Yuta Kodera

Orcid: 0000-0002-6482-6122

According to our database1, Yuta Kodera authored at least 55 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques.
Sensors, July, 2024

A Blockchain-based Approach with zk-SNARKs for Secure Email Applications.
Int. J. Netw. Comput., 2024

ELiPS-based Ciphertext-Policy Attribute-Based Encryption.
Int. J. Netw. Comput., 2024

Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

2023
Period and Some Distribution Properties of a Nonlinear Filter Generator with Dynamic Mapping.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2023

Improvement of Miller Loop for a Pairing on FK12 Curve and Evaluation with other STNFS Curves.
Int. J. Netw. Comput., 2023

Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023

A Consideration of Parameters for a Nonlinear Filter Generator and its Linear Complexity Profile.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

A Consideration of Averaging the Calculation Cost of CVMA for A Secure Session based Data Transmission.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

An Attack for a 116bit ECDLP for a Barreto-Naehrig Curve.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

A modified M-sequence with dynamic mapping and its autocorrelation.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive Operation.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

2022
A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain.
Sensors, 2022

Efficient Final Exponentiation for Cyclotomic Families of Pairing-Friendly Elliptic Curves with Any Prime Embedding Degrees.
Int. J. Netw. Comput., 2022

Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs.
Entropy, 2022

A Method to Eliminate Fruitless Cycles for Pollard's Rho Method by Splitting a Seed-point Table for a Random Walk.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022

Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022

Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2021
Sophisticated analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve.
Int. J. Netw. Comput., 2021

Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators.
Entropy, 2021

Consideration of Generating Suitable Parameters for Constructing type (h, m) Gauss Period Normal Basis.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

A Proposal for Testing Physical Random Numbers Using Stochastic Process.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

Secure Comparison Protocol for Promoting Business to Business Collaboration on the Blockchain.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

A Property Management System Using Image Recognition by YOLO.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Consideration of the side-channel attack to SPECK implemented on Arduino Uno.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Consideration of the side-channel attack to SIMON implemented on Arduino Uno.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

2020
Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist.
Int. J. Netw. Comput., 2020

Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol.
Proceedings of the Advances in Information and Computer Security, 2020

A Parallel Blum-Micali Generator Based on the Gauss Periods.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2019
Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages.
Int. J. Netw. Comput., 2019

Algebraic Group Structure of the Random Number Generator: Theoretical Analysis of NTU Sequence(s).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A Consideration on Generating Uniform Binary Sequence with High Linear Complexity.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

Boundary for the Linear Complexity of Well Balanced NTU.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

NIST Statistical Test for Random Sequence Generated by Möbius Function.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-Box.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

2018
An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno.
Int. J. Netw. Comput., 2018

Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
Efficient Optimal Ate Pairing at 128-bit Security Level.
IACR Cryptol. ePrint Arch., 2017

An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom Sequence.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017


  Loading...