Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Atsushi
    Last name: Fujioka
    DBLP: 77/4040
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 41  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta.
    A Practical Secret Voting Scheme for Large Scale Elections.
    Advances in Cryptology - AUSCRYPT '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings 1993 (0) 1992
    Journal article
    Shigeo Tsujii, Toshiya Itoh, Atsushi Fujioka, Kaoru Kurosawa, Tsutomu Matsumoto.
    A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations.
    Systems and Computers in Japan 1988, Volume 19 (0) 1988
    Conference paper
    Atsushi Fujioka.
    Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators.
    Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings 2017 (0) 2017
    Conference paper
    Tatsuaki Okamoto, Atsushi Fujioka, Eiichiro Fujisaki.
    An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Z
    Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings 1993 (0) 1992
    Conference paper
    Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto.
    An Improvement on a Practical Secret Voting Scheme.
    Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings 1999 (0) 1999
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification.
    Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka.
    Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka.
    Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.
    Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki.
    Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys.
    Topics in Cryptology - CT-RSA 2011 - The Cryptographers' Track at the RSA Conference 2011, San Francisco, CA, USA, February 14-18, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Berkant Ustaoglu.
    Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys.
    Pairing-Based Cryptography - Pairing 2010 - 4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings 2010 (0) 2010
    Conference paper
    Atsushi Fujioka, Tatsuaki Okamoto, Shoji Miyaguchi.
    ESIGN: An Efficient Digital Signature Implementation for Smard Cards.
    EUROCRYPT 1991 (0) 1991
    Conference paper
    Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka.
    Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
    SECRYPT 2006, Proceedings of the International Conference on Security and Cryptography, Setúbal, Portugal, August 7-10, 2006, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications 2006 (0) 2006
    Journal article
    Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito.
    Generic Construction of Strongly Secure Timed-Release Public-Key Encryption.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito.
    Generic Construction of Strongly Secure Timed-Release Public-Key Encryption.
    Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
    IEICE Transactions 2011, Volume 94 (0) 2011
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
    Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Atsushi Fujioka, Fumitaka Hoshino, Tetsutaro Kobayashi, Koutarou Suzuki, Berkant Ustaoglu, Kazuki Yoneyama.
    id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
    IEICE Transactions 2013, Volume 96 (0) 2013
    Conference paper
    Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta.
    Interactive Bi-Proof Systems and Undeniable Signature Schemes.
    EUROCRYPT 1991 (0) 1991
    Conference paper
    Atsushi Fujioka, Eiichiro Fujisaki, Keita Xagawa.
    Non-malleable Multiple Public-Key Encryption.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Atsushi Fujioka.
    One-Round Exposure-Resilient Identity-Based Authenticated Key Agreement with Multiple Private Key Generators.
    Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers 2017 (0) 2016
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Kazuki Yoneyama.
    Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
    Information Security Applications - 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers 2011 (0) 2010
    Journal article
    Shinji Shinozaki, Atsushi Fujioka, Shigeo Tsujii, Toshiya Itoh.
    Provably Secure Key-Updating Schemes in Identity-Based Systems.
    Journal of Circuits, Systems, and Computers 1991, Volume 1 (0) 1991
    Conference paper
    Shinji Shinozaki, Toshiya Itoh, Atsushi Fujioka, Shigeo Tsujii.
    Provably Secure Key-Updating Schemes in Identity-Based Systems.
    EUROCRYPT 1990 (0) 1990
    Conference paper
    Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka.
    Secure Bit Commitment Function against Divertibility.
    EUROCRYPT 1992 (0) 1992
    Show item 1 to 25 of 41  

    Your query returned 41 matches in the database.