Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Atsushi
    Last name: Fujioka
    DBLP: 77/4040
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 41  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Atsushi Fujioka.
    Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators.
    Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Atsushi Fujioka.
    One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key Generators.
    Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers 2017 (0) 2016
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly secure authenticated key exchange from factoring, codes, and lattices.
    Des. Codes Cryptography 2015, Volume 76 (0) 2015
    Conference paper
    Atsushi Fujioka, Eiichiro Fujisaki, Keita Xagawa.
    Non-malleable Multiple Public-Key Encryption.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Secure Hierarchical Identity-Based Identification without Random Oracles.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Journal article
    Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito.
    Generic Construction of Strongly Secure Timed-Release Public-Key Encryption.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Atsushi Fujioka.
    Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama.
    id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Journal article
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Journal article
    Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu.
    Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Journal article
    Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito.
    Security of Sequential Multiple Encryption.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
    Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Security Enhancements by OR-Proof in Identity-Based Identification.
    Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu.
    Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
    Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Secure Hierarchical Identity-Based Identification without Random Oracles.
    Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Security Enhancement of Identity-Based Identification with Reversibility.
    Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification.
    Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki.
    Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys.
    Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Conference paper
    Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito.
    Generic Construction of Strongly Secure Timed-Release Public-Key Encryption.
    Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Atsushi Fujioka.
    Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.
    Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Ryo Kikuchi, Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito.
    Strong Security Notions for Timed-Release Public-Key Encryption Revisited.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki.
    Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Show item 1 to 25 of 41  

    Your query returned 41 matches in the database.