Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Koutarou
    Last name: Suzuki
    DBLP: 16/794
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 52  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki.
    How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes.
    IACR Cryptology ePrint Archive 2017, Volume 2017 (0) 2017
    Conference paper
    Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki.
    Garbling Scheme for Formulas with Constant Size of Garbled Gates.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Carmen Kempka, Ryo Kikuchi, Koutarou Suzuki.
    How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes.
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II 2016 (0) 2016
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly secure authenticated key exchange from factoring, codes, and lattices.
    Des. Codes Cryptography 2015, Volume 76 (0) 2015
    Conference paper
    Carmen Kempka, Ryo Kikuchi, Susumu Kiyoshima, Koutarou Suzuki.
    Garbling Scheme for Formulas with Constant Size of Garbled Gates.
    Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I 2015 (0) 2015
    Conference paper
    Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama.
    Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum.
    Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Secure Multi-Party Computation for Elliptic Curves.
    Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Converting PKI-Based Authenticated Key Exchange to Identity-Based.
    Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings 2014 (0) 2014
    Journal article
    Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu.
    Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Journal article
    Masayuki Abe, Tatsuaki Okamoto, Koutarou Suzuki.
    Message Recovery Signature Schemes from Sigma-Protocols.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama.
    id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.
    Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 2013 (0) 2013
    Journal article
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
    Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu.
    Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Journal article
    Jae Hong Seo, Tetsutaro Kobayashi, Miyako Ohkubo, Koutarou Suzuki.
    Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki.
    Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys.
    Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki.
    Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
    Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu.
    Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys.
    Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings 2010 (0) 2010
    Conference paper
    Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki.
    Anonymizable Signature and Its Construction from Pairings.
    Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings 2010 (0) 2010
    Show item 1 to 25 of 52  

    Your query returned 52 matches in the database.