Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Kazuki
    Last name: Yoneyama
    DBLP: 49/2782
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 70 of 70  
    Select a publication
    Show Title Venue Rating Date
    Journal article
    Naoto Itakura, Kaoru Kurosawa, Kazuki Yoneyama.
    Oblivious Polynomial Evaluation in the Exponent, Revisited.
    IEICE Transactions 2017, Volume 100 (0) 2017
    Journal article
    Kazuki Yoneyama.
    Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols.
    IEICE Transactions 2017, Volume 100 (0) 2017
    Conference paper
    Kazuki Yoneyama.
    One-Round Authenticated Key Exchange without Implementation Tricks.
    JIP 2016, Volume 24 (0) 2016
    Conference paper
    Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, Kazuki Yoneyama.
    UC-Secure Dynamic Searchable Symmetric Encryption Scheme.
    Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto.
    Multi-Cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Kazuki Yoneyama, Reo Yoshida, Yuto Kawahara, Tetsutaro Kobayashi, Hitoshi Fuji, Tomohide Yamamoto.
    Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
    Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, Maki Yoshida.
    Analyzing and Fixing the QACCE Security of QUIC.
    Security Standardisation Research - Third International Conference, SSR 2016, Gaithersburg, MD, USA, December 5-6, 2016, Proceedings 2016 (0) 2016
    Conference paper
    Shogo Kimura, Kazuki Yoneyama.
    Security proof of identity-based signature under RSA assumption, reconsidered.
    2016 International Symposium on Information Theory and Its Applications, ISITA 2016, Monterey, CA, USA, October 30 - November 2, 2016 2016 (0) 2016
    Journal article
    Kazuki Yoneyama.
    Compact Authenticated Key Exchange from Bounded CCA-Secure KEM.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly secure authenticated key exchange from factoring, codes, and lattices.
    Des. Codes Cryptography 2015, Volume 76 (0) 2015
    Conference paper
    Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto.
    Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack.
    SECRYPT 2015 - Proceedings of the 12th International Conference on Security and Cryptography, Colmar, Alsace, France, 20-22 July, 2015. 2015 (0) 2015
    Conference paper
    Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama.
    Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.
    Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama.
    Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum.
    Progress in Cryptology - AFRICACRYPT 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Yusuke Naito 0001, Kazuki Yoneyama, Kazuo Ohta.
    Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions.
    Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Kazuki Yoneyama.
    Password-Based Authenticated Key Exchange without Centralized Trusted Setup.
    Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Kazuki Yoneyama.
    Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Secure Multi-Party Computation for Elliptic Curves.
    Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Kazuki Yoneyama, Goichiro Hanaoka.
    Compact Public Key Encryption with Minimum Ideal Property of Hash Functions.
    Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Kazuki Yoneyama.
    Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols.
    Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Converting PKI-Based Authenticated Key Exchange to Identity-Based.
    Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Kazuki Yoneyama.
    Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs.
    Information Security and Cryptology - ICISC 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers 2015 (0) 2014
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Kazuki Yoneyama.
    One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama.
    id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Kazuki Yoneyama.
    Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated Key Exchange without Random Oracles.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Koutarou Suzuki, Kazuki Yoneyama.
    Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.
    Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Kazuki Yoneyama.
    Practical and Exposure-resilient Hierarchical ID-based Authenticated Key Exchange without Random Oracles.
    SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013 2013 (0) 2013
    Conference paper
    Kazuki Yoneyama.
    One-Round Authenticated Key Exchange without Implementation Trick.
    Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings 2013 (0) 2013
    Conference paper
    Kazuki Yoneyama.
    Compact Authenticated Key Exchange from Bounded CCA-Secure KEM.
    Progress in Cryptology - INDOCRYPT 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings 2013 (0) 2013
    Journal article
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Journal article
    Kazuki Yoneyama.
    Indifferentiable Security Reconsidered: Role of Scheduling.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
    Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Kazuki Yoneyama.
    One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary.
    Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Journal article
    Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang, Kazuo Ohta.
    Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Conference paper
    Kazuki Yoneyama, Masayuki Terada, Sadayuki Hongo, Kazuo Ohta.
    Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Conference paper
    Kazuki Yoneyama, Yunlei Zhao.
    Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage.
    Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang, Kazuo Ohta.
    Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model.
    Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Mebae Ushida, Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta.
    Proxiable Designated Verifier Signature.
    JIP 2011, Volume 19 (0) 2011
    Conference paper
    Kazuki Yoneyama.
    Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
    Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Kazuki Yoneyama.
    Strongly Secure Two-Pass Attribute-Based Authenticated Key Exchange.
    Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings 2010 (0) 2010
    Journal article
    Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Kazuo Ohta, Noboru Kunihiro.
    Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.
    IEICE Transactions 2010, Volume 93 (0) 2010
    Conference paper
    Mebae Ushida, Kazuo Ohta, Yutaka Kawai, Kazuki Yoneyama.
    Proxiable Designated Verifier Signature.
    SECRYPT 2010 - Proceedings of the International Conference on Security and Cryptography, Athens, Greece, July 26-28, 2010, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2010 (0) 2010
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
    Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers 2011 (0) 2010
    Conference paper
    Kazuki Yoneyama.
    Cross-Realm Password-Based Server Aided Key Exchange.
    Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers 2011 (0) 2010
    Conference paper
    Kazuki Yoneyama.
    Indifferentiable Security Reconsidered: Role of Scheduling.
    Information Security - 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers 2011 (0) 2010
    Conference paper
    Kazuki Yoneyama, Mebae Ushida, Kazuo Ohta.
    Rigorous Security Requirements for Designated Verifier Signatures.
    Information Security and Cryptology - 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers 2011 (0) 2010
    Conference paper
    Kazuki Yoneyama, Masayuki Terada, Sadayuki Hongo, Kazuo Ohta.
    Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments.
    Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings 2010 (0) 2010
    Conference paper
    Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta.
    Leaky Random Oracle.
    IEICE Transactions 2009, Volume 92 (0) 2009
    Journal article
    Kazuki Yoneyama.
    Efficient and Strongly Secure Password-based Server Aided Key Exchange.
    JIP 2009, Volume 17 (0) 2009
    Journal article
    Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang, Kazuo Ohta.
    How to Prove the Security of Practical Cryptosystems with Merkle-Damgård Hashing by Adopting Indifferentiability.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Journal article
    Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta.
    Secret Handshake: Strong Anonymity Definition and Construction.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Journal article
    Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang, Kazuo Ohta.
    Security of Practical Cryptosystems Using Merkle-Damgard Hash Function in the Ideal Cipher Model.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Yusuke Naito 0001, Kazuki Yoneyama, Lei Wang, Kazuo Ohta.
    How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!
    Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta.
    Secret Handshake: Strong Anonymity Definition and Construction.
    Information Security Practice and Experience, 5th International Conference, ISPEC 2009, Xi'an, China, April 13-15, 2009, Proceedings 2009 (0) 2009
    Conference paper
    Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta.
    Attribute-Based Encryption with Partially Hidden Ciphertext Policies.
    IEICE Transactions 2009, Volume 92 (0) 2009
    Conference paper
    Kazuki Yoneyama.
    Does Secure Password-Based Authenticated Key Exchange against Leakage of Internal States Exist?
    IEICE Transactions 2009, Volume 92 (0) 2009
    Conference paper
    Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta.
    Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures.
    Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Kazuki Yoneyama.
    Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract).
    Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Kazuki Yoneyama.
    Anonymous Message Authentication - Universally Composable Definition and Construction.
    SECRYPT 2008, Proceedings of the International Conference on Security and Cryptography, Porto, Portugal, July 26-29, 2008, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2008 (0) 2008
    Conference paper
    Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta.
    Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.
    Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers 2009 (0) 2008
    Conference paper
    Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta.
    Leaky Random Oracle (Extended Abstract).
    Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Kazuki Yoneyama, Haruki Ota, Kazuo Ohta.
    Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks.
    Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 17th International Symposium, AAECC-17, Bangalore, India, December 16-20, 2007, Proceedings 2007 (0) 2007
    Conference paper
    Kazuki Yoneyama, Kazuo Ohta.
    Ring signatures: universally composable definitions and constructions.
    Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007 2007 (0) 2007
    Conference paper
    Masayuki Terada, Kazuki Yoneyama, Sadayuki Hongo, Kazuo Ohta.
    Modeling Agreement Problems in the Universal Composability Framework.
    Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings 2008 (0) 2007
    Conference paper
    Haruki Ota, Kazuki Yoneyama, Shinsaku Kiyomoto, Toshiaki Tanaka, Kazuo Ohta.
    Universally Composable Hierarchical Hybrid Authenticated Key Exchange.
    IEICE Transactions 2007, Volume 90 (0) 2007
    Conference paper
    Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta.
    Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares.
    IEICE Transactions 2006, Volume 89 (0) 2006
    Show item 1 to 70 of 70  

    Your query returned 70 matches in the database.