Attribute-based encryption with partially hidden encryptor-specified access structures T Nishide, K Yoneyama, K Ohta Applied Cryptography and Network Security: 6th International Conference …, 2008 | 545 | 2008 |
Strongly secure authenticated key exchange from factoring, codes, and lattices A Fujioka, K Suzuki, K Xagawa, K Yoneyama Designs, Codes and Cryptography 76, 469-504, 2015 | 153 | 2015 |
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism A Fujioka, K Suzuki, K Xagawa, K Yoneyama Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 58 | 2013 |
Strongly secure two-pass attribute-based authenticated key exchange K Yoneyama Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010 | 41 | 2010 |
Efficient and strongly secure password-based server aided key exchange K Yoneyama Information and Media Technologies 4 (4), 1046-1059, 2009 | 29 | 2009 |
Supersingular isogeny Diffie–Hellman authenticated key exchange A Fujioka, K Takashima, S Terada, K Yoneyama Information Security and Cryptology–ICISC 2018: 21st International …, 2019 | 28 | 2019 |
UC-secure dynamic searchable symmetric encryption scheme K Kurosawa, K Sasaki, K Ohta, K Yoneyama Advances in Information and Computer Security: 11th International Workshop …, 2016 | 28 | 2016 |
Secret handshake: Strong anonymity definition and construction Y Kawai, K Yoneyama, K Ohta International Conference on Information Security Practice and Experience …, 2009 | 25 | 2009 |
Leaky random oracle K Yoneyama, S Miyagawa, K Ohta Provable Security: Second International Conference, ProvSec 2008, Shanghai …, 2008 | 23 | 2008 |
Attribute-based encryption with partially hidden ciphertext policies T Nishide, K Yoneyama, K Ohta IEICE transactions on fundamentals of electronics, communications and …, 2009 | 20 | 2009 |
One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary K Yoneyama IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013 | 19 | 2013 |
One-round authenticated group key exchange from isogenies A Fujioka, K Takashima, K Yoneyama Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019 | 17 | 2019 |
Exposure-resilient one-round tripartite key exchange without random oracles K Suzuki, K Yoneyama IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014 | 17 | 2014 |
Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage K Yoneyama, Y Zhao International Conference on Provable Security, 348-365, 2011 | 16 | 2011 |
Post-quantum variants of ISO/IEC standards: compact chosen ciphertext secure key encapsulation mechanism from isogeny K Yoneyama Proceedings of the 5th ACM Workshop on Security Standardisation Research …, 2019 | 14 | 2019 |
Leaky Random Oracle K Yoneyama, S Miyagawa, K Ohta IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2009 | 14 | 2009 |
Visual secret sharing schemes for multiple secret images allowing the rotation of shares M Iwamoto, L Wang, K Yoneyama, N Kunihiro, K Ohta IEICE transactions on fundamentals of electronics, communications and …, 2006 | 13 | 2006 |
Multi-cast key distribution: scalable, dynamic and provably secure construction K Yoneyama, R Yoshida, Y Kawahara, T Kobayashi, H Fuji, T Yamamoto Provable Security: 10th International Conference, ProvSec 2016, Nanjing …, 2016 | 12 | 2016 |
Secure cross-realm client-to-client password-based authenticated key exchange against undetectable on-line dictionary attacks K Yoneyama, H Ota, K Ohta Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 17th …, 2007 | 12 | 2007 |
Password-based authenticated key exchange from standard isogeny assumptions S Terada, K Yoneyama Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019 | 11 | 2019 |