamoto and Kazuo Ohta}, title = {Efficient Card-Based Majority Voting Protocols}, journal = {New Gener. Comput.}, volume = {40}, number = {1}, pages = {173--198}, year = {2022}, url = {https://doi.org/10.1007/s00354-022-00161-7}, doi = {10.1007/S00354-022-00161-7}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/AbeNKSKWIO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/0001OIO22, author = {Yohei Watanabe and Kazuma Ohara and Mitsugu Iwamoto and Kazuo Ohta}, editor = {Anupam Joshi and Maribel Fern{\'{a}}ndez and Rakesh M. Verma}, title = {Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage}, booktitle = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022}, pages = {312--323}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3508398.3511521}, doi = {10.1145/3508398.3511521}, timestamp = {Wed, 20 Apr 2022 12:17:48 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/0001OIO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secitc/KomanoIOS22, author = {Yuichi Komano and Mitsugu Iwamoto and Kazuo Ohta and Kazuo Sakiyama}, editor = {Giampaolo Bella and Mihai Doinea and Helge Janicke}, title = {Lightweight Authentication Using Noisy Key Derived from Physically Unclonable Function}, booktitle = {Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8-9, 2022, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13809}, pages = {203--221}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-32636-3\_12}, doi = {10.1007/978-3-031-32636-3\_12}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secitc/KomanoIOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/TakemureSSHO21, author = {Kaoru Takemure and Yusuke Sakai and Bagus Santoso and Goichiro Hanaoka and Kazuo Ohta}, title = {Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {9}, pages = {1188--1205}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020dmp0023}, doi = {10.1587/TRANSFUN.2020DMP0023}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/TakemureSSHO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/NakaiMTIO21, author = {Takeshi Nakai and Yuto Misawa and Yuuki Tokushige and Mitsugu Iwamoto and Kazuo Ohta}, title = {How to Solve Millionaires' Problem with Two Kinds of Cards}, journal = {New Gener. Comput.}, volume = {39}, number = {1}, pages = {73--96}, year = {2021}, url = {https://doi.org/10.1007/s00354-020-00118-8}, doi = {10.1007/S00354-020-00118-8}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/NakaiMTIO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/WatanabeNONLIO21, author = {Yohei Watanabe and Takeshi Nakai and Kazuma Ohara and Takuya Nojima and Yexuan Liu and Mitsugu Iwamoto and Kazuo Ohta}, title = {How to Make a Secure Index for Searchable Symmetric Encryption, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {948}, year = {2021}, url = {https://eprint.iacr.org/2021/948}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/WatanabeNONLIO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/AbeIO20, author = {Yoshiki Abe and Mitsugu Iwamoto and Kazuo Ohta}, title = {How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020}, pages = {377--381}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/document/9366184}, timestamp = {Mon, 22 Mar 2021 15:48:59 +0100}, biburl = {https://dblp.org/rec/conf/isita/AbeIO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/UemuraWLMISO20, author = {Tomoki Uemura and Yohei Watanabe and Yang Li and Noriyuki Miura and Mitsugu Iwamoto and Kazuo Sakiyama and Kazuo Ohta}, title = {A Key Recovery Algorithm Using Random Key Leakage from {AES} Key Schedule}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020}, pages = {382--386}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/document/9366106}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/UemuraWLMISO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/TakemureSSHO20, author = {Kaoru Takemure and Yusuke Sakai and Bagus Santoso and Goichiro Hanaoka and Kazuo Ohta}, editor = {Khoa Nguyen and Wenling Wu and Kwok{-}Yan Lam and Huaxiong Wang}, title = {Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers}, booktitle = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12505}, pages = {65--84}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62576-4\_4}, doi = {10.1007/978-3-030-62576-4\_4}, timestamp = {Sat, 17 Dec 2022 21:30:21 +0100}, biburl = {https://dblp.org/rec/conf/provsec/TakemureSSHO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanaokaOSSTZ20, author = {Goichiro Hanaoka and Kazuo Ohta and Yusuke Sakai and Bagus Santoso and Kaoru Takemure and Yunlei Zhao}, title = {Cryptanalysis of Aggregate {\(\Gamma\)}-Signature and Practical Countermeasures in Application to Bitcoin}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1484}, year = {2020}, url = {https://eprint.iacr.org/2020/1484}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HanaokaOSSTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OharaWIO19, author = {Kazuma Ohara and Yohei Watanabe and Mitsugu Iwamoto and Kazuo Ohta}, title = {Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {9}, pages = {1079--1090}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.1079}, doi = {10.1587/TRANSFUN.E102.A.1079}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/OharaWIO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OharaEHIOS19, author = {Kazuma Ohara and Keita Emura and Goichiro Hanaoka and Ai Ishida and Kazuo Ohta and Yusuke Sakai}, title = {Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {9}, pages = {1101--1117}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.1101}, doi = {10.1587/TRANSFUN.E102.A.1101}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OharaEHIOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KomanoOSIV19, author = {Yuichi Komano and Kazuo Ohta and Kazuo Sakiyama and Mitsugu Iwamoto and Ingrid Verbauwhede}, title = {Single-Round Pattern Matching Key Generation Using Physically Unclonable Function}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1719585:1--1719585:13}, year = {2019}, url = {https://doi.org/10.1155/2019/1719585}, doi = {10.1155/2019/1719585}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KomanoOSIV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AbeIO19, author = {Yoshiki Abe and Mitsugu Iwamoto and Kazuo Ohta}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Efficient Private {PEZ} Protocols for Symmetric Functions}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {372--392}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_15}, doi = {10.1007/978-3-030-36030-6\_15}, timestamp = {Mon, 25 Nov 2019 13:58:16 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AbeIO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-02944, author = {A. J. Han Vinck and Kees A. Schouhamer Immink and Tadashi Wadayama and Van Khu Vu and Akiko Manada and Kui Cai and Shunsuke Horii and Yoshiki Abe and Mitsugu Iwamoto and Kazuo Ohta and Xingwei Zhong and Zhen Mei and Renfei Bu and Jos H. Weber and Vitaly Skachek and Hiroyoshi Morita and N. Hovhannisyan and Hiroshi Kamabe and Shan Lu and Hirosuke Yamamoto and Kengo Hashimoto and {\O}yvind Ytrehus and Shigeaki Kuzuoka and Mikihiko Nishiara and Han Mao Kiah and Jun Muramatsu and Shigeki Miyake}, title = {Proceedings of the 11th Asia-Europe Workshop on Concepts in Information Theory}, journal = {CoRR}, volume = {abs/1907.02944}, year = {2019}, url = {http://arxiv.org/abs/1907.02944}, eprinttype = {arXiv}, eprint = {1907.02944}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-02944.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeIO19, author = {Yoshiki Abe and Mitsugu Iwamoto and Kazuo Ohta}, title = {Efficient Private {PEZ} Protocols for Symmetric Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1069}, year = {2019}, url = {https://eprint.iacr.org/2019/1069}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeIO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/IwamotoOS18, author = {Mitsugu Iwamoto and Kazuo Ohta and Junji Shikata}, title = {Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography}, journal = {{IEEE} Trans. Inf. Theory}, volume = {64}, number = {1}, pages = {654--685}, year = {2018}, url = {https://doi.org/10.1109/TIT.2017.2744650}, doi = {10.1109/TIT.2017.2744650}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/IwamotoOS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/WatanabeKSKIO18, author = {Yohei Watanabe and Yoshihisa Kuroki and Shinnosuke Suzuki and Yuta Koga and Mitsugu Iwamoto and Kazuo Ohta}, title = {Card-Based Majority Voting Protocols with Three Inputs Using Three Cards}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2018, Singapore, October 28-31, 2018}, pages = {218--222}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ISITA.2018.8664324}, doi = {10.23919/ISITA.2018.8664324}, timestamp = {Wed, 11 Aug 2021 11:51:25 +0200}, biburl = {https://dblp.org/rec/conf/isita/WatanabeKSKIO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/NakaiSIO17, author = {Takeshi Nakai and Satoshi Shirouchi and Mitsugu Iwamoto and Kazuo Ohta}, editor = {Junji Shikata}, title = {Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {153--165}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_9}, doi = {10.1007/978-3-319-72089-0\_9}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/NakaiSIO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KawaiHOK16, author = {Yutaka Kawai and Goichiro Hanaoka and Kazuo Ohta and Noboru Kunihiro}, title = {A limitation on security evaluation of cryptographic primitives with fixed keys}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1663--1675}, year = {2016}, url = {https://doi.org/10.1002/sec.1457}, doi = {10.1002/SEC.1457}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KawaiHOK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SakaiESHO16, author = {Yusuke Sakai and Keita Emura and Jacob C. N. Schuldt and Goichiro Hanaoka and Kazuo Ohta}, title = {Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency}, journal = {Theor. Comput. Sci.}, volume = {630}, pages = {95--116}, year = {2016}, url = {https://doi.org/10.1016/j.tcs.2016.04.003}, doi = {10.1016/J.TCS.2016.04.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/SakaiESHO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/HayasakaKKHOI16, author = {Kenichiro Hayasaka and Yutaka Kawai and Yoshihiro Koseki and Takato Hirano and Kazuo Ohta and Mitsugu Iwamoto}, editor = {Sara Foresti and Giuseppe Persiano}, title = {Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {350--364}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_21}, doi = {10.1007/978-3-319-48965-0\_21}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/HayasakaKKHOI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/NakaiTMIO16, author = {Takeshi Nakai and Yuuki Tokushige and Yuto Misawa and Mitsugu Iwamoto and Kazuo Ohta}, editor = {Sara Foresti and Giuseppe Persiano}, title = {Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {500--517}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_30}, doi = {10.1007/978-3-319-48965-0\_30}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/NakaiTMIO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HiranoHKMIOSM16, author = {Takato Hirano and Mitsuhiro Hattori and Yutaka Kawai and Nori Matsuda and Mitsugu Iwamoto and Kazuo Ohta and Yusuke Sakai and Tatsuji Munaka}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {91--110}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_6}, doi = {10.1007/978-3-319-44524-3\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HiranoHKMIOSM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OharaEHIOS16, author = {Kazuma Ohara and Keita Emura and Goichiro Hanaoka and Ai Ishida and Kazuo Ohta and Yusuke Sakai}, title = {Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {477}, year = {2016}, url = {http://eprint.iacr.org/2016/477}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OharaEHIOS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YamamotoSIOTIT15, author = {Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh and Naoya Torii}, title = {A new method for enhancing variety and maintaining reliability of {PUF} responses and its evaluation on ASICs}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {3}, pages = {187--199}, year = {2015}, url = {https://doi.org/10.1007/s13389-014-0091-9}, doi = {10.1007/S13389-014-0091-9}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YamamotoSIOTIT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/EndoLHSOFNKDA15, author = {Sho Endo and Yang Li and Naofumi Homma and Kazuo Sakiyama and Kazuo Ohta and Daisuke Fujimoto and Makoto Nagata and Toshihiro Katashita and Jean{-}Luc Danger and Takafumi Aoki}, title = {A Silicon-Level Countermeasure Against Fault Sensitivity Analysis and Its Evaluation}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {23}, number = {8}, pages = {1429--1438}, year = {2015}, url = {https://doi.org/10.1109/TVLSI.2014.2339892}, doi = {10.1109/TVLSI.2014.2339892}, timestamp = {Wed, 11 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvlsi/EndoLHSOFNKDA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SakaiESHO15, author = {Yusuke Sakai and Keita Emura and Jacob C. N. Schuldt and Goichiro Hanaoka and Kazuo Ohta}, editor = {Ernest Foo and Douglas Stebila}, title = {Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {77--92}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_5}, doi = {10.1007/978-3-319-19962-7\_5}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SakaiESHO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14, author = {Christophe Clavier and Jean{-}Luc Danger and Guillaume Duc and M. Abdelaziz Elaabid and Beno{\^{\i}}t G{\'{e}}rard and Sylvain Guilley and Annelie Heuser and Michael Kasper and Yang Li and Victor Lomn{\'{e}} and Daisuke Nakatsu and Kazuo Ohta and Kazuo Sakiyama and Laurent Sauvage and Werner Schindler and Marc St{\"{o}}ttinger and Nicolas Veyrat{-}Charvillon and Matthieu Walle and Antoine Wurcker}, title = {Practical improvements of side-channel attacks on {AES:} feedback from the 2nd {DPA} contest}, journal = {J. Cryptogr. Eng.}, volume = {4}, number = {4}, pages = {259--274}, year = {2014}, url = {https://doi.org/10.1007/s13389-014-0075-9}, doi = {10.1007/S13389-014-0075-9}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/SakiyamaLGHIHAO14, author = {Kazuo Sakiyama and Yang Li and Shigeto Gomisawa and Yu{-}ichi Hayashi and Mitsugu Iwamoto and Naofumi Homma and Takafumi Aoki and Kazuo Ohta}, title = {Practical {DFA} Strategy for {AES} Under Limited-access Conditions}, journal = {J. Inf. Process.}, volume = {22}, number = {2}, pages = {142--151}, year = {2014}, url = {https://doi.org/10.2197/ipsjjip.22.142}, doi = {10.2197/IPSJJIP.22.142}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/SakiyamaLGHIHAO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NaitoYO14, author = {Yusuke Naito and Kazuki Yoneyama and Kazuo Ohta}, editor = {Ioana Boureanu and Philippe Owesarski and Serge Vaudenay}, title = {Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions}, booktitle = {Applied Cryptography and Network Security - 12th International Conference, {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8479}, pages = {235--252}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-07536-5\_15}, doi = {10.1007/978-3-319-07536-5\_15}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NaitoYO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/OharaOSY14, author = {Kazuma Ohara and Kazuo Ohta and Koutarou Suzuki and Kazuki Yoneyama}, editor = {David Pointcheval and Damien Vergnaud}, title = {Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {285--299}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_18}, doi = {10.1007/978-3-319-06734-6\_18}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/OharaOSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OharaSYIO14, author = {Kazuma Ohara and Yusuke Sakai and Fumiaki Yoshida and Mitsugu Iwamoto and Kazuo Ohta}, editor = {Keita Emura and Goichiro Hanaoka and Yunlei Zhao}, title = {Privacy-preserving smart metering with verifiability for both billing and energy management}, booktitle = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key Cryptography, June 3, 2014, Kyoto, Japan}, pages = {23--32}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600694.2600700}, doi = {10.1145/2600694.2600700}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OharaSYIO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SasakiTWIO14, author = {Yu Sasaki and Yuuki Tokushige and Lei Wang and Mitsugu Iwamoto and Kazuo Ohta}, editor = {Josh Benaloh}, title = {An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Gr{\o}stl}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {424--443}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_22}, doi = {10.1007/978-3-319-04852-9\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SasakiTWIO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/NishideIIO14, author = {Takashi Nishide and Mitsugu Iwamoto and Atsushi Iwasaki and Kazuo Ohta}, editor = {Moti Yung and Liehuang Zhu and Yanjiang Yang}, title = {Secure {(M+1)} st-Price Auction with Automatic Tie-Break}, booktitle = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing, China, December 16-17, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9473}, pages = {422--437}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-27998-5\_27}, doi = {10.1007/978-3-319-27998-5\_27}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/intrust/NishideIIO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/LumyongIO14, author = {Pichanee Lumyong and Mitsugu Iwamoto and Kazuo Ohta}, title = {Cheating on a visual secret sharing scheme under a realistic scenario}, booktitle = {International Symposium on Information Theory and its Applications, {ISITA} 2014, Melbourne, Australia, October 26-29, 2014}, pages = {575--579}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/document/6979909/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/LumyongIO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/IwamotoOKO14, author = {Mitsugu Iwamoto and Tsukasa Omino and Yuichi Komano and Kazuo Ohta}, title = {A new model of Client-Server Communications under information theoretic security}, booktitle = {2014 {IEEE} Information Theory Workshop, {ITW} 2014, Hobart, Tasmania, Australia, November 2-5, 2014}, pages = {511--515}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/ITW.2014.6970884}, doi = {10.1109/ITW.2014.6970884}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/IwamotoOKO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/LiMWOS14, author = {Yang Li and Shugo Mikami and Dai Watanabe and Kazuo Ohta and Kazuo Sakiyama}, editor = {Nai{-}Wei Lo and Yingjiu Li and Kuo{-}Hui Yeh}, title = {Single-Chip Implementation and Evaluation of Passive {UHF} {RFID} Tag with Hash-Based Mutual Authentication}, booktitle = {Radio Frequency Identification System Security - RFIDsec'14 Asia Workshop Proceedings, Hualien, Taiwan, November 27-28, 2014}, series = {Cryptology and Information Security Series}, volume = {12}, pages = {3--15}, publisher = {{IOS} Press}, year = {2014}, url = {https://doi.org/10.3233/978-1-61499-462-6-3}, doi = {10.3233/978-1-61499-462-6-3}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/LiMWOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/NaitoO14, author = {Yusuke Naito and Kazuo Ohta}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Improved Indifferentiable Security Analysis of {PHOTON}}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {340--357}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_20}, doi = {10.1007/978-3-319-10879-7\_20}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/NaitoO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/IwamotoOS14, author = {Mitsugu Iwamoto and Kazuo Ohta and Junji Shikata}, title = {Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography}, journal = {CoRR}, volume = {abs/1410.1120}, year = {2014}, url = {http://arxiv.org/abs/1410.1120}, eprinttype = {arXiv}, eprint = {1410.1120}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/IwamotoOS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HattoriHIMMSO13, author = {Mitsuhiro Hattori and Takato Hirano and Takashi Ito and Nori Matsuda and Takumi Mori and Yusuke Sakai and Kazuo Ohta}, title = {Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {53--67}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.53}, doi = {10.1587/TRANSFUN.E96.A.53}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HattoriHIMMSO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiOS13, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, title = {A New Type of Fault-Based Attack: Fault Behavior Analysis}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {177--184}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.177}, doi = {10.1587/TRANSFUN.E96.A.177}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/YamamotoSIOTI13, author = {Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Masahiko Takenaka and Kouichi Itoh}, title = {Variety enhancement of {PUF} responses using the locations of random outputting {RS} latches}, journal = {J. Cryptogr. Eng.}, volume = {3}, number = {4}, pages = {197--211}, year = {2013}, url = {https://doi.org/10.1007/s13389-012-0044-0}, doi = {10.1007/S13389-012-0044-0}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/YamamotoSIOTI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/LiEDHALDOS13, author = {Yang Li and Sho Endo and Nicolas Debande and Naofumi Homma and Takafumi Aoki and Thanh{-}Ha Le and Jean{-}Luc Danger and Kazuo Ohta and Kazuo Sakiyama}, editor = {Emmanuel Prouff}, title = {Exploring the Relations between Fault Sensitivity and Power Consumption}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 4th International Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7864}, pages = {137--153}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40026-1\_9}, doi = {10.1007/978-3-642-40026-1\_9}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/cosade/LiEDHALDOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/LiHMHAOS13, author = {Yang Li and Yu{-}ichi Hayashi and Arisa Matsubara and Naofumi Homma and Takafumi Aoki and Kazuo Ohta and Kazuo Sakiyama}, editor = {Jean{-}Luc Danger and Mourad Debbabi and Jean{-}Yves Marion and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Nur Zincir{-}Heywood}, title = {Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts}, booktitle = {Foundations and Practice of Security - 6th International Symposium, {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8352}, pages = {272--287}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-05302-8\_17}, doi = {10.1007/978-3-319-05302-8\_17}, timestamp = {Fri, 08 Dec 2023 07:53:07 +0100}, biburl = {https://dblp.org/rec/conf/fps/LiHMHAOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/SasakiKSWISO13, author = {Yu Sasaki and Wataru Komatsubara and Yasuhide Sakai and Lei Wang and Mitsugu Iwamoto and Kazuo Sakiyama and Kazuo Ohta}, editor = {Pierangela Samarati}, title = {Meet-in-the-Middle Preimage Attacks Revisited - New Results on {MD5} and {HAVAL}}, booktitle = {{SECRYPT} 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31 July, 2013}, pages = {111--122}, publisher = {SciTePress}, year = {2013}, url = {https://ieeexplore.ieee.org/document/7223160/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/SasakiKSWISO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangSKSO12, author = {Lei Wang and Yu Sasaki and Wataru Komatsubara and Kazuo Sakiyama and Kazuo Ohta}, title = {Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions {RIPEMD} and {RIPEMD-128}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {100--110}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.100}, doi = {10.1587/TRANSFUN.E95.A.100}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangSKSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiOS12, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, title = {Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {234--241}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.234}, doi = {10.1587/TRANSFUN.E95.A.234}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiOS12, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, title = {New Fault-Based Side-Channel Attack Using Fault Sensitivity}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {1}, pages = {88--97}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2011.2169666}, doi = {10.1109/TIFS.2011.2169666}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/SakiyamaLIO12, author = {Kazuo Sakiyama and Yang Li and Mitsugu Iwamoto and Kazuo Ohta}, title = {Information-Theoretic Approach to Optimal Differential Fault Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {7}, number = {1}, pages = {109--120}, year = {2012}, url = {https://doi.org/10.1109/TIFS.2011.2174984}, doi = {10.1109/TIFS.2011.2174984}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/SakiyamaLIO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvlsi/KnezevicKIMSKFKSSVOHA12, author = {Miroslav Knezevic and Kazuyuki Kobayashi and Jun Ikegami and Shin'ichiro Matsuo and Akashi Satoh and {\"{U}}nal Ko{\c{c}}abas and Junfeng Fan and Toshihiro Katashita and Takeshi Sugawara and Kazuo Sakiyama and Ingrid Verbauwhede and Kazuo Ohta and Naofumi Homma and Takafumi Aoki}, title = {Fair and Consistent Hardware Evaluation of Fourteen Round Two {SHA-3} Candidates}, journal = {{IEEE} Trans. Very Large Scale Integr. Syst.}, volume = {20}, number = {5}, pages = {827--840}, year = {2012}, url = {https://doi.org/10.1109/TVLSI.2011.2128353}, doi = {10.1109/TVLSI.2011.2128353}, timestamp = {Fri, 26 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvlsi/KnezevicKIMSKFKSSVOHA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SasakiWSSO12, author = {Yu Sasaki and Lei Wang and Yasuhide Sakai and Kazuo Sakiyama and Kazuo Ohta}, editor = {Aikaterini Mitrokotsa and Serge Vaudenay}, title = {Three-Subset Meet-in-the-Middle Attack on Reduced {XTEA}}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7374}, pages = {138--154}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31410-0\_9}, doi = {10.1007/978-3-642-31410-0\_9}, timestamp = {Sun, 02 Jun 2019 21:14:37 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SasakiWSSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiOS12, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {An Extension of Fault Sensitivity Analysis Based on Clockwise Collision}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {46--59}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_4}, doi = {10.1007/978-3-642-38519-3\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/EndoLHSOA12, author = {Sho Endo and Yang Li and Naofumi Homma and Kazuo Sakiyama and Kazuo Ohta and Takafumi Aoki}, editor = {Guido Bertoni and Benedikt Gierlichs}, title = {An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks}, booktitle = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven, Belgium, September 9, 2012}, pages = {95--102}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/FDTC.2012.12}, doi = {10.1109/FDTC.2012.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/EndoLHSOA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NakasoneLSIOS12, author = {Toshiki Nakasone and Yang Li and Yu Sasaki and Mitsugu Iwamoto and Kazuo Ohta and Kazuo Sakiyama}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {395--409}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_28}, doi = {10.1007/978-3-642-37682-5\_28}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/NakasoneLSIOS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KoyamaWSSO12, author = {Takuma Koyama and Lei Wang and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {New Truncated Differential Cryptanalysis on 3D Block Cipher}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {109--125}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_8}, doi = {10.1007/978-3-642-29101-2\_8}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/KoyamaWSSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/Sasaki0TSO12, author = {Yu Sasaki and Lei Wang and Yasuhiro Takasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Boomerang Distinguishers for Full {HAS-160} Compression Function}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {156--169}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_10}, doi = {10.1007/978-3-642-34117-5\_10}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/Sasaki0TSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/0007SSO12, author = {Lei Wang and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {170--181}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_11}, doi = {10.1007/978-3-642-34117-5\_11}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/0007SSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SakaiSEHO12, author = {Yusuke Sakai and Jacob C. N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {715--732}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_42}, doi = {10.1007/978-3-642-30057-8\_42}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SakaiSEHO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/TakahashiFGLSO12, author = {Junko Takahashi and Toshinori Fukunaga and Shigeto Gomisawa and Yang Li and Kazuo Sakiyama and Kazuo Ohta}, editor = {Marc Joye and Michael Tunstall}, title = {Fault Injection and Key Retrieval Experiments on an Evaluation Board}, booktitle = {Fault Analysis in Cryptography}, series = {Information Security and Cryptography}, pages = {313--331}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29656-7\_18}, doi = {10.1007/978-3-642-29656-7\_18}, timestamp = {Fri, 27 Mar 2020 08:31:50 +0100}, biburl = {https://dblp.org/rec/series/isc/TakahashiFGLSO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SakaiSEHO12, author = {Yusuke Sakai and Jacob C. N. Schuldt and Keita Emura and Goichiro Hanaoka and Kazuo Ohta}, title = {On the Security of Dynamic Group Signatures: Preventing Signature Hijacking}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2012}, url = {http://eprint.iacr.org/2012/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SakaiSEHO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NaitoYWO11, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, title = {Security of Cryptosystems Using Merkle-Damg{\aa}rd in the Random Oracle Model}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {57--70}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.57}, doi = {10.1587/TRANSFUN.E94.A.57}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NaitoYWO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SantosoOSH11, author = {Bagus Santoso and Kazuo Ohta and Kazuo Sakiyama and Goichiro Hanaoka}, title = {An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {92--103}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.92}, doi = {10.1587/TRANSFUN.E94.A.92}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/SantosoOSH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiSKO11, author = {Yang Li and Kazuo Sakiyama and Shin{-}ichi Kawamura and Kazuo Ohta}, title = {Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {191--199}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.191}, doi = {10.1587/TRANSFUN.E94.A.191}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiSKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SakaiOS11, author = {Fuminori Sakai and Kazuo Ohta and Kunio Sawaya}, title = {Ultra-Wideband Array Antenna Utilizing Novel Scanning System with Tapped Delay Lines for Short Range Radar}, journal = {{IEICE} Trans. Commun.}, volume = {94-B}, number = {5}, pages = {1194--1200}, year = {2011}, url = {https://doi.org/10.1587/transcom.E94.B.1194}, doi = {10.1587/TRANSCOM.E94.B.1194}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SakaiOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoneyamaTHO11, author = {Kazuki Yoneyama and Masayuki Terada and Sadayuki Hongo and Kazuo Ohta}, title = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {6}, pages = {1263--1273}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1263}, doi = {10.1587/TRANSFUN.E94.A.1263}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoneyamaTHO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SakaiHKO11, author = {Yusuke Sakai and Goichiro Hanaoka and Kaoru Kurosawa and Kazuo Ohta}, title = {How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {6}, pages = {1293--1305}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1293}, doi = {10.1587/TRANSFUN.E94.A.1293}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SakaiHKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/UshidaKYO11, author = {Mebae Ushida and Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta}, title = {Proxiable Designated Verifier Signature}, journal = {J. Inf. Process.}, volume = {19}, pages = {430--440}, year = {2011}, url = {https://doi.org/10.2197/ipsjjip.19.430}, doi = {10.2197/IPSJJIP.19.430}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jip/UshidaKYO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/IzuIKO11, author = {Tetsuya Izu and Masami Izumi and Noboru Kunihiro and Kazuo Ohta}, title = {Yet Another Sanitizable and Deletable Signatures}, booktitle = {25th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2011, Biopolis, Singapore, March 22-25, 2011}, pages = {574--579}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WAINA.2011.117}, doi = {10.1109/WAINA.2011.117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/IzuIKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/MoradiMPLOS11, author = {Amir Moradi and Oliver Mischke and Christof Paar and Yang Li and Kazuo Ohta and Kazuo Sakiyama}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {292--311}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_20}, doi = {10.1007/978-3-642-23951-9\_20}, timestamp = {Sat, 19 Oct 2019 20:26:25 +0200}, biburl = {https://dblp.org/rec/conf/ches/MoradiMPLOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/YamamotoSIOOTI11, author = {Dai Yamamoto and Kazuo Sakiyama and Mitsugu Iwamoto and Kazuo Ohta and Takao Ochiai and Masahiko Takenaka and Kouichi Itoh}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Uniqueness Enhancement of {PUF} Responses Based on the Locations of Random Outputting {RS} Latches}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {390--406}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_26}, doi = {10.1007/978-3-642-23951-9\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/YamamotoSIOOTI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/WangSKOS11, author = {Lei Wang and Yu Sasaki and Wataru Komatsubara and Kazuo Ohta and Kazuo Sakiyama}, editor = {Aggelos Kiayias}, title = {(Second) Preimage Attacks on Step-Reduced {RIPEMD/RIPEMD-128} with a New Local-Collision Approach}, booktitle = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6558}, pages = {197--212}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19074-2\_14}, doi = {10.1007/978-3-642-19074-2\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/WangSKOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HanataniOMSO11, author = {Yoshikazu Hanatani and Miyako Ohkubo and Shin'ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta}, editor = {George Danezis and Sven Dietrich and Kazue Sako}, title = {A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous {RFID} Authentication}, booktitle = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS} and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7126}, pages = {70--87}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29889-9\_7}, doi = {10.1007/978-3-642-29889-9\_7}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/HanataniOMSO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fdtc/SakamotoLOS11, author = {Hikaru Sakamoto and Yang Li and Kazuo Ohta and Kazuo Sakiyama}, editor = {Luca Breveglieri and Sylvain Guilley and Israel Koren and David Naccache and Junko Takahashi}, title = {Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems}, booktitle = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC} 2011, Tokyo, Japan, September 29, 2011}, pages = {11--20}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/FDTC.2011.17}, doi = {10.1109/FDTC.2011.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fdtc/SakamotoLOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/LiOS11, author = {Yang Li and Kazuo Ohta and Kazuo Sakiyama}, title = {Revisit fault sensitivity analysis on {WDDL-AES}}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {148--153}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5955013}, doi = {10.1109/HST.2011.5955013}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/LiOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/HattoriHIMMSO11, author = {Mitsuhiro Hattori and Takato Hirano and Takashi Ito and Nori Matsuda and Takumi Mori and Yusuke Sakai and Kazuo Ohta}, editor = {Liqun Chen}, title = {Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {190--209}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_12}, doi = {10.1007/978-3-642-25516-8\_12}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/HattoriHIMMSO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/IwamotoO11, author = {Mitsugu Iwamoto and Kazuo Ohta}, editor = {Alexander Kuleshov and Vladimir M. Blinovsky and Anthony Ephremides}, title = {Security notions for information theoretically secure encryptions}, booktitle = {2011 {IEEE} International Symposium on Information Theory Proceedings, {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011}, pages = {1777--1781}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISIT.2011.6033854}, doi = {10.1109/ISIT.2011.6033854}, timestamp = {Wed, 16 Oct 2019 14:14:48 +0200}, biburl = {https://dblp.org/rec/conf/isit/IwamotoO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SasakiTSO11, author = {Yu Sasaki and Naoyuki Takayanagi and Kazuo Sakiyama and Kazuo Ohta}, editor = {Tetsu Iwata and Masakatsu Nishigaki}, title = {Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity}, booktitle = {Advances in Information and Computer Security - 6th International Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7038}, pages = {178--192}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25141-2\_12}, doi = {10.1007/978-3-642-25141-2\_12}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SasakiTSO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NaitoYWO11, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Security of Practical Cryptosystems Using Merkle-Damg{\aa}rd Hash Function in the Ideal Cipher Model}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {281--296}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_20}, doi = {10.1007/978-3-642-24316-5\_20}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NaitoYWO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1106-1731, author = {Mitsugu Iwamoto and Kazuo Ohta}, title = {Security Notions for Information Theoretically Secure Encryptions}, journal = {CoRR}, volume = {abs/1106.1731}, year = {2011}, url = {http://arxiv.org/abs/1106.1731}, eprinttype = {arXiv}, eprint = {1106.1731}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1106-1731.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiNLOS11, author = {Yang Li and Daisuke Nakatsu and Qi Li and Kazuo Ohta and Kazuo Sakiyama}, title = {Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside Your Measurements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {579}, year = {2011}, url = {http://eprint.iacr.org/2011/579}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiNLOS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiWOAK10, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Kazumaro Aoki and Noboru Kunihiro}, title = {Practical Password Recovery Attacks on {MD4} Based Prefix and Hybrid Authentication Protocols}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {1}, pages = {84--92}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.84}, doi = {10.1587/TRANSFUN.E93.A.84}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiWOAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SakiyamaO10, author = {Kazuo Sakiyama and Kazuo Ohta}, title = {On Clock-Based Fault Analysis Attack for an {AES} Hardware Using {RSL}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {1}, pages = {172--179}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.172}, doi = {10.1587/TRANSFUN.E93.A.172}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SakiyamaO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangOSSK10, author = {Lei Wang and Kazuo Ohta and Yu Sasaki and Kazuo Sakiyama and Noboru Kunihiro}, title = {Cryptanalysis of Two MD5-Based Authentication Protocols: {APOP} and {NMAC}}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {5}, pages = {1087--1095}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.1087}, doi = {10.1587/TRANSINF.E93.D.1087}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangOSSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KawaiTKYOK10, author = {Yutaka Kawai and Shotaro Tanno and Takahiro Kondo and Kazuki Yoneyama and Kazuo Ohta and Noboru Kunihiro}, title = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {6}, pages = {1122--1131}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1122}, doi = {10.1587/TRANSFUN.E93.A.1122}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KawaiTKYOK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/UshidaITO10, author = {Mebae Ushida and Tetsuya Izu and Masahiko Takenaka and Kazuo Ohta}, title = {Multiple Designated Verifiers Signatures Reconsidered}, booktitle = {{ARES} 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland}, pages = {586--590}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ARES.2010.58}, doi = {10.1109/ARES.2010.58}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/UshidaITO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SasakiLWSO10, author = {Yu Sasaki and Yang Li and Lei Wang and Kazuo Sakiyama and Kazuo Ohta}, editor = {Masayuki Abe}, title = {Non-full-active Super-Sbox Analysis: Applications to {ECHO} and Gr{\o}stl}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6477}, pages = {38--55}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17373-8\_3}, doi = {10.1007/978-3-642-17373-8\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SasakiLWSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/LiSGFTO10, author = {Yang Li and Kazuo Sakiyama and Shigeto Gomisawa and Toshinori Fukunaga and Junko Takahashi and Kazuo Ohta}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Fault Sensitivity Analysis}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {320--334}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_22}, doi = {10.1007/978-3-642-15031-9\_22}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/LiSGFTO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/YoneyamaUO10, author = {Kazuki Yoneyama and Mebae Ushida and Kazuo Ohta}, editor = {Xuejia Lai and Moti Yung and Dongdai Lin}, title = {Rigorous Security Requirements for Designated Verifier Signatures}, booktitle = {Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6584}, pages = {318--335}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-21518-6\_22}, doi = {10.1007/978-3-642-21518-6\_22}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/YoneyamaUO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SantosoOSH10, author = {Bagus Santoso and Kazuo Ohta and Kazuo Sakiyama and Goichiro Hanaoka}, editor = {Josef Pieprzyk}, title = {Improving Efficiency of an `On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {284--301}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_20}, doi = {10.1007/978-3-642-11925-5\_20}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/SantosoOSH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/IzumiISO10, author = {Masami Izumi and Jun Ikegami and Kazuo Sakiyama and Kazuo Ohta}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {Improved countermeasure against Address-bit {DPA} for {ECC} scalar multiplication}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {981--984}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5456907}, doi = {10.1109/DATE.2010.5456907}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/IzumiISO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/LiSBNO10, author = {Yang Li and Kazuo Sakiyama and Lejla Batina and Daisuke Nakatsu and Kazuo Ohta}, editor = {Giovanni De Micheli and Bashir M. Al{-}Hashimi and Wolfgang M{\"{u}}ller and Enrico Macii}, title = {Power Variance Analysis breaks a masked {ASIC} implementation of {AES}}, booktitle = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany, March 8-12, 2010}, pages = {1059--1064}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/DATE.2010.5456966}, doi = {10.1109/DATE.2010.5456966}, timestamp = {Thu, 22 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/date/LiSBNO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/KobayashiISOKKFVGMHNS10, author = {Kazuyuki Kobayashi and Jun Ikegami and Kazuo Sakiyama and Kazuo Ohta and Miroslav Knezevic and {\"{U}}nal Ko{\c{c}}abas and Junfeng Fan and Ingrid Verbauwhede and Eric Xu Guo and Shin'ichiro Matsuo and Sinan Huang and Leyla Nazhandali and Akashi Satoh}, editor = {Jim Plusquellic and Ken Mai}, title = {Prototyping Platform for Performance Evaluation of {SHA-3} Candidates}, booktitle = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim Convention Center, California, {USA}}, pages = {60--63}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/HST.2010.5513111}, doi = {10.1109/HST.2010.5513111}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/KobayashiISOKKFVGMHNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/UshidaKYO10, author = {Mebae Ushida and Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta}, editor = {Mohammad S. Obaidat and George A. Tsihrintzis and Joaquim Filipe}, title = {Proxiable Designated Verifier Signature}, booktitle = {e-Business and Telecommunications - 7th International Joint Conference, {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {222}, pages = {220--232}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-25206-8\_14}, doi = {10.1007/978-3-642-25206-8\_14}, timestamp = {Sat, 19 Oct 2019 20:35:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/UshidaKYO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YoneyamaTHO10, author = {Kazuki Yoneyama and Masayuki Terada and Sadayuki Hongo and Kazuo Ohta}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, pages = {42--59}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, timestamp = {Thu, 15 Sep 2011 15:14:43 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YoneyamaTHO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SakaiHKO10, author = {Yusuke Sakai and Goichiro Hanaoka and Kaoru Kurosawa and Kazuo Ohta}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the {RO} Model}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {55--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_5}, doi = {10.1007/978-3-642-16825-3\_5}, timestamp = {Mon, 15 Jun 2020 17:00:57 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SakaiHKO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/HirotaIKO10, author = {Naoyuki Hirota and Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta}, editor = {Tomoya Enokido and Fatos Xhafa and Leonard Barolli and Makoto Takizawa and Minoru Uehara and Arjan Durresi}, title = {An Evaluation of the Sieving Device {YASD} for 1024-Bit Integers}, booktitle = {The 13th International Conference on Network-Based Information Systems, NBiS 2010, Takayama, Gifu, Japan, 14-16 September 2010}, pages = {546--551}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NBiS.2010.61}, doi = {10.1109/NBIS.2010.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/HirotaIKO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/UshidaOKY10, author = {Mebae Ushida and Kazuo Ohta and Yutaka Kawai and Kazuki Yoneyama}, editor = {Sokratis K. Katsikas and Pierangela Samarati}, title = {Proxiable Designated Verifier Signature}, booktitle = {{SECRYPT} 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {344--353}, publisher = {SciTePress}, year = {2010}, timestamp = {Fri, 07 Jan 2011 08:40:23 +0100}, biburl = {https://dblp.org/rec/conf/secrypt/UshidaOKY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/NakatsuLSO10, author = {Daisuke Nakatsu and Yang Li and Kazuo Sakiyama and Kazuo Ohta}, editor = {Yongwha Chung and Moti Yung}, title = {Combination of {SW} Countermeasure and {CPU} Modification on {FPGA} against Power Analysis}, booktitle = {Information Security Applications - 11th International Workshop, {WISA} 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6513}, pages = {258--272}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17955-6\_19}, doi = {10.1007/978-3-642-17955-6\_19}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/NakatsuLSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KobayashiIMSO10, author = {Kazuyuki Kobayashi and Jun Ikegami and Shin'ichiro Matsuo and Kazuo Sakiyama and Kazuo Ohta}, title = {Evaluation of Hardware Performance for the {SHA-3} Candidates Using {SASEBO-GII}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {10}, year = {2010}, url = {http://eprint.iacr.org/2010/010}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KobayashiIMSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiGSO10, author = {Yang Li and Shigeto Gomisawa and Kazuo Sakiyama and Kazuo Ohta}, title = {An Information Theoretic Perspective on the Differential Fault Analysis against {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2010}, url = {http://eprint.iacr.org/2010/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiGSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GomisawaLTFSSO10, author = {Shigeto Gomisawa and Yang Li and Junko Takahashi and Toshinori Fukunaga and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, title = {Efficient Differential Fault Analysis for {AES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {336}, year = {2010}, url = {http://eprint.iacr.org/2010/336}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GomisawaLTFSSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OhkuboMHSO10, author = {Miyako Ohkubo and Shin'ichiro Matsuo and Yoshikazu Hanatani and Kazuo Sakiyama and Kazuo Ohta}, title = {Robust {RFID} Authentication Protocol with Formal Proof and Its Feasibility}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2010}, url = {http://eprint.iacr.org/2010/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OhkuboMHSO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Ohta09, author = {Kazuo Ohta}, title = {Foreword}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {1--2}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1}, doi = {10.1587/TRANSFUN.E92.A.1}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Ohta09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishideYO09, author = {Takashi Nishide and Kazuki Yoneyama and Kazuo Ohta}, title = {Attribute-Based Encryption with Partially Hidden Ciphertext Policies}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {22--32}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.22}, doi = {10.1587/TRANSFUN.E92.A.22}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishideYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangOK09, author = {Lei Wang and Kazuo Ohta and Noboru Kunihiro}, title = {Near-Collision Attacks on {MD4:} Applied to MD4-Based Protocols}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {76--86}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.76}, doi = {10.1587/TRANSFUN.E92.A.76}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangOK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YajimaINSSPKO09, author = {Jun Yajima and Terutoshi Iwasaki and Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Thomas Peyrin and Noboru Kunihiro and Kazuo Ohta}, title = {A Strict Evaluation on the Number of Conditions for {SHA-1} Collision Search}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {87--95}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.87}, doi = {10.1587/TRANSFUN.E92.A.87}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YajimaINSSPKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiWOK09, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Noboru Kunihiro}, title = {Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {96--104}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.96}, doi = {10.1587/TRANSFUN.E92.A.96}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiWOK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SantosoO09, author = {Bagus Santoso and Kazuo Ohta}, title = {A New 'On the Fly' Identification Scheme: An Asymptoticity Trade-Off between {ZK} and Correctness}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {122--136}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.122}, doi = {10.1587/TRANSFUN.E92.A.122}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/SantosoO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoneyamaMO09, author = {Kazuki Yoneyama and Satoshi Miyagawa and Kazuo Ohta}, title = {Leaky Random Oracle}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {8}, pages = {1795--1807}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1795}, doi = {10.1587/TRANSFUN.E92.A.1795}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoneyamaMO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/IzumiSO09, author = {Masami Izumi and Kazuo Sakiyama and Kazuo Ohta}, title = {A New Approach for Implementing the {MPL} Method toward Higher {SPA} Resistance}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {181--186}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.61}, doi = {10.1109/ARES.2009.61}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/IzumiSO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/IzuKOST09, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Makoto Sano and Masahiko Takenaka}, title = {Yet Another Sanitizable Signature from Bilinear Maps}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {941--946}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.14}, doi = {10.1109/ARES.2009.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/IzuKOST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KomanoOMS09, author = {Yuichi Komano and Kazuo Ohta and Hideyuki Miyake and Atsushi Shimbo}, editor = {Michel Abdalla and David Pointcheval and Pierre{-}Alain Fouque and Damien Vergnaud}, title = {Algorithmic Tamper Proof {(ATP)} Counter Units for Authentication Devices Using {PIN}}, booktitle = {Applied Cryptography and Network Security, 7th International Conference, {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5536}, pages = {306--323}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01957-9\_19}, doi = {10.1007/978-3-642-01957-9\_19}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KomanoOMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NaitoYWO09, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, editor = {Mitsuru Matsui}, title = {How to Confirm Cryptosystems Security: The Original Merkle-Damg{\aa}rd Is Still Alive!}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {382--398}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_23}, doi = {10.1007/978-3-642-10366-7\_23}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/NaitoYWO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SakiyamaYO09, author = {Kazuo Sakiyama and Tatsuya Yagi and Kazuo Ohta}, editor = {Marc Fischlin}, title = {Fault Analysis Attack against an {AES} Prototype Chip Using {RSL}}, booktitle = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5473}, pages = {429--443}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00862-7\_29}, doi = {10.1007/978-3-642-00862-7\_29}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SakiyamaYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LiSKKO09, author = {Yang Li and Kazuo Sakiyama and Shin{-}ichi Kawamura and Yuichi Komano and Kazuo Ohta}, editor = {Sihan Qing and Chris J. Mitchell and Guilin Wang}, title = {Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform}, booktitle = {Information and Communications Security, 11th International Conference, {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5927}, pages = {3--16}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-11145-7\_3}, doi = {10.1007/978-3-642-11145-7\_3}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/LiSKKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/KawaiYO09, author = {Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Secret Handshake: Strong Anonymity Definition and Construction}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {219--229}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_20}, doi = {10.1007/978-3-642-00843-6\_20}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/KawaiYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WangSSO09, author = {Lei Wang and Yu Sasaki and Kazuo Sakiyama and Kazuo Ohta}, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Bit-Free Collision: Application to {APOP} Attack}, booktitle = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, pages = {3--21}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3\_2}, doi = {10.1007/978-3-642-04846-3\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/WangSSO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoYWO09, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, title = {How to Prove the Security of Practical Cryptosystems with Merkle-Damg{\aa}rd Hashing by Adopting Indifferentiability}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {40}, year = {2009}, url = {http://eprint.iacr.org/2009/040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoYWO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoYWO09a, author = {Yusuke Naito and Kazuki Yoneyama and Lei Wang and Kazuo Ohta}, title = {Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2009}, url = {http://eprint.iacr.org/2009/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoYWO09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawaiYO09, author = {Yutaka Kawai and Kazuki Yoneyama and Kazuo Ohta}, title = {Secret Handshake: Strong Anonymity Definition and Construction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {148}, year = {2009}, url = {http://eprint.iacr.org/2009/148}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawaiYO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoWO09, author = {Yusuke Naito and Lei Wang and Kazuo Ohta}, title = {How to Construct Cryptosystems and Hash Functions in Weakened Random Oracle Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {550}, year = {2009}, url = {http://eprint.iacr.org/2009/550}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoWO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NaitoOK08, author = {Yusuke Naito and Kazuo Ohta and Noboru Kunihiro}, title = {Improved Collision Search for Hash Functions: New Advanced Message Modification}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {46--54}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.46}, doi = {10.1093/IETFEC/E91-A.1.46}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NaitoOK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiWKO08, author = {Yu Sasaki and Lei Wang and Noboru Kunihiro and Kazuo Ohta}, title = {New Message Differences for Collision Attacks on {MD4} and {MD5}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {55--63}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.55}, doi = {10.1093/IETFEC/E91-A.1.55}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiWKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KomanoOSK08, author = {Yuichi Komano and Kazuo Ohta and Atsushi Shimbo and Shin{-}ichi Kawamura}, title = {Provably Secure Multisignatures in Formal Security Model and Their Optimality}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {107--118}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.107}, doi = {10.1093/IETFEC/E91-A.1.107}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KomanoOSK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SantosoKKO08, author = {Bagus Santoso and Noboru Kunihiro and Naoki Kanayama and Kazuo Ohta}, title = {Factorization of Square-Free Integers with High Bits Known}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {306--315}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.306}, doi = {10.1093/IETFEC/E91-A.1.306}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/SantosoKKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NishideYO08, author = {Takashi Nishide and Kazuki Yoneyama and Kazuo Ohta}, editor = {Steven M. Bellovin and Rosario Gennaro and Angelos D. Keromytis and Moti Yung}, title = {Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures}, booktitle = {Applied Cryptography and Network Security, 6th International Conference, {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5037}, pages = {111--129}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68914-0\_7}, doi = {10.1007/978-3-540-68914-0\_7}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/NishideYO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SasakiWOK08, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Noboru Kunihiro}, editor = {Serge Vaudenay}, title = {Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {290--307}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_20}, doi = {10.1007/978-3-540-68164-9\_20}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SasakiWOK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YajimaINSSKO08, author = {Jun Yajima and Terutoshi Iwasaki and Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {A strict evaluation method on the number of conditions for the {SHA-1} collision search}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {10--20}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368316}, doi = {10.1145/1368310.1368316}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YajimaINSSKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SasakiWOK08, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Noboru Kunihiro}, editor = {Tal Malkin}, title = {Security of {MD5} Challenge and Response: Extension of {APOP} Password Recovery Attack}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {1--18}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_1}, doi = {10.1007/978-3-540-79263-5\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SasakiWOK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangOK08, author = {Lei Wang and Kazuo Ohta and Noboru Kunihiro}, editor = {Nigel P. Smart}, title = {New Key-Recovery Attacks on {HMAC/NMAC-MD4} and {NMAC-MD5}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {237--253}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_14}, doi = {10.1007/978-3-540-78967-3\_14}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangOK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YoneyamaMO08, author = {Kazuki Yoneyama and Satoshi Miyagawa and Kazuo Ohta}, editor = {Joonsang Baek and Feng Bao and Kefei Chen and Xuejia Lai}, title = {Leaky Random Oracle (Extended Abstract)}, booktitle = {Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5324}, pages = {226--240}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88733-1\_16}, doi = {10.1007/978-3-540-88733-1\_16}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YoneyamaMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IzuKOST08, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Makoto Sano and Masahiko Takenaka}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Sanitizable and Deletable Signature}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {130--144}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_10}, doi = {10.1007/978-3-642-00306-6\_10}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IzuKOST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KawaiTKYKO08, author = {Yutaka Kawai and Shotaro Tanno and Takahiro Kondo and Kazuki Yoneyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {160--173}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_12}, doi = {10.1007/978-3-642-00306-6\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KawaiTKYKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiNKO07, author = {Yu Sasaki and Yusuke Naito and Noboru Kunihiro and Kazuo Ohta}, title = {Improved Collision Attacks on {MD4} and {MD5}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {36--47}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.36}, doi = {10.1093/IETFEC/E90-A.1.36}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiNKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KomanoOSK07, author = {Yuichi Komano and Kazuo Ohta and Atsushi Shimbo and Shin{-}ichi Kawamura}, title = {Toward the Fair Anonymous Signatures: Deniable Ring Signatures}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {54--64}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.54}, doi = {10.1093/IETFEC/E90-A.1.54}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KomanoOSK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OtaYKTO07, author = {Haruki Ota and Kazuki Yoneyama and Shinsaku Kiyomoto and Toshiaki Tanaka and Kazuo Ohta}, title = {Universally Composable Hierarchical Hybrid Authenticated Key Exchange}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {139--151}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.139}, doi = {10.1093/IETFEC/E90-A.1.139}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OtaYKTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishideO07, author = {Takashi Nishide and Kazuo Ohta}, title = {Constant-Round Multiparty Computation for Interval Test, Equality Test, and Comparison}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {5}, pages = {960--968}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.5.960}, doi = {10.1093/IETFEC/E90-A.5.960}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishideO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanataniKOK07, author = {Yoshikazu Hanatani and Yuichi Komano and Kazuo Ohta and Noboru Kunihiro}, title = {Provably Secure Untraceable Electronic Cash against Insider Attacks}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {5}, pages = {980--991}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.5.980}, doi = {10.1093/IETFEC/E90-A.5.980}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanataniKOK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/TakahashiKO07, author = {Yasuhiro Takahashi and Noboru Kunihiro and Kazuo Ohta}, title = {The quantum fourier transform on a linear nearest neighbor architecture}, journal = {Quantum Inf. Comput.}, volume = {7}, number = {4}, pages = {383--391}, year = {2007}, url = {https://doi.org/10.26421/QIC7.4-7}, doi = {10.26421/QIC7.4-7}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/TakahashiKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaecc/YoneyamaOO07, author = {Kazuki Yoneyama and Haruki Ota and Kazuo Ohta}, editor = {Serdar Boztas and Hsiao{-}feng Lu}, title = {Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks}, booktitle = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4851}, pages = {257--266}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77224-8\_30}, doi = {10.1007/978-3-540-77224-8\_30}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/aaecc/YoneyamaOO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07, author = {Jun Yajima and Yu Sasaki and Yusuke Naito and Terutoshi Iwasaki and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {A New Strategy for Finding a Differential Path of {SHA-1}}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {45--58}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_4}, doi = {10.1007/978-3-540-73458-1\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YajimaSNISKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YoneyamaO07, author = {Kazuki Yoneyama and Kazuo Ohta}, editor = {Feng Bao and Steven Miller}, title = {Ring signatures: universally composable definitions and constructions}, booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007}, pages = {374--376}, publisher = {{ACM}}, year = {2007}, url = {https://doi.org/10.1145/1229285.1229332}, doi = {10.1145/1229285.1229332}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YoneyamaO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SasakiWOK07, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Noboru Kunihiro}, editor = {Alex Biryukov}, title = {New Message Difference for {MD4}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {329--348}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_21}, doi = {10.1007/978-3-540-74619-5\_21}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/SasakiWOK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/TeradaYHO07, author = {Masayuki Terada and Kazuki Yoneyama and Sadayuki Hongo and Kazuo Ohta}, editor = {Sihan Qing and Hideki Imai and Guilin Wang}, title = {Modeling Agreement Problems in the Universal Composability Framework}, booktitle = {Information and Communications Security, 9th International Conference, {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4861}, pages = {350--361}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77048-0\_27}, doi = {10.1007/978-3-540-77048-0\_27}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/TeradaYHO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/IzuKOTY07, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Masahiko Takenaka and Takashi Yoshioka}, editor = {Ed Dawson and Duncan S. Wong}, title = {A Sanitizable Signature Scheme with Aggregation}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {51--64}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_6}, doi = {10.1007/978-3-540-72163-5\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/IzuKOTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NishideO07, author = {Takashi Nishide and Kazuo Ohta}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {343--360}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_23}, doi = {10.1007/978-3-540-71677-8\_23}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NishideO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KomanoO06, author = {Yuichi Komano and Kazuo Ohta}, title = {Taxonomical Security Consideration of {OAEP} Variants}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {5}, pages = {1233--1245}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.5.1233}, doi = {10.1093/IETFEC/E89-A.5.1233}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KomanoO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IwamotoWYKO06, author = {Mitsugu Iwamoto and Lei Wang and Kazuki Yoneyama and Noboru Kunihiro and Kazuo Ohta}, title = {Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {5}, pages = {1382--1395}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.5.1382}, doi = {10.1093/IETFEC/E89-A.5.1382}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IwamotoWYKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KunihiroAO06, author = {Noboru Kunihiro and Wataru Abe and Kazuo Ohta}, title = {Maurer-Yacobi ID-Based Key Distribution Revisited}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {5}, pages = {1421--1424}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.5.1421}, doi = {10.1093/IETFEC/E89-A.5.1421}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KunihiroAO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/WatanabeSRTMROFNM06, author = {Manabu Watanabe and Masanobu Shimada and Ake Rosenqvist and Takeo Tadono and Masayuki Matsuoka and Shakil Ahmad Romshoo and Kazuo Ohta and Ryoichi Furuta and Kazuki Nakamura and Toshifumi Moriyama}, title = {Forest Structure Dependency of the Relation Between L-Band Sigma \({}^{\mbox{0}}\) and Biophysical Parameters}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {44}, number = {11-1}, pages = {3154--3165}, year = {2006}, url = {https://doi.org/10.1109/TGRS.2006.880632}, doi = {10.1109/TGRS.2006.880632}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgrs/WatanabeSRTMROFNM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NaitoSSYKO06, author = {Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta}, editor = {Xuejia Lai and Kefei Chen}, title = {Improved Collision Search for {SHA-0}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {21--36}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_2}, doi = {10.1007/11935230\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/NaitoSSYKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MamboSOK06, author = {Masahiro Mambo and Mois{\'{e}}s Salinas{-}Rosales and Kazuo Ohta and Noboru Kunihiro}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Problems on the {MR} micropayment schemes}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {363}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128879}, doi = {10.1145/1128817.1128879}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MamboSOK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KomanoOSK06, author = {Yuichi Komano and Kazuo Ohta and Atsushi Shimbo and Shin{-}ichi Kawamura}, editor = {David Pointcheval}, title = {Toward the Fair Anonymous Signatures: Deniable Ring Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {174--191}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_12}, doi = {10.1007/11605805\_12}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KomanoOSK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HanataniKOK06, author = {Yoshikazu Hanatani and Yuichi Komano and Kazuo Ohta and Noboru Kunihiro}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Provably Secure Electronic Cash Based on Blind Multisignature Schemes}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {236--250}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_20}, doi = {10.1007/11889663\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/HanataniKOK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/KomanoOSK06, author = {Yuichi Komano and Kazuo Ohta and Atsushi Shimbo and Shin{-}ichi Kawamura}, editor = {Sokratis K. Katsikas and Javier L{\'{o}}pez and Michael Backes and Stefanos Gritzalis and Bart Preneel}, title = {Formal Security Model of Multisignatures}, booktitle = {Information Security, 9th International Conference, {ISC} 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4176}, pages = {146--160}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11836810\_11}, doi = {10.1007/11836810\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/KomanoOSK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/SantosoKKO06, author = {Bagus Santoso and Noboru Kunihiro and Naoki Kanayama and Kazuo Ohta}, editor = {Phong Q. Nguyen}, title = {Factorization of Square-Free Integers with High Bits Known}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {115--130}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_8}, doi = {10.1007/11958239\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vietcrypt/SantosoKKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/SasakiNYSKO06, author = {Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Phong Q. Nguyen}, title = {How to Construct Sufficient Conditions for Hash Functions}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {243--259}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_16}, doi = {10.1007/11958239\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vietcrypt/SasakiNYSKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoSSYKO06, author = {Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta}, title = {Message Modification for Step 21-23 on {SHA-0}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2006}, url = {http://eprint.iacr.org/2006/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoSSYKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasakiNYSKO06, author = {Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, title = {How to Construct Sufficient Condition in Searching Collisions of {MD5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2006}, url = {http://eprint.iacr.org/2006/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasakiNYSKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AdachiAKO05, author = {Norio Adachi and Satoshi Aoki and Yuichi Komano and Kazuo Ohta}, title = {Solutions to Security Problems of Rivest and Shamir's PayWord Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {195--202}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_195\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AdachiAKO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NaitoSKO05, author = {Yusuke Naito and Yu Sasaki and Noboru Kunihiro and Kazuo Ohta}, editor = {Dongho Won and Seungjoo Kim}, title = {Improved Collision Attack on {MD4} with Probability Almost 1}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {129--145}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_12}, doi = {10.1007/11734727\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/NaitoSKO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/KomanoOSK05, author = {Yuichi Komano and Kazuo Ohta and Atsushi Shimbo and Shin{-}ichi Kawamura}, editor = {Ed Dawson and Serge Vaudenay}, title = {On the Security of Probabilistic Multisignature Schemes and Their Optimality}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {132--150}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_10}, doi = {10.1007/11554868\_10}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/KomanoOSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IzuKOS05, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Takeshi Shimoyama}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {232--242}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_18}, doi = {10.1007/11604938\_18}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IzuKOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoSKO05, author = {Yusuke Naito and Yu Sasaki and Noboru Kunihiro and Kazuo Ohta}, title = {Improved Collision Attack on {MD4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2005}, url = {http://eprint.iacr.org/2005/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoSKO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasakiNKO05, author = {Yu Sasaki and Yusuke Naito and Noboru Kunihiro and Kazuo Ohta}, title = {Improved Collision Attack on {MD5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2005}, url = {http://eprint.iacr.org/2005/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasakiNKO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KomanoO04, author = {Yuichi Komano and Kazuo Ohta}, title = {{OAEP-ES} - Methodology of Universal Padding Technique}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {110--119}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_110\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KomanoO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KomanoO04, author = {Yuichi Komano and Kazuo Ohta}, editor = {Javier L{\'{o}}pez and Sihan Qing and Eiji Okamoto}, title = {Taxonomic Consideration to {OAEP} Variants and Their Security}, booktitle = {Information and Communications Security, 6th International Conference, {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3269}, pages = {105--117}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30191-2\_9}, doi = {10.1007/978-3-540-30191-2\_9}, timestamp = {Thu, 29 Aug 2019 08:10:01 +0200}, biburl = {https://dblp.org/rec/conf/icics/KomanoO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/WatanabeSRROTMF04, author = {Manabu Watanabe and Masanobu Shimada and Ake Rosenqvist and Shakil Ahmad Romshoo and Kazuo Ohta and Takeo Tadono and Masayuki Matsuoka and Ryoichi Furuta}, title = {Tight correlations between forest parameters and backscattering coefficient derived by the L-band airborne {SAR} (PiSAR)}, booktitle = {2004 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2004, Anchorage, Alaska, USA, 20-24 September 2004}, pages = {2340--2343}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/IGARSS.2004.1369755}, doi = {10.1109/IGARSS.2004.1369755}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/igarss/WatanabeSRROTMF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KomanoO04, author = {Yuichi Komano and Kazuo Ohta}, title = {Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {2}, year = {2004}, url = {http://eprint.iacr.org/2004/002}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KomanoO04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/OhtaNOK03, author = {Kazuo Ohta and Tetsuo Nishino and Seiya Okubo and Noboru Kunihiro}, title = {A Quantum Algorithm Using {NMR} Computers to Break Secret-Key Cryptosystems}, journal = {New Gener. Comput.}, volume = {21}, number = {4}, pages = {347--361}, year = {2003}, url = {https://doi.org/10.1007/BF03037309}, doi = {10.1007/BF03037309}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/OhtaNOK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KomanoO03, author = {Yuichi Komano and Kazuo Ohta}, editor = {Dan Boneh}, title = {Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {366--382}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_22}, doi = {10.1007/978-3-540-45146-4\_22}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KomanoO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wecwis/AdachiKAO03, author = {Norio Adachi and Yuichi Komano and Satoshi Aoki and Kazuo Ohta}, title = {The Security Problems of Rivest and Shamir's PayWord Scheme}, booktitle = {2003 {IEEE} International Conference on Electronic Commerce {(CEC} 2003), 24-27 June 2003, Newport Beach, CA, {USA}}, pages = {20--23}, publisher = {{IEEE} Computer Society}, year = {2003}, url = {https://doi.org/10.1109/COEC.2003.1210226}, doi = {10.1109/COEC.2003.1210226}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wecwis/AdachiKAO03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MicaliOR01, author = {Silvio Micali and Kazuo Ohta and Leonid Reyzin}, editor = {Michael K. Reiter and Pierangela Samarati}, title = {Accountable-subgroup multisignatures: extended abstract}, booktitle = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001}, pages = {245--254}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/501983.502017}, doi = {10.1145/501983.502017}, timestamp = {Tue, 10 Nov 2020 20:00:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MicaliOR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OhtaO98, author = {Kazuo Ohta and Tatsuaki Okamoto}, editor = {Hugo Krawczyk}, title = {On Concrete Security Treatment of Signatures Derived from Identification}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {354--369}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055741}, doi = {10.1007/BFB0055741}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OhtaO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KandaTAO98, author = {Masayuki Kanda and Youichi Takashima and Tsutomu Matsumoto and Kazumaro Aoki and Kazuo Ohta}, editor = {Stafford E. Tavares and Henk Meijer}, title = {A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis}, booktitle = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1556}, pages = {264--279}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-48892-8\_21}, doi = {10.1007/3-540-48892-8\_21}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KandaTAO98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/1998, editor = {Kazuo Ohta and Dingyi Pei}, title = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1}, doi = {10.1007/3-540-49649-1}, isbn = {3-540-65109-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/1998.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/KanekoMO97, author = {Yasuyoshi Kaneko and Shiho Moriai and Kazuo Ohta}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {On strict estimation method of provable security against differential and linear cryptanalysis}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {258--268}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028481}, doi = {10.1007/BFB0028481}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/KanekoMO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Ohta97, author = {Kazuo Ohta}, editor = {Eiji Okamoto and George I. Davida and Masahiro Mambo}, title = {Remarks on Blind Decryption}, booktitle = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi, Japan, September 17-19, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1396}, pages = {109--115}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0030413}, doi = {10.1007/BFB0030413}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/Ohta97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OhtaMA95, author = {Kazuo Ohta and Shiho Moriai and Kazumaro Aoki}, editor = {Don Coppersmith}, title = {Improving the Search Algorithm for the Best Linear Expression}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {157--170}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_13}, doi = {10.1007/3-540-44750-4\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OhtaMA95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/OkamotoO94, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Dorothy E. Denning and Raymond Pyle and Ravi Ganesan and Ravi S. Sandhu}, title = {How to Simultaneously Exchange Secrets by General Assumptions}, booktitle = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994}, pages = {184--192}, publisher = {{ACM}}, year = {1994}, url = {https://doi.org/10.1145/191177.191221}, doi = {10.1145/191177.191221}, timestamp = {Tue, 10 Nov 2020 20:00:24 +0100}, biburl = {https://dblp.org/rec/conf/ccs/OkamotoO94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OhtaA94, author = {Kazuo Ohta and Kazumaro Aoki}, editor = {Yvo Desmedt}, title = {Linear Cryptanalysis of the Fast Data Encipherment Algorithm}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {12--16}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_2}, doi = {10.1007/3-540-48658-5\_2}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OhtaA94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OhtaM93, author = {Kazuo Ohta and Mitsuru Matsui}, editor = {Douglas R. Stinson}, title = {Differential Attack on Message Authentication Codes}, booktitle = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {773}, pages = {200--211}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48329-2\_18}, doi = {10.1007/3-540-48329-2\_18}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OhtaM93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FujiokaOO92, author = {Atsushi Fujioka and Tatsuaki Okamoto and Kazuo Ohta}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {A Practical Secret Voting Scheme for Large Scale Elections}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {244--251}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_66}, doi = {10.1007/3-540-57220-1\_66}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FujiokaOO92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OhtaOF92, author = {Kazuo Ohta and Tatsuaki Okamoto and Atsushi Fujioka}, editor = {Rainer A. Rueppel}, title = {Secure Bit Commitment Function against Divertibility}, booktitle = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonf{\"{u}}red, Hungary, May 24-28, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {658}, pages = {324--340}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-47555-9\_27}, doi = {10.1007/3-540-47555-9\_27}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OhtaOF92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OhtaO91, author = {Kazuo Ohta and Tatsuaki Okamoto}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {139--148}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_11}, doi = {10.1007/3-540-57332-1\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OhtaO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MoritaOM91, author = {Hikaru Morita and Kazuo Ohta and Shoji Miyaguchi}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {Results of Switching-Closure-Test on {FEAL} (Extended Abstract)}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {247--252}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_20}, doi = {10.1007/3-540-57332-1\_20}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MoritaOM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MoritaOM91, author = {Hikaru Morita and Kazuo Ohta and Shoji Miyaguchi}, editor = {Joan Feigenbaum}, title = {A Switching Closure Test to Analyze Cryptosystems}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {183--193}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_13}, doi = {10.1007/3-540-46766-1\_13}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MoritaOM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoO91, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Joan Feigenbaum}, title = {Universal Electronic Cash}, booktitle = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {576}, pages = {324--337}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46766-1\_27}, doi = {10.1007/3-540-46766-1\_27}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoCO91, author = {Tatsuaki Okamoto and David Chaum and Kazuo Ohta}, editor = {Donald W. Davies}, title = {Direct Zero Knowledge Proofs of Computational Power in Five Rounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {96--105}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_8}, doi = {10.1007/3-540-46416-6\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoCO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FujiokaOO91, author = {Atsushi Fujioka and Tatsuaki Okamoto and Kazuo Ohta}, editor = {Donald W. Davies}, title = {Interactive Bi-Proof Systems and Undeniable Signature Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {547}, pages = {243--256}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-46416-6\_21}, doi = {10.1007/3-540-46416-6\_21}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FujiokaOO91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/KoyamaO90, author = {Kenji Koyama and Kazuo Ohta}, title = {Identity-based conference key distribution systems}, journal = {Syst. Comput. Jpn.}, volume = {21}, number = {1}, pages = {60--67}, year = {1990}, url = {https://doi.org/10.1002/scj.4690210106}, doi = {10.1002/SCJ.4690210106}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/KoyamaO90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OhtaK90, author = {Kazuo Ohta and Kenji Koyama}, editor = {Jennifer Seberry and Josef Pieprzyk}, title = {Meet-in-the-Middle Attack on Digital Signature Schemes}, booktitle = {Advances in Cryptology - {AUSCRYPT} '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {453}, pages = {140--154}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/BFb0030357}, doi = {10.1007/BFB0030357}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OhtaK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoO90, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {How to Utilize the Randomness of Zero-Knowledge Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {456--475}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_33}, doi = {10.1007/3-540-38424-3\_33}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoO90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MiyaguchiOI90, author = {Shoji Miyaguchi and Kazuo Ohta and Masahiko Iwata}, editor = {Ivan Damg{\aa}rd}, title = {Confirmation that Some Hash Functions Are Not Collision Free}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {326--343}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_30}, doi = {10.1007/3-540-46877-3\_30}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MiyaguchiOI90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OhtaOK90, author = {Kazuo Ohta and Tatsuaki Okamoto and Kenji Koyama}, editor = {Ivan Damg{\aa}rd}, title = {Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {446--457}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_40}, doi = {10.1007/3-540-46877-3\_40}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OhtaOK90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkamotoO89, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Gilles Brassard}, title = {Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash}, booktitle = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {435}, pages = {481--496}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/0-387-34805-0\_43}, doi = {10.1007/0-387-34805-0\_43}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkamotoO89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OkamotoO89, author = {Tatsuaki Okamoto and Kazuo Ohta}, editor = {Jean{-}Jacques Quisquater and Joos Vandewalle}, title = {Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility}, booktitle = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {434}, pages = {134--148}, publisher = {Springer}, year = {1989}, url = {https://doi.org/10.1007/3-540-46885-4\_16}, doi = {10.1007/3-540-46885-4\_16}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OkamotoO89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OhtaO88, author = {Kazuo Ohta and Tatsuaki Okamoto}, editor = {Shafi Goldwasser}, title = {A Modification of the Fiat-Shamir Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {403}, pages = {232--243}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/0-387-34799-2\_17}, doi = {10.1007/0-387-34799-2\_17}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OhtaO88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KoyamaO88, author = {Kenji Koyama and Kazuo Ohta}, editor = {Christoph G. G{\"{u}}nther}, title = {Security of Improved Identity-Based Conference Key Distribution Systems}, booktitle = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {330}, pages = {11--19}, publisher = {Springer}, year = {1988}, url = {https://doi.org/10.1007/3-540-45961-8\_2}, doi = {10.1007/3-540-45961-8\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KoyamaO88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KoyamaO87, author = {Kenji Koyama and Kazuo Ohta}, editor = {Carl Pomerance}, title = {Identity-based Conference Key Distribution Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory and Applications of Cryptographic Techniques, Santa Barbara, California, USA, August 16-20, 1987, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {293}, pages = {175--184}, publisher = {Springer}, year = {1987}, url = {https://doi.org/10.1007/3-540-48184-2\_13}, doi = {10.1007/3-540-48184-2\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KoyamaO87.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.