Follow
Kenji Yasunaga
Kenji Yasunaga
Verified email at ist.osaka-u.ac.jp
Title
Cited by
Cited by
Year
On the list decodability of insertions and deletions
T Hayashi, K Yasunaga
2018 IEEE International Symposium on Information Theory (ISIT), 86-90, 2018
182018
Preventing abuse of cookies stolen by XSS
H Takahashi, K Yasunaga, M Mambo, K Kim, HY Youm
2013 Eighth Asia Joint Conference on Information Security, 85-89, 2013
162013
Practical card-based protocol for three-input majority
K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020
142020
General constructions of rational secret sharing with expected constant-round reconstruction
A Kawachi, Y Okamoto, K Tanaka, K Yasunaga
The Computer Journal 60 (5), 711-728, 2017
132017
Rational proofs against rational verifiers
K Inasawa, K Yasunaga
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2017
102017
A game-theoretic perspective on oblivious transfer
H Higo, K Tanaka, A Yamada, K Yasunaga
Australasian Conference on Information Security and Privacy, 29-42, 2012
102012
Leakage-resilience of stateless/stateful public-key encryption from hash proofs
MH Nguyen, K Yasunaga, K Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
92013
Game-theoretic security for bit commitment
H Higo, K Tanaka, K Yasunaga
International workshop on security, 303-318, 2013
82013
Public-key encryption with lazy parties
K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
62016
On the limitations of computational fuzzy extractors
K Yasunaga, K Yuzawa
Cryptology ePrint Archive, 2014
62014
Randomness leakage in the kem/dem framework
H Namiki, K Tanaka, K Yasunaga
International Conference on Provable Security, 309-323, 2011
62011
Post-challenge leakage resilient public-key cryptosystem in split state model
E Fujisaki, A Kawachi, R Nishimaki, K Tanaka, K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015
42015
Determination of the local weight distribution of binary linear block codes
K Yasunaga, T Fujiwara
IEEE transactions on information theory 52 (10), 4444-4454, 2006
42006
The local weight distributions of the (128, 50) extended binary primitive BCH code and (128, 64) Reed-Muller code
K Yasunaga
IEICE Technical Report, 2004
42004
An algorithm for computing the local distance profile of binary linear codes closed under a group of permutations
K YASUNAGA
IEICE Technical Report, 2003
42003
Replacing probability distributions in security games via Hellinger distance
K Yasunaga
2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021
32021
Repeated games for generating randomness in encryption
K Yasunaga, K Yuzawa
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
32018
Bit security as computational cost for winning games with high probability
S Watanabe, K Yasunaga
International Conference on the Theory and Application of Cryptology and …, 2021
22021
Perfectly secure message transmission against rational timid adversaries
M Fujita, K Yasunaga, T Koshiba
International Conference on Decision and Game Theory for Security, 127-144, 2018
22018
Error-correcting codes against chosen-codeword attacks
K Yasunaga
International Conference on Information Theoretic Security, 177-189, 2016
22016
The system can't perform the operation now. Try again later.
Articles 1–20