Kazuki Yoneyama

From MaRDI portal
Person:494584

Available identifiers

zbMath Open yoneyama.kazukiMaRDI QIDQ494584

List of research outcomes





PublicationDate of PublicationType
Compact password authenticated key exchange from group actions2024-01-11Paper
Post-quantum anonymous one-sided authenticated key exchange without random oracles2023-08-10Paper
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles2023-01-18Paper
Revocable hierarchical identity-based authenticated key exchange2022-12-07Paper
Formal verification of fair exchange based on Bitcoin smart contracts2022-07-06Paper
Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles2022-03-21Paper
Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency2020-07-20Paper
One-round authenticated group key exchange from isogenies2020-01-10Paper
Password-based authenticated key exchange from standard isogeny assumptions2020-01-10Paper
Supersingular isogeny Diffie-Hellman authenticated key exchange2019-03-29Paper
Single private-key generator security implies multiple private-key generators security2018-11-07Paper
UC-secure dynamic searchable symmetric encryption scheme2018-10-24Paper
Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction2017-01-06Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures2016-03-10Paper
Compact Public Key Encryption with Minimum Ideal Property of Hash Functions2015-09-29Paper
Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols2015-09-29Paper
Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs2015-09-11Paper
Strongly secure authenticated key exchange from factoring, codes, and lattices2015-09-01Paper
Secure Multi-Party Computation for Elliptic Curves2015-05-27Paper
Converting PKI-Based Authenticated Key Exchange to Identity-Based2015-02-10Paper
One-Round Authenticated Key Exchange without Implementation Trick2014-09-15Paper
Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions2014-07-07Paper
Password-Based Authenticated Key Exchange without Centralized Trusted Setup2014-07-07Paper
Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum2014-06-24Paper
Compact Authenticated Key Exchange from Bounded CCA-Secure KEM2014-01-14Paper
One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary2013-04-04Paper
Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles2012-11-01Paper
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices2012-07-20Paper
Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage2011-09-16Paper
Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model2011-09-16Paper
Rigorous Security Requirements for Designated Verifier Signatures2011-07-29Paper
Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange2010-11-26Paper
How to confirm cryptosystems security: the original Merkle-Damgård is still alive!2009-12-15Paper
Leaky Random Oracle (Extended Abstract)2009-01-27Paper
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)2009-01-22Paper
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures2008-06-13Paper
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks2008-04-17Paper

Research outcomes over time

This page was built for person: Kazuki Yoneyama