Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Kazuki
    Last name: Yoneyama
    DBLP: 49/2782
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 69  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Naoto Itakura, Kaoru Kurosawa, Kazuki Yoneyama.
    Oblivious Polynomial Evaluation in the Exponent, Revisited.
    IEICE Transactions 2017, Volume 100 (0) 2017
    Conference paper
    Kazuki Yoneyama.
    One-Round Authenticated Key Exchange without Implementation Tricks.
    JIP 2016, Volume 24 (0) 2016
    Conference paper
    Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, Kazuki Yoneyama.
    UC-Secure Dynamic Searchable Symmetric Encryption Scheme.
    Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto.
    Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto.
    Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
    Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, Maki Yoshida.
    Analyzing and Fixing the QACCE Security of QUIC.
    Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Shogo Kimura, Kazuki Yoneyama.
    Security proof of identity-based signature under RSA assumption, reconsidered.
    2016 International Symposium on Information Theory and Its Applications, ISITA 2016, Monterey, CA, USA, October 30 - November 2, 2016 2016 (0) 2016
    Journal article
    Kazuki Yoneyama.
    Compact Authenticated Key Exchange from Bounded CCA-Secure KEM.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly secure authenticated key exchange from factoring, codes, and lattices.
    Des. Codes Cryptography 2015, Volume 76 (0) 2015
    Conference paper
    Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto.
    Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
    SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015. 2015 (0) 2015
    Show item 1 to 10 of 69  

    Your query returned 69 matches in the database.