Kazuo Ohta

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Multi-user dynamic searchable encryption for prefix-fixing predicates from symmetric-key primitives2025-06-17Paper
Achieving pairing-free aggregate signatures using pre-communication between signers2023-03-21Paper
Efficient private PEZ protocols for symmetric functions2020-04-30Paper
Probabilistic generation of trapdoors: reducing information leakage of searchable symmetric encryption2018-10-26Paper
Efficient card-based cryptographic protocols for millionaires' problem utilizing private permutations2018-10-26Paper
Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes2018-10-24Paper
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
IEEE Transactions on Information Theory
2018-06-27Paper
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations2018-03-16Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
Theoretical Computer Science
2016-05-02Paper
Dynamic threshold public-key encryption with decryption consistency from static assumptions
Information Security and Privacy
2015-10-20Paper
Improved Indifferentiable Security Analysis of PHOTON
Lecture Notes in Computer Science
2014-10-14Paper
Factorization of Square-Free Integers with High Bits Known
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
How to construct sufficient conditions for hash functions
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Reset indifferentiability from weakened random oracle salvages one-pass hash functions
Applied Cryptography and Network Security
2014-07-07Paper
Constant rounds almost linear complexity multi-party computation for prefix sum
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
An automated evaluation tool for improved rebound attack: new distinguishers and proposals of shiftbytes parameters for Grøstl
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
Lecture Notes in Computer Science
2013-06-04Paper
An extension of fault sensitivity analysis based on clockwise collision
Information Security and Cryptology
2013-05-28Paper
Boomerang distinguishers for full HAS-160 compression function
Advances in Information and Computer Security
2013-04-04Paper
Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function
Advances in Information and Computer Security
2013-04-04Paper
Three-subset meet-in-the-middle attack on reduced XTEA
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Public Key Cryptography – PKC 2012
2012-07-20Paper
New truncated differential cryptanalysis on 3D block cipher
Information Security Practice and Experience
2012-06-29Paper
Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
Cryptography and Coding
2011-12-16Paper
Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
Advances in Information and Computer Security
2011-11-10Paper
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model
Provable Security
2011-09-16Paper
Rigorous security requirements for designated verifier signatures
Information Security and Cryptology
2011-07-29Paper
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
How to confirm cryptosystems security: the original Merkle-Damgård is still alive!
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Bit-Free Collision: Application to APOP Attack
Advances in Information and Computer Security
2009-10-28Paper
Fault Analysis Attack against an AES Prototype Chip Using RSL
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
A New Strategy for Finding a Differential Path of SHA-1
Information Security and Privacy
2009-03-06Paper
Sanitizable and Deletable Signature
Information Security Applications
2009-02-24Paper
Leaky Random Oracle (Extended Abstract)
Provable Security
2009-01-27Paper
New Message Difference for MD4
Fast Software Encryption
2008-09-16Paper
Provably Secure Electronic Cash Based on Blind Multisignature Schemes
Financial Cryptography and Data Security
2008-09-09Paper
Formal Security Model of Multisignatures
Lecture Notes in Computer Science
2008-06-17Paper
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
Applied Cryptography and Network Security
2008-06-13Paper
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Improved Collision Search for SHA-0
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
Public Key Cryptography – PKC 2007
2007-09-04Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
A quantum algorithm using NMR computers to break secret-key cryptosystems
New Generation Computing
2004-09-22Paper
scientific article; zbMATH DE number 1406762 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1304124 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1304286 (Why is no real title available?)1999-10-06Paper
scientific article; zbMATH DE number 1302859 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1107693 (Why is no real title available?)1998-02-16Paper
A practical secret voting scheme for large scale elections
Advances in Cryptology — AUSCRYPT '92
1998-01-14Paper
scientific article; zbMATH DE number 1030989 (Why is no real title available?)1997-08-24Paper
scientific article; zbMATH DE number 1024057 (Why is no real title available?)1997-06-18Paper
scientific article; zbMATH DE number 697816 (Why is no real title available?)1995-11-28Paper
scientific article; zbMATH DE number 697807 (Why is no real title available?)1994-11-30Paper
How to Utilize the Randomness of Zero-Knowledge Proofs
Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings
1994-03-07Paper
scientific article; zbMATH DE number 503348 (Why is no real title available?)1994-02-22Paper
scientific article; zbMATH DE number 177045 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 176549 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177055 (Why is no real title available?)1993-05-18Paper
Universal Electronic Cash
Advances in Cryptology — CRYPTO ’91
1993-05-18Paper
Interactive Bi-Proof Systems and Undeniable Signature Schemes
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
Direct Zero Knowledge Proofs of Computational Power in Five Rounds
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 4172376 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4211487 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4191110 (Why is no real title available?)1990-01-01Paper


Research outcomes over time


This page was built for person: Kazuo Ohta