Follow
Kazuki Yoneyama
Kazuki Yoneyama
Verified email at vc.ibaraki.ac.jp - Homepage
Title
Cited by
Cited by
Year
Attribute-based encryption with partially hidden encryptor-specified access structures
T Nishide, K Yoneyama, K Ohta
International conference on applied cryptography and network security, 111-129, 2008
4732008
Strongly secure authenticated key exchange from factoring, codes, and lattices
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Designs, Codes and Cryptography 76 (3), 469-504, 2015
1292015
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
522013
Strongly secure two-pass attribute-based authenticated key exchange
K Yoneyama
International Conference on Pairing-Based Cryptography, 147-166, 2010
352010
Leaky Random Oracle
K Yoneyama, S Miyagawa, K Ohta
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2009
312009
Efficient and strongly secure password-based server aided key exchange
K Yoneyama
International Conference on Cryptology in India, 172-184, 2008
282008
UC-secure dynamic searchable symmetric encryption scheme
K Kurosawa, K Sasaki, K Ohta, K Yoneyama
International Workshop on Security, 73-90, 2016
242016
Supersingular isogeny Diffie–Hellman authenticated key exchange
A Fujioka, K Takashima, S Terada, K Yoneyama
International Conference on Information Security and Cryptology, 177-195, 2018
232018
Secret handshake: Strong anonymity definition and construction
Y Kawai, K Yoneyama, K Ohta
International Conference on Information Security Practice and Experience …, 2009
212009
Attribute-based encryption with partially hidden ciphertext policies
T Nishide, K Yoneyama, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2009
202009
One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary
K Yoneyama
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
152013
Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
K Yoneyama, Y Zhao
International Conference on Provable Security, 348-365, 2011
152011
Exposure-resilient one-round tripartite key exchange without random oracles
K Suzuki, K Yoneyama
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014
142014
Visual secret sharing schemes for multiple secret images allowing the rotation of shares
M Iwamoto, L Wang, K Yoneyama, N Kunihiro, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2006
122006
Verifiable and forward secure dynamic searchable symmetric encryption with storage efficiency
K Yoneyama, S Kimura
International Conference on Information and Communications Security, 489-501, 2017
112017
How to confirm cryptosystems security: the original Merkle-Damgård is still alive!
Y Naito, K Yoneyama, L Wang, K Ohta
International Conference on the Theory and Application of Cryptology and …, 2009
112009
One-round authenticated group key exchange from isogenies
A Fujioka, K Takashima, K Yoneyama
International Conference on Provable Security, 330-338, 2019
102019
id-eCK secure ID-based authenticated key exchange on symmetric and asymmetric pairing
A Fujioka, F Hoshino, T Kobayashi, K Suzuki, B USTAO, K Yoneyama
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
102013
Cross-realm password-based server aided key exchange
K Yoneyama
International Workshop on Information Security Applications, 322-336, 2010
102010
Secure cross-realm client-to-client password-based authenticated key exchange against undetectable on-line dictionary attacks
K Yoneyama, H Ota, K Ohta
International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2007
102007
The system can't perform the operation now. Try again later.
Articles 1–20