Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Koutarou
    Last name: Suzuki
    DBLP: 16/794
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 52  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki.
    How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki.
    Garbling Scheme for Formulas with Constant Size of Garbled Gates.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki.
    How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes.
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II 2016 (0) 2016
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly secure authenticated key exchange from factoring, codes, and lattices.
    Des. Codes Cryptography 2015, Volume 76 (0) 2015
    Conference paper
    Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki.
    Garbling Scheme for Formulas with Constant Size of Garbled Gates.
    Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I 2015 (0) 2015
    Conference paper
    Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama.
    Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum.
    Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Secure Multi-Party Computation for Elliptic Curves.
    Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Converting PKI-Based Authenticated Key Exchange to Identity-Based.
    Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings 2014 (0) 2014
    Journal article
    Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu.
    Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Show item 1 to 10 of 52  

    Your query returned 52 matches in the database.