Kazuo Ohta

From MaRDI portal
Person:278731

Available identifiers

zbMath Open ohta.kazuoMaRDI QIDQ278731

List of research outcomes





PublicationDate of PublicationType
Achieving pairing-free aggregate signatures using pre-communication between signers2023-03-21Paper
Efficient private PEZ protocols for symmetric functions2020-04-30Paper
Probabilistic generation of trapdoors: reducing information leakage of searchable symmetric encryption2018-10-26Paper
Efficient card-based cryptographic protocols for millionaires' problem utilizing private permutations2018-10-26Paper
Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes2018-10-24Paper
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography2018-06-27Paper
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations2018-03-16Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency2016-05-02Paper
Dynamic threshold public-key encryption with decryption consistency from static assumptions2015-10-20Paper
Improved Indifferentiable Security Analysis of PHOTON2014-10-14Paper
Factorization of Square-Free Integers with High Bits Known2014-08-21Paper
How to construct sufficient conditions for hash functions2014-08-21Paper
Reset indifferentiability from weakened random oracle salvages one-pass hash functions2014-07-07Paper
Constant rounds almost linear complexity multi-party computation for prefix sum2014-06-24Paper
An automated evaluation tool for improved rebound attack: new distinguishers and proposals of shiftbytes parameters for Grøstl2014-03-28Paper
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher2013-06-04Paper
An extension of fault sensitivity analysis based on clockwise collision2013-05-28Paper
Boomerang distinguishers for full HAS-160 compression function2013-04-04Paper
Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function2013-04-04Paper
Three-subset meet-in-the-middle attack on reduced XTEA2012-07-23Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking2012-07-20Paper
New truncated differential cryptanalysis on 3D block cipher2012-06-29Paper
Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting2011-12-16Paper
Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity2011-11-10Paper
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches2011-10-07Paper
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model2011-09-16Paper
Rigorous security requirements for designated verifier signatures2011-07-29Paper
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach2011-02-11Paper
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl2010-12-07Paper
Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness2010-03-16Paper
How to confirm cryptosystems security: the original Merkle-Damgård is still alive!2009-12-15Paper
Bit-Free Collision: Application to APOP Attack2009-10-28Paper
Fault Analysis Attack against an AES Prototype Chip Using RSL2009-04-29Paper
A New Strategy for Finding a Differential Path of SHA-12009-03-06Paper
Sanitizable and Deletable Signature2009-02-24Paper
Leaky Random Oracle (Extended Abstract)2009-01-27Paper
New Message Difference for MD42008-09-16Paper
Provably Secure Electronic Cash Based on Blind Multisignature Schemes2008-09-09Paper
Formal Security Model of Multisignatures2008-06-17Paper
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures2008-06-13Paper
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function2008-06-13Paper
Improved Collision Search for SHA-02008-04-24Paper
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack2008-04-24Paper
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks2008-04-17Paper
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD52008-04-15Paper
Advances in Cryptology - CRYPTO 20032007-11-28Paper
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol2007-09-04Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Topics in Cryptology – CT-RSA 20062007-02-12Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
Information and Communications Security2005-08-19Paper
A quantum algorithm using NMR computers to break secret-key cryptosystems2004-09-22Paper
https://portal.mardi4nfdi.de/entity/Q49406752000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q42508232000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q42510091999-10-06Paper
https://portal.mardi4nfdi.de/entity/Q42493441999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q43736371998-02-16Paper
A practical secret voting scheme for large scale elections1998-01-14Paper
https://portal.mardi4nfdi.de/entity/Q43434311997-08-24Paper
https://portal.mardi4nfdi.de/entity/Q43417471997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43140321995-11-28Paper
https://portal.mardi4nfdi.de/entity/Q43140221994-11-30Paper
How to Utilize the Randomness of Zero-Knowledge Proofs1994-03-07Paper
https://portal.mardi4nfdi.de/entity/Q42796871994-02-22Paper
Universal Electronic Cash1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40368871993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40357181993-05-18Paper
Interactive Bi-Proof Systems and Undeniable Signature Schemes1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40369011993-05-18Paper
Direct Zero Knowledge Proofs of Computational Power in Five Rounds1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q31973111990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q33582261990-01-01Paper
https://portal.mardi4nfdi.de/entity/Q32101701990-01-01Paper

Research outcomes over time

This page was built for person: Kazuo Ohta