Daisuke Moriyama

According to our database1, Daisuke Moriyama authored at least 15 papers between 2011 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
Compact and low-power ASIP design for lightweight PUF-based authentication protocols.
IET Inf. Secur., 2016

Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Towards a Unified Security Model for Physically Unclonable Functions.
IACR Cryptol. ePrint Arch., 2016

2015
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol.
IACR Cryptol. ePrint Arch., 2015

The bright side arguments for the coming smartphones crypto war: The added value of device encryption.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Relations among Notions of Privacy for RFID Authentication Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Provably secure two-round RFID grouping proof protocols.
Proceedings of the IEEE RFID Technology and Applications Conference, 2014

A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2014

2013
PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage.
IACR Cryptol. ePrint Arch., 2013

A Forward Privacy Model for RFID Authentication Protocols.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

An RFID authentication protocol with flexible path authentication.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

2011
An eCK-secure Authenticated Key Exchange Protocol without Random Oracles.
KSII Trans. Internet Inf. Syst., 2011

A Fully Secure Spatial Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Multifactor Authenticated Key Renewal.
Proceedings of the Trusted Systems - Third International Conference, 2011

Leakage resilient eCK-secure key exchange protocol without random oracles.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011


  Loading...