Kazuhide Fukushima

According to our database1, Kazuhide Fukushima authored at least 55 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Evaluation of Code-based Signature Schemes.
IACR Cryptology ePrint Archive, 2019

Experiment on Side-Channel Key-Recovery using a Real LPWA End-device.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Security Analysis and Efficient Implementation of Code-based Signature Schemes.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

A Lattice-Based Public Key Encryption with Equality Test in Standard Model.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms.
Security and Communication Networks, 2018

Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform.
IACR Cryptology ePrint Archive, 2018

Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018

On the Complexity of the LWR-Solving BKW Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2017
Fault Injection Attack on Salsa20 and ChaCha and a Lightweight Countermeasure.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

VIGraph - A Framework for Verifiable Information.
Proceedings of the Trust Management XI - 11th IFIP WG 11.11 International Conference, 2017

White-box Implementation of Stream Cipher.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Practical Power Analysis on KCipher-2 Software on Low-End Microcontrollers.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, 2017

An Experimental Study of the BDD Approach for the Search LWE Problem.
Proceedings of the Applied Cryptography and Network Security, 2017

2016
Delay PUF Assessment Method Based on Side-Channel and Modeling Analyzes: The Final Piece of All-in-One Assessment Methodology.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Sensor-based Wearable PUF.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

2014
Security issues on IT systems during disasters: a survey.
J. Ambient Intelligence and Humanized Computing, 2014

Fast Implementation of KCipher-2 for Software and Hardware.
IEICE Transactions, 2014

Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure.
IEICE Transactions, 2014

2013
Run-Time Enforcement of Information-Flow Properties on Android - (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2013, 2013

Chosen-IV Correlation Power Analysis on KCipher-2 and a Countermeasure.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2013

2012
Design of Categorization Mechanism for Disaster-Information-Gathering System.
JoWUA, 2012

Software Protection Combined with Tamper-Proof Device.
IEICE Transactions, 2012

Privacy Preservation of User History Graph.
Proceedings of the Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems, 2012

Security-and-Privacy-Related Issues on IT Systems During Disasters.
Proceedings of the Multidisciplinary Research and Practice for Information Systems, 2012

2011
AMY: Use your cell phone to create a protected personal network over devices.
IEEE Trans. Consumer Electronics, 2011

Towards Secure Cloud Computing Architecture - A Solution Based on Software Protection Mechanism.
J. Internet Serv. Inf. Secur., 2011

Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

MASHA - Low Cost Authentication with a New Stream Cipher.
Proceedings of the Information Security, 14th International Conference, 2011

Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Data Anonymity in Multi-Party Service Model.
Proceedings of the Security Technology, 2011

Analysis of Message Injection in Stream Cipher-Based Hash Functions.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Improved Subset Difference Method with Ternary Tree.
IEICE Transactions, 2010

A Formal Model to Analyze the Permission Authorization and Enforcement in the Android Framework.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

A Small But Non-negligible Flaw in the Android Permission Scheme.
Proceedings of the POLICY 2010, 2010

Efficient Implementation of Pairing on BREW Mobile Phones.
Proceedings of the Advances in Information and Computer Security, 2010

A Frst Step Towards Automated Permission-enforcement Analysis of the Android Framework.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme.
IEICE Transactions, 2009

Design of Anonymous Attribute Authentication Mechanism.
IEICE Transactions, 2009

Privacy-Aware Location Database Service for Granular Queries.
Proceedings of the Information Security Theory and Practice. Smart Devices, 2009

An Offline Peer-to-peer Broadcasting Scheme with Anonymity.
Proceedings of the SECRYPT 2009, 2009

How to Bootstrap Security for Ad-Hoc Network: Revisited.
Proceedings of the Emerging Challenges for Security, 2009

Offline Peer-to-Peer Broadcast with Anonymity.
Proceedings of the e-Business and Telecommunications - 6th International Joint Conference, 2009

Obfuscation Mechanism in Conjunction with Tamper-Proof Module.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism.
JIP, 2008

On a Fast (k, n)-Threshold Secret Sharing Scheme.
IEICE Transactions, 2008

A Fast (3, n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations.
IEICE Transactions, 2008

Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Transactions, 2008

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
IACR Cryptology ePrint Archive, 2008

Ternary Subset Difference Method and Its Quantitative Analysis.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.
Proceedings of the Information Security, 11th International Conference, 2008

2007
Actual Condition and Issues for Mobile Security System.
JIPS, 2007

On Effectiveness of Clock Control in Stream Ciphers.
IEICE Transactions, 2007

2006
Evaluation of Dual-Structure Key-management Scheme Suitable for Mobile Services.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

2003
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.
Proceedings of the Information Security Applications, 4th International Workshop, 2003


  Loading...