Follow
Koutarou Suzuki (鈴木幸太郎)
Koutarou Suzuki (鈴木幸太郎)
Toyohashi University of Technology (豊橋技術科学大学)
Verified email at suzuki.email.ne.jp - Homepage
Title
Cited by
Cited by
Year
Cryptographic approach to “privacy-friendly” tags
M Ohkubo, K Suzuki, S Kinoshita
RFID privacy workshop 82, 2003
9502003
1-out-of-n signatures from a variety of keys
M Abe, M Ohkubo, K Suzuki
Advances in Cryptology—ASIACRYPT 2002: 8th International Conference on the …, 2002
4672002
Hash-chain based forward-secure privacy protection scheme for low-cost RFID
M Ohkubo
2004 Symposium on Cryptography and Information Security (SCIS2004) 1, 719-724, 2004
3262004
RFID privacy issues and technical challenges
M Ohkubo, K Suzuki, S Kinoshita
Communications of the ACM 48 (9), 66-71, 2005
3082005
Traceable ring signature
E Fujisaki, K Suzuki
Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007
2652007
Efficient hash-chain based RFID privacy protection scheme
M Ohkubo
International Conference on Ubiquitous Computing-Ubicomp, Workshop Privacy …, 2004
2392004
M + 1-st Price Auction Using Homomorphic Encryption
M Abe, K Suzuki
Public Key Cryptography: 5th International Workshop on Practice and Theory …, 2002
1612002
Strongly secure authenticated key exchange from factoring, codes, and lattices
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Designs, Codes and Cryptography 76, 469-504, 2015
1402015
Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions
M Yokoo, K Suzuki
Proceedings of the first international joint conference on Autonomous agents …, 2002
1222002
Anonymous hierarchical identity-based encryption with constant size ciphertexts
JH Seo, T Kobayashi, M Ohkubo, K Suzuki
Public Key Cryptography–PKC 2009: 12th International Conference on Practice …, 2009
1082009
Secure distributed constraint satisfaction: Reaching agreement without revealing private information
M Yokoo, K Suzuki, K Hirayama
Principles and Practice of Constraint Programming-CP 2002: 8th International …, 2002
1082002
Efficient sealed-bid auction using hash chain
K Suzuki, K Kobayashi, H Morita
Information Security and Cryptology—ICISC 2000: Third International …, 2001
1032001
Secure generalized vickrey auction using homomorphic encryption
K Suzuki, M Yokoo
Financial Cryptography: 7th International Conference, FC 2003, Guadeloupe …, 2003
972003
Secure combinatorial auctions by dynamic programming with polynomial secret sharing
K Suzuki, M Yokoo
Financial Cryptography: 6th International Conference, FC 2002 Southampton …, 2003
782003
Secure distributed constraint satisfaction: Reaching agreement without revealing private information
M Yokoo, K Suzuki, K Hirayama
Artificial Intelligence 161 (1-2), 229-245, 2005
772005
Cryptographic Approach to a Privacy Friendly Tag, RFID Privacy Workshop@ MIT
M OOKUHBO
http://www. rfidprivacy. org., 2003
692003
Receipt-free sealed-bid auction
M Abe, K Suzuki
Information Security: 5th International Conference, ISC 2002 Sao Paulo …, 2002
622002
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
532013
Secure generalized vickrey auction without third-party servers
M Yokoo, K Suzuki
Financial Cryptography 3110, 132-146, 2004
372004
Tag privacy protection method, tag device, backend apparatus, updater, update solicitor and record medium carrying such programs in storage
M Ohkubo, K Suzuki, S Kinoshita
US Patent 7,661,132, 2010
362010
The system can't perform the operation now. Try again later.
Articles 1–20