Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Atsushi
    Last name: Fujioka
    DBLP: 77/4040
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 39  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly secure authenticated key exchange from factoring, codes, and lattices.
    Des. Codes Cryptography 2015, Volume 76 (0) 2015
    Conference paper
    Atsushi Fujioka, Eiichiro Fujisaki, Keita Xagawa.
    Non-malleable Multiple Public-Key Encryption.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Secure Hierarchical Identity-Based Identification without Random Oracles.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Journal article
    Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito.
    Generic Construction of Strongly Secure Timed-Release Public-Key Encryption.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Atsushi Fujioka.
    Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama.
    id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Journal article
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Journal article
    Minkyu Kim, Atsushi Fujioka, Berkant Ustaoglu.
    Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Journal article
    Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito.
    Security of Sequential Multiple Encryption.
    IEICE Transactions 2012, Volume 95 (0) 2012
    Show item 1 to 10 of 39  

    Your query returned 39 matches in the database.