Kazuki Yoneyama

From MaRDI portal
Person:494584


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Compact password authenticated key exchange from group actions
 
2024-01-11Paper
Post-quantum anonymous one-sided authenticated key exchange without random oracles
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles
 
2023-01-18Paper
Revocable hierarchical identity-based authenticated key exchange
 
2022-12-07Paper
Formal verification of fair exchange based on Bitcoin smart contracts
 
2022-07-06Paper
Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles
 
2022-03-21Paper
Verifiable and forward secure dynamic searchable symmetric encryption with storage efficiency
Information and Communications Security
2020-07-20Paper
One-round authenticated group key exchange from isogenies
 
2020-01-10Paper
Password-based authenticated key exchange from standard isogeny assumptions
 
2020-01-10Paper
Supersingular isogeny Diffie-Hellman authenticated key exchange
 
2019-03-29Paper
Single private-key generator security implies multiple private-key generators security
 
2018-11-07Paper
UC-secure dynamic searchable symmetric encryption scheme
 
2018-10-24Paper
Multi-cast key distribution: scalable, dynamic and provably secure construction
Provable Security
2017-01-06Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
Applied Cryptography and Network Security
2016-03-10Paper
Compact public key encryption with minimum ideal property of hash functions
Provable Security
2015-09-29Paper
Computational soundness of asymmetric bilinear pairing-based protocols
Provable Security
2015-09-29Paper
Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Strongly secure authenticated key exchange from factoring, codes, and lattices
Designs, Codes and Cryptography
2015-09-01Paper
Secure Multi-Party Computation for Elliptic Curves
Advances in Information and Computer Security
2015-05-27Paper
Converting PKI-based authenticated key exchange to identity-based
Cryptology and Network Security
2015-02-10Paper
One-round authenticated key exchange without implementation trick
Advances in Information and Computer Security
2014-09-15Paper
Reset indifferentiability from weakened random oracle salvages one-pass hash functions
Applied Cryptography and Network Security
2014-07-07Paper
Password-based authenticated key exchange without centralized trusted setup
Applied Cryptography and Network Security
2014-07-07Paper
Constant rounds almost linear complexity multi-party computation for prefix sum
Progress in Cryptology – AFRICACRYPT 2014
2014-06-24Paper
Compact authenticated key exchange from bounded CCA-secure KEM
Lecture Notes in Computer Science
2014-01-14Paper
One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary
Advances in Information and Computer Security
2013-04-04Paper
Two-party round-optimal session-policy attribute-based authenticated key exchange without random oracles
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Public Key Cryptography – PKC 2012
2012-07-20Paper
Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
Provable Security
2011-09-16Paper
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model
Provable Security
2011-09-16Paper
Rigorous security requirements for designated verifier signatures
Information Security and Cryptology
2011-07-29Paper
Strongly secure two-pass attribute-based authenticated key exchange
Lecture Notes in Computer Science
2010-11-26Paper
How to confirm cryptosystems security: the original Merkle-Damgård is still alive!
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Leaky Random Oracle (Extended Abstract)
Provable Security
2009-01-27Paper
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
Applied Cryptography and Network Security
2008-06-13Paper
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
2008-04-17Paper


Research outcomes over time


This page was built for person: Kazuki Yoneyama