Koutarou Suzuki

From MaRDI portal
Person:494582


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Revocable hierarchical identity-based authenticated key exchange
 
2022-12-07Paper
Strongly secure identity-based key exchange with single pairing operation
 
2022-08-25Paper
Accelerating beta Weil pairing with precomputation and multi-pairing techniques
 
2021-02-23Paper
How to circumvent the two-ciphertext lower bound for linear garbling schemes
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Garbling scheme for formulas with constant size of garbled gates
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Strongly secure authenticated key exchange from factoring, codes, and lattices
Designs, Codes and Cryptography
2015-09-01Paper
Secure Multi-Party Computation for Elliptic Curves
Advances in Information and Computer Security
2015-05-27Paper
Converting PKI-based authenticated key exchange to identity-based
Cryptology and Network Security
2015-02-10Paper
Constant rounds almost linear complexity multi-party computation for prefix sum
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Sufficient condition for identity-based authenticated key exchange resilient to leakage of secret keys
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
Information Security and Privacy
2012-09-07Paper
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Public Key Cryptography – PKC 2012
2012-07-20Paper
Secure combinatorial auctions by dynamic programming with polynomial secret sharing
Financial Cryptography
2011-04-20Paper
Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys
Lecture Notes in Computer Science
2010-11-26Paper
Anonymizable signature and its construction from pairings
Lecture Notes in Computer Science
2010-11-26Paper
Modeling leakage of ephemeral secrets in tripartite/group key exchange
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Secure generalized Vickrey auction using homomorphic encryption
Lecture Notes in Computer Science
2010-03-31Paper
Relinkable Ring Signature
Cryptology and Network Security
2009-11-26Paper
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
Public Key Cryptography – PKC 2009
2009-03-24Paper
Secure distributed constraint satisfaction: reaching agreement without revealing private information
Artificial Intelligence
2007-10-23Paper
Traceable Ring Signature
Public Key Cryptography – PKC 2007
2007-09-04Paper
Financial Cryptography and Data Security
Lecture Notes in Computer Science
2005-12-22Paper
Financial Cryptography
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2085425 (Why is no real title available?)
 
2004-08-09Paper
1-out-of-n Signatures from a Variety of Keys
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1941238 (Why is no real title available?)
 
2003-06-29Paper
ON THE TURAEV-VIRO-OCNEANU INVARIANT OF 3-MANIFOLDS DERIVED FROMTHE E6-SUBFACTOR
Kyushu Journal of Mathematics
2002-11-04Paper
scientific article; zbMATH DE number 1689604 (Why is no real title available?)
 
2002-01-13Paper
\(E_6\) Turaev-Viro-Ocneanu invariant of lens space \(L(p,1)\)
 
2002-01-02Paper
scientific article; zbMATH DE number 1379300 (Why is no real title available?)
 
1999-12-15Paper


Research outcomes over time


This page was built for person: Koutarou Suzuki