Yuichi Komano

According to our database1, Yuichi Komano authored at least 30 papers between 2003 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Efficient Algorithms for Sign Detection in RNS Using Approximate Reciprocals.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2019
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function.
Secur. Commun. Networks, 2019

Integrative Acceleration of First-order Boolean Masking for Embedded IoT Devices.
J. Inf. Process., 2019

RNS Montgomery reduction algorithms using quadratic residuosity.
J. Cryptogr. Eng., 2019

2018
Multi-party Computation Based on Physical Coins.
Proceedings of the Theory and Practice of Natural Computing - 7th International Conference, 2018

Analysis of Information Leakage Due to Operative Errors in Card-Based Protocols.
Proceedings of the Combinatorial Algorithms - 29th International Workshop, 2018

Efficient and Secure Firmware Update/Rollback Method for Vehicular Devices.
Proceedings of the Information Security Practice and Experience, 2018

2016
Exact Error Bound of Cox-Rower Architecture for RNS Arithmetic.
IACR Cryptol. ePrint Arch., 2016

2014
A new model of Client-Server Communications under information theoretic security.
Proceedings of the 2014 IEEE Information Theory Workshop, 2014

2012
Another look on the relation between template attack and higher order DPA.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

Secure authenticated key exchange with revocation for smart grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

2010
BS-CPA: Built-In Determined Sub-Key Correlation Power Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2009
Built-in Determined Sub-key Correlation Power Analysis.
IACR Cryptol. ePrint Arch., 2009

Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Provably Secure Multisignatures in Formal Security Model and Their Optimality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Toward the Fair Anonymous Signatures: Deniable Ring Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Fair Exchange of Signatures with Multiple Signers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Provably Secure Untraceable Electronic Cash against Insider Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
Taxonomical Security Consideration of OAEP Variants.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Formal Security Model of Multisignatures.
Proceedings of the Information Security, 9th International Conference, 2006

Provably Secure Electronic Cash Based on Blind Multisignature Schemes.
Proceedings of the Financial Cryptography and Data Security, 2006

2005
Solutions to Security Problems of Rivest and Shamir's PayWord Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

On the Security of Probabilistic Multisignature Schemes and Their Optimality.
Proceedings of the Progress in Cryptology, 2005

2004
OAEP-ES - Methodology of Universal Padding Technique.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way Permutation.
IACR Cryptol. ePrint Arch., 2004

Taxonomic Consideration to OAEP Variants and Their Security.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2003
The Security Problems of Rivest and Shamir's PayWord Scheme.
Proceedings of the 2003 IEEE International Conference on Electronic Commerce (CEC 2003), 2003

Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation.
Proceedings of the Advances in Cryptology, 2003


  Loading...