Kazukuni Kobara

From MaRDI portal
Person:1009059



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
How to Strengthen the Security of RSA-OAEP
IEEE Transactions on Information Theory
2017-07-27Paper
Code-based public-key cryptosystems and their applications
Lecture Notes in Computer Science
2010-09-29Paper
Very-efficient anonymous password-authenticated key exchange and its extensions
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2010-01-14Paper
Efficient constructions of deterministic encryption from hybrid encryption and code-based PKE
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2010-01-14Paper
Leakage-resilient authenticated key establishment protocols
Lecture Notes in Computer Science
2010-01-05Paper
Advances in Cryptology - ASIACRYPT 2003
Lecture Notes in Computer Science
2010-01-05Paper
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange
Public Key Infrastructure
2009-04-23Paper
Semantic security for the McEliece cryptosystem without random oracles
Designs, Codes and Cryptography
2009-03-31Paper
Coding-Based Oblivious Transfer
Mathematical Methods in Computer Science
2009-01-22Paper
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem
IEEE Transactions on Information Theory
2008-12-21Paper
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC
IEEE Transactions on Information Theory
2008-12-21Paper
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol
Advances in Information and Computer Security
2008-07-25Paper
An Authentication and Key Exchange Protocol for Secure Credential Services
Lecture Notes in Computer Science
2008-06-17Paper
On the Key-Privacy Issue of McEliece Public-Key Encryption
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA
Applied Cryptography and Network Security
2007-09-24Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Topics in Cryptology – CT-RSA 2005
Lecture Notes in Computer Science
2005-12-08Paper
scientific article; zbMATH DE number 2085434 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2081066 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 1759325 (Why is no real title available?)2003-02-14Paper
scientific article; zbMATH DE number 1618037 (Why is no real title available?)2002-07-22Paper
scientific article; zbMATH DE number 1424199 (Why is no real title available?)2002-03-18Paper
scientific article; zbMATH DE number 1107700 (Why is no real title available?)1998-06-14Paper


Research outcomes over time


This page was built for person: Kazukuni Kobara