Toward the fair anonymous signatures: Deniable ring signatures Y Komano, K Ohta, A Shimbo, S Kawamura Cryptographers’ Track at the RSA Conference, 174-191, 2006 | 73* | 2006 |
Multisignature method, apparatus, program, and system Y Komano, K Ohta, S Kawamura, A Shimbo US Patent 7,496,759, 2009 | 40 | 2009 |
Secure authenticated key exchange with revocation for smart grid F Zhao, Y Hanatani, Y Komano, B Smyth, S Ito, T Kambayashi 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 1-8, 2012 | 36 | 2012 |
Efficient universal padding techniques for multiplicative trapdoor one-way permutation Y Komano, K Ohta Annual International Cryptology Conference, 366-382, 2003 | 35 | 2003 |
BS-CPA: Built-in determined sub-key correlation power analysis Y Komano, H Shimizu, S Kawamura IEICE transactions on fundamentals of electronics, communications and …, 2010 | 31 | 2010 |
Provably secure electronic cash based on blind multisignature schemes Y Hanatani, Y Komano, K Ohta, N Kunihiro Financial Cryptography and Data Security: 10th International Conference, FC …, 2006 | 30 | 2006 |
Encryption apparatus and encryption method Y Komano, H Shimizu, A Shimbo US Patent App. 11/523,609, 2007 | 28 | 2007 |
RNS montgomery reduction algorithms using quadratic residuosity S Kawamura, Y Komano, H Shimizu, T Yonemura Journal of Cryptographic Engineering 9, 313-331, 2019 | 25 | 2019 |
Encryption key generating apparatus and computer program product Y Komano, K Ohta, K Sakiyama US Patent 9,537,653, 2017 | 25 | 2017 |
Update control device, terminal, and method of controlling XIA Zhengfan, Y Komano, T Kawabata US Patent App. 15/894,161, 2019 | 21 | 2019 |
Encryption/signature method, apparatus, and program Y Komano, S Kawamura, A Shimbo US Patent App. 10/902,815, 2005 | 21 | 2005 |
The security problems of Rivest and Shamir's PayWord scheme N Adachi, S Aoki, Y Komano, K Ohta IEEE International Conference on E-Commerce, 2003. CEC 2003., 20-23, 2003 | 20 | 2003 |
Analysis of information leakage due to operative errors in card-based protocols T Mizuki, Y Komano Combinatorial Algorithms: 29th International Workshop, IWOCA 2018, Singapore …, 2018 | 19 | 2018 |
Apparatus and method for testing normality of shared data Y Komano, T Kawabata US Patent 10,255,428, 2019 | 16 | 2019 |
Formal security model of multisignatures Y Komano, K Ohta, A Shimbo, S Kawamura Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006 | 16 | 2006 |
Update control apparatus, software update system, and update control method Y Komano, XIA Zhengfan, T Kawabata US Patent 10,360,018, 2019 | 14 | 2019 |
Symmetric encryption apparatus and storage medium, and symmetric decryption apparatus and storage medium Y Komano, K Akiyama, Y Goto US Patent 9,413,729, 2016 | 14 | 2016 |
An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density K Matsuda, S Tada, M Nagata, Y Komano, Y Li, T Sugawara, M Iwamoto, ... Japanese Journal of Applied Physics 59 (SG), SGGL02, 2020 | 13 | 2020 |
Information processing device, power consumption calculating system and program product S Yamanaka, Y Komano, T Takahashi, S Ito US Patent App. 13/356,774, 2012 | 13 | 2012 |
Data management device, power usage calculation system, data management method, and computer program product S Yamanaka, Y Komano, S Ito US Patent 9,166,792, 2015 | 12 | 2015 |