Kanta Matsuura

From MaRDI portal
(Redirected from Person:438870)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions2024-03-14Paper
On Private Information Retrieval Supporting Range Queries
1511.68044
2022-12-22Paper
Efficient oblivious evaluation protocol and conditional disclosure of secrets for DFA2022-11-09Paper
Constructive \(t\)-secure homomorphic secret sharing for low degree polynomials2022-07-06Paper
Evolving homomorphic secret sharing for hierarchical access structures2022-04-22Paper
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity
Science China Information Sciences
2021-12-15Paper
Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
Lecture Notes in Computer Science
2016-03-02Paper
More constructions of re-splittable threshold public key encryption
Advances in Information and Computer Security
2015-05-27Paper
Reducing the spread of damage of key exposures in key-insulated encryption
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Construction of highly nonlinear resilient S-boxes with given degree
Designs, Codes and Cryptography
2012-07-31Paper
Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
Public Key Cryptography – PKC 2012
2012-07-20Paper
Enumeration of balanced symmetric functions over \(GF(p)\)
Information Processing Letters
2012-03-19Paper
Balanced \(2p\)-variable rotation symmetric Boolean functions with maximum algebraic immunity
Applied Mathematics Letters
2011-12-28Paper
On black-box separations among injective one-way functions
Theory of Cryptography
2011-05-19Paper
Parallel decryption queries in bounded chosen ciphertext attacks
Public Key Cryptography – PKC 2011
2011-03-15Paper
On-line non-transferable signatures revisited
Public Key Cryptography – PKC 2011
2011-03-15Paper
Efficient generic constructions of timed-release encryption with pre-open capability
Lecture Notes in Computer Science
2010-11-26Paper
Efficient constructions of signcryption schemes and signcryption composability
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
Unconditionally secure chaffing-and-winnowing for multiple use
Lecture Notes in Computer Science
2009-12-03Paper
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity
Cryptology and Network Security
2009-11-26Paper
A Generic Construction of Timed-Release Encryption with Pre-open Capability
Advances in Information and Computer Security
2009-10-28Paper
Generic Construction of Stateful Identity Based Encryption
Lecture Notes in Computer Science
2009-09-29Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
Relations Among Notions of Security for Identity Based Encryption Schemes
LATIN 2006: Theoretical Informatics
2008-09-18Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
Provable Security
2008-06-10Paper
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
Progress in Cryptology - INDOCRYPT 2006
2008-04-11Paper
Proxy Signatures Secure Against Proxy Key Exposure
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT
Information Security and Privacy
2007-09-07Paper
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Lecture Notes in Computer Science
2007-02-12Paper
Information Security and Cryptology
Lecture Notes in Computer Science
2006-11-14Paper
scientific article; zbMATH DE number 2080680 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 1424192 (Why is no real title available?)2002-04-08Paper


Research outcomes over time


This page was built for person: Kanta Matsuura