[go: up one dir, main page]

Follow
Kazuki Yoneyama
Kazuki Yoneyama
Verified email at vc.ibaraki.ac.jp - Homepage
Title
Cited by
Cited by
Year
Attribute-based encryption with partially hidden encryptor-specified access structures
T Nishide, K Yoneyama, K Ohta
International conference on applied cryptography and network security, 111-129, 2008
5952008
Strongly secure authenticated key exchange from factoring, codes, and lattices
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Designs, Codes and Cryptography 76 (3), 469-504, 2015
1722015
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
642013
Strongly secure two-pass attribute-based authenticated key exchange
K Yoneyama
International Conference on Pairing-Based Cryptography, 147-166, 2010
382010
Supersingular isogeny Diffie–Hellman authenticated key exchange
A Fujioka, K Takashima, S Terada, K Yoneyama
International Conference on Information Security and Cryptology, 177-195, 2018
342018
UC-secure dynamic searchable symmetric encryption scheme
K Kurosawa, K Sasaki, K Ohta, K Yoneyama
International Workshop on Security, 73-90, 2016
332016
Efficient and strongly secure password-based server aided key exchange
K Yoneyama
International Conference on Cryptology in India, 172-184, 2008
292008
Secret handshake: Strong anonymity definition and construction
Y Kawai, K Yoneyama, K Ohta
International Conference on Information Security Practice and Experience …, 2009
262009
Leaky random oracle
K Yoneyama, S Miyagawa, K Ohta
International Conference on Provable Security, 226-240, 2008
242008
One-round authenticated group key exchange from isogenies
A Fujioka, K Takashima, K Yoneyama
International Conference on Provable Security, 330-338, 2019
222019
Password-based authenticated key exchange from standard isogeny assumptions
S Terada, K Yoneyama
International Conference on Provable Security, 41-56, 2019
192019
Attribute-based encryption with partially hidden ciphertext policies
T Nishide, K Yoneyama, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2009
192009
Post-quantum variants of ISO/IEC standards: compact chosen ciphertext secure key encapsulation mechanism from isogeny
K Yoneyama
Proceedings of the 5th ACM Workshop on Security Standardisation Research …, 2019
172019
Exposure-resilient one-round tripartite key exchange without random oracles
K Suzuki, K Yoneyama
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014
172014
Leaky Random Oracle
K Yoneyama, S Miyagawa, K Ohta
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2009
172009
One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary
K Yoneyama
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
162013
Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
K Yoneyama, Y Zhao
International Conference on Provable Security, 348-365, 2011
162011
Visual secret sharing schemes for multiple secret images allowing the rotation of shares
M Iwamoto, L Wang, K Yoneyama, N Kunihiro, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2006
142006
Verifiable and forward secure dynamic searchable symmetric encryption with storage efficiency
K Yoneyama, S Kimura
International Conference on Information and Communications Security, 489-501, 2017
132017
Multi-cast key distribution: scalable, dynamic and provably secure construction
K Yoneyama, R Yoshida, Y Kawahara, T Kobayashi, H Fuji, T Yamamoto
International Conference on Provable Security, 207-226, 2016
122016
The system can't perform the operation now. Try again later.
Articles 1–20