The following pages link to Kazuki Yoneyama (Q494584):
Displayed 35 items.
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- Single private-key generator security implies multiple private-key generators security (Q1616637) (← links)
- Supersingular isogeny Diffie-Hellman authenticated key exchange (Q1736050) (← links)
- UC-secure dynamic searchable symmetric encryption scheme (Q1800669) (← links)
- Revocable hierarchical identity-based authenticated key exchange (Q2104408) (← links)
- Adaptive-ID secure hierarchical ID-based authenticated key exchange under standard assumptions without random oracles (Q2117023) (← links)
- Formal verification of fair exchange based on Bitcoin smart contracts (Q2152024) (← links)
- Password-based authenticated key exchange from standard isogeny assumptions (Q2283598) (← links)
- One-round authenticated group key exchange from isogenies (Q2283622) (← links)
- Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures (Q2794502) (← links)
- Compact Authenticated Key Exchange from Bounded CCA-Secure KEM (Q2872049) (← links)
- Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices (Q2900236) (← links)
- Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs (Q2942825) (← links)
- Compact Public Key Encryption with Minimum Ideal Property of Hash Functions (Q2948149) (← links)
- Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols (Q2948160) (← links)
- Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction (Q2953861) (← links)
- Rigorous Security Requirements for Designated Verifier Signatures (Q3019934) (← links)
- Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange (Q3059648) (← links)
- Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model (Q3092365) (← links)
- Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage (Q3092372) (← links)
- Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles (Q3166839) (← links)
- One-Round Authenticated Key Exchange without Implementation Trick (Q3190031) (← links)
- Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency (Q3297524) (← links)
- Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures (Q3506405) (← links)
- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! (Q3650704) (← links)
- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary (Q4912403) (← links)
- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum (Q4981774) (← links)
- Password-Based Authenticated Key Exchange without Centralized Trusted Setup (Q5168532) (← links)
- Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions (Q5168544) (← links)
- Secure Multi-Party Computation for Elliptic Curves (Q5253630) (← links)
- Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks (Q5386103) (← links)
- Converting PKI-Based Authenticated Key Exchange to Identity-Based (Q5498722) (← links)
- Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract) (Q5504621) (← links)
- Leaky Random Oracle (Extended Abstract) (Q5505472) (← links)
- Post-quantum anonymous one-sided authenticated key exchange without random oracles (Q6169027) (← links)