Yuta Kodera
Orcid: 0000-0002-6482-6122
  According to our database1,
  Yuta Kodera
  authored at least 69 papers
  between 2017 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
Facial Privacy Protection with Dynamic Multi-User Access Control for Online Photo Platforms.
    
  
    Future Internet, 2025
    
  
Optimized Ensemble Deep Learning for Real-Time Intrusion Detection on Resource-Constrained Raspberry Pi Devices.
    
  
    IEEE Access, 2025
    
  
Efficient AES SubBytes Implementation for IoT Devices Using Composite Field Arithmetic and Polynomial Ring Representation.
    
  
    Proceedings of the 26th IEEE International Conference on High Performance Switching and Routing, 2025
    
  
  2024
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques.
    
  
    Sensors, July, 2024
    
  
    Int. J. Netw. Comput., 2024
    
  
    Int. J. Netw. Comput., 2024
    
  
Generative Adversarial Networks for Imbalanced Dataset Intrusion Detection in Software-Defined Networking.
    
  
    Proceedings of the International Symposium on Information Theory and Its Applications, 2024
    
  
Investigating the Role of D Flip-Flop as a Synchronization Circuit for Enhancing Randomness and Stabilizing Bit Distribution in Ro-Based Rng on Fpga.
    
  
    Proceedings of the International Symposium on Information Theory and Its Applications, 2024
    
  
Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM.
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics, 2024
    
  
    Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024
    
  
An In-depth Analysis of Kerberos and Blockchain Integration on VANETs' Security and Performance.
    
  
    Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024
    
  
Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys.
    
  
    Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024
    
  
Optimizing CRYSTALS-Dilithium in Rust: Radix-4 NTT and Assembly-level Comparison with Official C Implementation.
    
  
    Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024
    
  
    Proceedings of the 13th IEEE Global Conference on Consumer Electronics, 2024
    
  
A Study of Layer-2 Consortium Blockchain with zk-SNARKs for Medical Information Management.
    
  
    Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024
    
  
An Implementation of USB-Enabled Network Isolation for Remote IoT Security Exercises.
    
  
    Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024
    
  
NUSS:Non-Interactive Updatable of Secret Sharing Schemes Using Homomorphic Encryption.
    
  
    Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024
    
  
    Proceedings of the Twelfth International Symposium on Computing and Networking, CANDAR 2024, 2024
    
  
  2023
Period and Some Distribution Properties of a Nonlinear Filter Generator with Dynamic Mapping.
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2023
    
  
Improvement of Miller Loop for a Pairing on FK12 Curve and Evaluation with other STNFS Curves.
    
  
    Int. J. Netw. Comput., 2023
    
  
Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
    
  
    Proceedings of the Mobile Internet Security - 7th International Conference, 2023
    
  
A Consideration of Parameters for a Nonlinear Filter Generator and its Linear Complexity Profile.
    
  
    Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
    
  
Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System.
    
  
    Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
    
  
A Consideration of Averaging the Calculation Cost of CVMA for A Secure Session based Data Transmission.
    
  
    Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
    
  
    Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
    
  
    Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
    
  
A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime.
    
  
    Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
    
  
An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology.
    
  
    Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
    
  
A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive Operation.
    
  
    Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
    
  
A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application.
    
  
    Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
    
  
    Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
    
  
  2022
A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain.
    
  
    Sensors, 2022
    
  
Efficient Final Exponentiation for Cyclotomic Families of Pairing-Friendly Elliptic Curves with Any Prime Embedding Degrees.
    
  
    Int. J. Netw. Comput., 2022
    
  
Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs.
    
  
    Entropy, 2022
    
  
A Method to Eliminate Fruitless Cycles for Pollard's Rho Method by Splitting a Seed-point Table for a Random Walk.
    
  
    Proceedings of the Tenth International Symposium on Computing and Networking, 2022
    
  
    Proceedings of the Tenth International Symposium on Computing and Networking, 2022
    
  
Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates.
    
  
    Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
    
  
  2021
Sophisticated analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve.
    
  
    Int. J. Netw. Comput., 2021
    
  
Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators.
    
  
    Entropy, 2021
    
  
Consideration of Generating Suitable Parameters for Constructing type (h, m) Gauss Period Normal Basis.
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
    
  
Secure Comparison Protocol for Promoting Business to Business Collaboration on the Blockchain.
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
    
  
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees.
    
  
    Proceedings of the Ninth International Symposium on Computing and Networking, 2021
    
  
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS.
    
  
    Proceedings of the Ninth International Symposium on Computing and Networking, 2021
    
  
    Proceedings of the Ninth International Symposium on Computing and Networking, 2021
    
  
    Proceedings of the Ninth International Symposium on Computing and Networking, 2021
    
  
  2020
Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist.
    
  
    Int. J. Netw. Comput., 2020
    
  
Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator.
    
  
    Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020
    
  
    Proceedings of the Advances in Information and Computer Security, 2020
    
  
    Proceedings of the International Symposium on Information Theory and Its Applications, 2020
    
  
  2019
Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages.
    
  
    Int. J. Netw. Comput., 2019
    
  
Algebraic Group Structure of the Random Number Generator: Theoretical Analysis of NTU Sequence(s).
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019
    
  
    Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019
    
  
Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library.
    
  
    Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
    
  
A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller.
    
  
    Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
    
  
Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence.
    
  
    Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
    
  
Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-Box.
    
  
    Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
    
  
An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code.
    
  
    Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
    
  
  2018
An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno.
    
  
    Int. J. Netw. Comput., 2018
    
  
Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field.
    
  
    IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
    
  
    Proceedings of the Information Security Applications - 19th International Conference, 2018
    
  
Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field.
    
  
    Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018
    
  
    Proceedings of the Sixth International Symposium on Computing and Networking, 2018
    
  
  2017
    Proceedings of the Progress in Cryptology - INDOCRYPT 2017, 2017
    
  
An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom Sequence.
    
  
    Proceedings of the Fifth International Symposium on Computing and Networking, 2017
    
  
An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller.
    
  
    Proceedings of the Fifth International Symposium on Computing and Networking, 2017