Follow
Kazuki Yoneyama
Kazuki Yoneyama
Verified email at vc.ibaraki.ac.jp - Homepage
Title
Cited by
Cited by
Year
Attribute-based encryption with partially hidden encryptor-specified access structures
T Nishide, K Yoneyama, K Ohta
Applied Cryptography and Network Security: 6th International Conference …, 2008
5662008
Strongly secure authenticated key exchange from factoring, codes, and lattices
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Designs, Codes and Cryptography 76, 469-504, 2015
1562015
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
592013
Strongly secure two-pass attribute-based authenticated key exchange
K Yoneyama
Pairing-Based Cryptography-Pairing 2010: 4th International Conference …, 2010
412010
UC-secure dynamic searchable symmetric encryption scheme
K Kurosawa, K Sasaki, K Ohta, K Yoneyama
Advances in Information and Computer Security: 11th International Workshop …, 2016
302016
Efficient and strongly secure password-based server aided key exchange
K Yoneyama
Information and Media Technologies 4 (4), 1046-1059, 2009
302009
Supersingular isogeny Diffie–Hellman authenticated key exchange
A Fujioka, K Takashima, S Terada, K Yoneyama
Information Security and Cryptology–ICISC 2018: 21st International …, 2019
292019
Secret handshake: Strong anonymity definition and construction
Y Kawai, K Yoneyama, K Ohta
International Conference on Information Security Practice and Experience …, 2009
252009
Leaky random oracle
K Yoneyama, S Miyagawa, K Ohta
Provable Security: Second International Conference, ProvSec 2008, Shanghai …, 2008
232008
Attribute-based encryption with partially hidden ciphertext policies
T Nishide, K Yoneyama, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2009
202009
One-round authenticated key exchange with strong forward secrecy in the standard model against constrained adversary
K Yoneyama
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
192013
One-round authenticated group key exchange from isogenies
A Fujioka, K Takashima, K Yoneyama
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019
172019
Exposure-resilient one-round tripartite key exchange without random oracles
K Suzuki, K Yoneyama
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014
172014
Taxonomical security consideration of authenticated key exchange resilient to intermediate computation leakage
K Yoneyama, Y Zhao
International Conference on Provable Security, 348-365, 2011
162011
Post-quantum variants of ISO/IEC standards: compact chosen ciphertext secure key encapsulation mechanism from isogeny
K Yoneyama
Proceedings of the 5th ACM Workshop on Security Standardisation Research …, 2019
152019
Leaky Random Oracle
K Yoneyama, S Miyagawa, K Ohta
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2009
142009
Visual secret sharing schemes for multiple secret images allowing the rotation of shares
M Iwamoto, L Wang, K Yoneyama, N Kunihiro, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2006
132006
Password-based authenticated key exchange from standard isogeny assumptions
S Terada, K Yoneyama
Provable Security: 13th International Conference, ProvSec 2019, Cairns, QLD …, 2019
122019
Verifiable and forward secure dynamic searchable symmetric encryption with storage efficiency
K Yoneyama, S Kimura
Information and Communications Security: 19th International Conference …, 2018
122018
Multi-cast key distribution: scalable, dynamic and provably secure construction
K Yoneyama, R Yoshida, Y Kawahara, T Kobayashi, H Fuji, T Yamamoto
Provable Security: 10th International Conference, ProvSec 2016, Nanjing …, 2016
122016
The system can't perform the operation now. Try again later.
Articles 1–20