Kazuki Yoneyama

From MaRDI portal
Person:494584

Available identifiers

zbMath Open yoneyama.kazukiMaRDI QIDQ494584

List of research outcomes





PublicationDate of PublicationType
Compact password authenticated key exchange from group actions2024-01-11Paper
Post-quantum anonymous one-sided authenticated key exchange without random oracles2023-08-10Paper
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles2023-01-18Paper
Revocable hierarchical identity-based authenticated key exchange2022-12-07Paper
Formal verification of fair exchange based on Bitcoin smart contracts2022-07-06Paper
Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles2022-03-21Paper
Verifiable and forward secure dynamic searchable symmetric encryption with storage efficiency2020-07-20Paper
One-round authenticated group key exchange from isogenies2020-01-10Paper
Password-based authenticated key exchange from standard isogeny assumptions2020-01-10Paper
Supersingular isogeny Diffie-Hellman authenticated key exchange2019-03-29Paper
Single private-key generator security implies multiple private-key generators security2018-11-07Paper
UC-secure dynamic searchable symmetric encryption scheme2018-10-24Paper
Multi-cast key distribution: scalable, dynamic and provably secure construction2017-01-06Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures2016-03-10Paper
Compact public key encryption with minimum ideal property of hash functions2015-09-29Paper
Computational soundness of asymmetric bilinear pairing-based protocols2015-09-29Paper
Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs2015-09-11Paper
Strongly secure authenticated key exchange from factoring, codes, and lattices2015-09-01Paper
Secure Multi-Party Computation for Elliptic Curves2015-05-27Paper
Converting PKI-based authenticated key exchange to identity-based2015-02-10Paper
One-round authenticated key exchange without implementation trick2014-09-15Paper
Reset indifferentiability from weakened random oracle salvages one-pass hash functions2014-07-07Paper
Password-based authenticated key exchange without centralized trusted setup2014-07-07Paper
Constant rounds almost linear complexity multi-party computation for prefix sum2014-06-24Paper
Compact authenticated key exchange from bounded CCA-secure KEM2014-01-14Paper
One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary2013-04-04Paper
Two-party round-optimal session-policy attribute-based authenticated key exchange without random oracles2012-11-01Paper
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices2012-07-20Paper
Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage2011-09-16Paper
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model2011-09-16Paper
Rigorous security requirements for designated verifier signatures2011-07-29Paper
Strongly secure two-pass attribute-based authenticated key exchange2010-11-26Paper
How to confirm cryptosystems security: the original Merkle-Damgård is still alive!2009-12-15Paper
Leaky Random Oracle (Extended Abstract)2009-01-27Paper
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract)2009-01-22Paper
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures2008-06-13Paper
Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks2008-04-17Paper

Research outcomes over time

This page was built for person: Kazuki Yoneyama