Kazuo Ohta

From MaRDI portal
(Redirected from Person:278731)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Multi-user dynamic searchable encryption for prefix-fixing predicates from symmetric-key primitives2025-06-17Paper
Achieving pairing-free aggregate signatures using pre-communication between signers2023-03-21Paper
Efficient private PEZ protocols for symmetric functions2020-04-30Paper
Probabilistic generation of trapdoors: reducing information leakage of searchable symmetric encryption2018-10-26Paper
Efficient card-based cryptographic protocols for millionaires' problem utilizing private permutations2018-10-26Paper
Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes2018-10-24Paper
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
IEEE Transactions on Information Theory
2018-06-27Paper
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations2018-03-16Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
Theoretical Computer Science
2016-05-02Paper
Dynamic threshold public-key encryption with decryption consistency from static assumptions
Information Security and Privacy
2015-10-20Paper
Improved Indifferentiable Security Analysis of PHOTON
Lecture Notes in Computer Science
2014-10-14Paper
Factorization of Square-Free Integers with High Bits Known
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
How to construct sufficient conditions for hash functions
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Reset indifferentiability from weakened random oracle salvages one-pass hash functions
Applied Cryptography and Network Security
2014-07-07Paper
Constant rounds almost linear complexity multi-party computation for prefix sum
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
An automated evaluation tool for improved rebound attack: new distinguishers and proposals of shiftbytes parameters for Grøstl
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
Lecture Notes in Computer Science
2013-06-04Paper
An extension of fault sensitivity analysis based on clockwise collision
Information Security and Cryptology
2013-05-28Paper
Boomerang distinguishers for full HAS-160 compression function
Advances in Information and Computer Security
2013-04-04Paper
Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function
Advances in Information and Computer Security
2013-04-04Paper
Three-subset meet-in-the-middle attack on reduced XTEA
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Public Key Cryptography – PKC 2012
2012-07-20Paper
New truncated differential cryptanalysis on 3D block cipher
Information Security Practice and Experience
2012-06-29Paper
Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
Cryptography and Coding
2011-12-16Paper
Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
Advances in Information and Computer Security
2011-11-10Paper
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches
Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings
2011-10-07Paper
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model
Provable Security
2011-09-16Paper
Rigorous security requirements for designated verifier signatures
Information Security and Cryptology
2011-07-29Paper
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness
Topics in Cryptology - CT-RSA 2010
2010-03-16Paper
How to confirm cryptosystems security: the original Merkle-Damgård is still alive!
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Bit-Free Collision: Application to APOP Attack
Advances in Information and Computer Security
2009-10-28Paper
Fault Analysis Attack against an AES Prototype Chip Using RSL
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
A New Strategy for Finding a Differential Path of SHA-1
Information Security and Privacy
2009-03-06Paper
Sanitizable and Deletable Signature
Information Security Applications
2009-02-24Paper
Leaky Random Oracle (Extended Abstract)
Provable Security
2009-01-27Paper
New Message Difference for MD4
Fast Software Encryption
2008-09-16Paper
Provably Secure Electronic Cash Based on Blind Multisignature Schemes
Financial Cryptography and Data Security
2008-09-09Paper
Formal Security Model of Multisignatures
Lecture Notes in Computer Science
2008-06-17Paper
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
Applied Cryptography and Network Security
2008-06-13Paper
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Improved Collision Search for SHA-0
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Advances in Cryptology – EUROCRYPT 2008
2008-04-15Paper
Advances in Cryptology - CRYPTO 2003
Lecture Notes in Computer Science
2007-11-28Paper
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
Public Key Cryptography – PKC 2007
2007-09-04Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Topics in Cryptology – CT-RSA 2006
Lecture Notes in Computer Science
2007-02-12Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
A quantum algorithm using NMR computers to break secret-key cryptosystems
New Generation Computing
2004-09-22Paper
scientific article; zbMATH DE number 1406762 (Why is no real title available?)2000-03-01Paper
scientific article; zbMATH DE number 1304124 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1304286 (Why is no real title available?)1999-10-06Paper
scientific article; zbMATH DE number 1302859 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1107693 (Why is no real title available?)1998-02-16Paper
A practical secret voting scheme for large scale elections
Advances in Cryptology — AUSCRYPT '92
1998-01-14Paper
scientific article; zbMATH DE number 1030989 (Why is no real title available?)1997-08-24Paper
scientific article; zbMATH DE number 1024057 (Why is no real title available?)1997-06-18Paper
scientific article; zbMATH DE number 697816 (Why is no real title available?)1995-11-28Paper
scientific article; zbMATH DE number 697807 (Why is no real title available?)1994-11-30Paper
How to Utilize the Randomness of Zero-Knowledge Proofs
Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings
1994-03-07Paper
scientific article; zbMATH DE number 503348 (Why is no real title available?)1994-02-22Paper
scientific article; zbMATH DE number 177045 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 176549 (Why is no real title available?)1993-05-18Paper
scientific article; zbMATH DE number 177055 (Why is no real title available?)1993-05-18Paper
Universal Electronic Cash
Advances in Cryptology — CRYPTO ’91
1993-05-18Paper
Interactive Bi-Proof Systems and Undeniable Signature Schemes
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
Direct Zero Knowledge Proofs of Computational Power in Five Rounds
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
scientific article; zbMATH DE number 4172376 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4211487 (Why is no real title available?)1990-01-01Paper
scientific article; zbMATH DE number 4191110 (Why is no real title available?)1990-01-01Paper


Research outcomes over time


This page was built for person: Kazuo Ohta