Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Kazuki
    Last name: Yoneyama
    DBLP: 49/2782
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 69  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Naoto Itakura, Kaoru Kurosawa, Kazuki Yoneyama.
    Oblivious Polynomial Evaluation in the Exponent, Revisited.
    IEICE Transactions 2017, Volume 100 (0) 2017
    Conference paper
    Kazuki Yoneyama.
    One-Round Authenticated Key Exchange without Implementation Tricks.
    JIP 2016, Volume 24 (0) 2016
    Conference paper
    Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, Kazuki Yoneyama.
    UC-Secure Dynamic Searchable Symmetric Encryption Scheme.
    Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto.
    Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto.
    Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
    Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, Maki Yoshida.
    Analyzing and Fixing the QACCE Security of QUIC.
    Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Shogo Kimura, Kazuki Yoneyama.
    Security proof of identity-based signature under RSA assumption, reconsidered.
    2016 International Symposium on Information Theory and Its Applications, ISITA 2016, Monterey, CA, USA, October 30 - November 2, 2016 2016 (0) 2016
    Journal article
    Kazuki Yoneyama.
    Compact Authenticated Key Exchange from Bounded CCA-Secure KEM.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly secure authenticated key exchange from factoring, codes, and lattices.
    Des. Codes Cryptography 2015, Volume 76 (0) 2015
    Conference paper
    Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto.
    Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
    SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015. 2015 (0) 2015
    Conference paper
    Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama.
    Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.
    Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama.
    Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum.
    Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta.
    Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions.
    Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Kazuki Yoneyama.
    Password-Based Authenticated Key Exchange without Centralized Trusted Setup.
    Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Kazuki Yoneyama.
    Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Secure Multi-Party Computation for Elliptic Curves.
    Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Kazuki Yoneyama, Goichiro Hanaoka.
    Compact Public Key Encryption with Minimum Ideal Property of Hash Functions.
    Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Kazuki Yoneyama.
    Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols.
    Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Converting PKI-Based Authenticated Key Exchange to Identity-Based.
    Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Kazuki Yoneyama.
    Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs.
    Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers 2015 (0) 2014
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Kazuki Yoneyama.
    One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama.
    id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Kazuki Yoneyama.
    Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated Key Exchange without Random Oracles.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Show item 1 to 25 of 69  

    Your query returned 69 matches in the database.