Kazukuni Kobara

According to our database1, Kazukuni Kobara authored at least 101 papers between 1994 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2019
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

2018
How to Preserve User Anonymity in Password-Based Anonymous Authentication Scheme.
IEICE Trans. Inf. Syst., 2018

2017
Simple Anonymous Password-Based Authenticated Key Exchange (SAPAKE), Reconsidered.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

2016
Cyber Physical Security for Industrial Control Systems and IoT.
IEICE Trans. Inf. Syst., 2016

A secure anonymous password-based authentication protocol with control of authentication numbers.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

A security framework for MQTT.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
On Finding Secure Domain Parameters Resistant to Cheon's Algorithm.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

On Unlinkability of Password-Based Anonymous Authentication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Hidden Credential Retrieval, Revisited.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays.
J. Inf. Process., 2014

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
Int. J. Netw. Secur., 2014

About Validity Checks of Augmented PAKE in IEEE 1363.2 and ISO/IEC 11770-4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints.
Proceedings of the Advances in Information and Computer Security, 2014

In search of secure domain parameters under strong diffie-hellman and related assumptions.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2013
Security Analysis of Password-Authenticated Key Retrieval.
IACR Cryptol. ePrint Arch., 2013

RSA-based Password-Authenticated Key Retrieval using multiple servers.
Proceedings of the 2013 World Congress on Internet Security, 2013

Securing SSL-VPN with LR-AKE to Access Personal Health Record.
Proceedings of the MEDINFO 2013, 2013

Energy and area saving effect of Dynamic Partial Reconfiguration on a 28-nm process FPGA.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

2012
Efficient Augmented Password-Only Authentication and Key Exchange for IKEv2.
RFC, June, 2012

HB<sup>♭</sup> protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's response.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Comparison of tools and simulators for control system security studies.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

2011
Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks.
IEICE Trans. Inf. Syst., 2011

A secure public cloud storage system.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

On advanced cryptographic techniques for information security of smart grid AMI.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

2010
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems.
Wirel. Pers. Commun., 2010

How to Strengthen the Security of RSA-OAEP.
IEEE Trans. Inf. Theory, 2010

Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Security Proof of AugPAKE.
IACR Cryptol. ePrint Arch., 2010

How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking.
Proceedings of the Global Communications Conference, 2010

A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
New security layer for overlay networks.
J. Commun. Networks, 2009

Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature.
IACR Cryptol. ePrint Arch., 2009

Lightweight broadcast authentication protocols reconsidered.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Code-Based Public-Key Cryptosystems and Their Applications.
Proceedings of the Information Theoretic Security, 4th International Conference, 2009

Partnership in key exchange protocols.
Proceedings of the 2009 ACM Symposium on Information, 2009

Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions.
Proceedings of the Applied Algebra, 2009

2008
A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

RSA-Based Password-Authenticated Key Exchange, Revisited.
IEICE Trans. Inf. Syst., 2008

A Secure Authenticated Key Exchange Protocol for Credential Services.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A New Security Architecture for Personal Networks and Its Performance Evaluation.
IEICE Trans. Commun., 2008

IVs to Skip for Immunizing WEP against FMS Attack.
IEICE Trans. Commun., 2008

Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Trans. Inf. Syst., 2008

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.
IACR Cryptol. ePrint Arch., 2008

Semantic security for the McEliece cryptosystem without random oracles.
Des. Codes Cryptogr., 2008

Protocols for purpose-restricted anonymous communications in IP-based wireless networks.
Comput. Commun., 2008

Coding-Based Oblivious Transfer.
Proceedings of the Mathematical Methods in Computer Science, 2008

A security framework for personal networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem.
IEEE Trans. Inf. Theory, 2007

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Oblivious Transfer via McEliece's PKC and Permuted Kernels.
IACR Cryptol. ePrint Arch., 2007

Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Protocols for Authenticated Anonymous Communications.
Proceedings of the IEEE 18th International Symposium on Personal, 2007

Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Anonymous Pay-TV System with Secure Revenue Sharing.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A New Variant for an Attack Against RSA Signature Verification Using Parameter Field.
Proceedings of the Public Key Infrastructure, 2007

On the Key-Privacy Issue of McEliece Public-Key Encryption.
Proceedings of the Applied Algebra, 2007

2006
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links.
IEEE J. Sel. Areas Commun., 2006

Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - .
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Privacy Enhanced and Light Weight RFID System without Tag Synchronization and Exhaustive Search.
Proceedings of the IEEE International Conference on Systems, 2006

Next Wireless Security Architecture for MJPv6.
Proceedings of the IEEE International Conference on Systems, 2006

A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

An Authentication and Key Exchange Protocol for Secure Credential Services.
Proceedings of the Information Security, 9th International Conference, 2006

Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.
Proceedings of the Progress in Cryptology, 2006

A New Security Architecture for Personal Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

On Achieving Chosen Ciphertext Security with Decryption Errors.
Proceedings of the Applied Algebra, 2006

2005
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks.
IEEE J. Sel. Areas Commun., 2005

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA".
IACR Cryptol. ePrint Arch., 2005

A Secure Network Storage System with Information Privacy.
Proceedings of the WEWoRC 2005, 2005

Authenticated key exchange for wireless security.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size.
Proceedings of the Networking, 2005

On the impact of security on latency in WLAN 802.11b.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange.
Proceedings of the Public Key Infrastructure, 2005

A Generic Conversion with Optimal Redundancy.
Proceedings of the Topics in Cryptology, 2005

Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
Dynamic Fingerprinting over Broadcast Using Revocation Scheme.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Application of trust-metrics for evaluating performance system in ad-hoc networks with privacy.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

2003
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC.
IEEE Trans. Inf. Theory, 2003

Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Pretty-Simple Password-Authenticated Key-Exchange Under Standard Assumptions.
IACR Cryptol. ePrint Arch., 2003

Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Broadcast encryption with short keys and transmissions.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

Leakage-Resilient Authenticated Key Establishment Protocols.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Semantically Secure McEliece Public-Key Cryptosystem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

OAEP++ : A Very Simple Way to Apply OAEP to Deterministic OW-CPA Primitives.
IACR Cryptol. ePrint Arch., 2002

New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000.
Proceedings of the Public Key Cryptography, 2002

2001
Pretty-Simple Password-Authenticated Key-Exchange Protocol
CoRR, 2001

Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC.
Proceedings of the Public Key Cryptography, 2001

Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.
Proceedings of the Advances in Cryptology, 2001

2000
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
On the Channel Capacity of Narrow-Band Subliminal Channels.
Proceedings of the Information and Communication Security, Second International Conference, 1999

1998
A successive carrier-transmission model for narrow-band subliminal channels.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

1997
Self-synchronized message randomization methods for subliminal channels.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification.
Proceedings of the Advances in Cryptology, 1996

1994
Use of Gradated Patterns in An Associative Neural Memory for Invariant Pattern Recognition.
Int. J. Pattern Recognit. Artif. Intell., 1994


  Loading...