Preventing abuse of cookies stolen by XSS H Takahashi, K Yasunaga, M Mambo, K Kim, HY Youm 2013 Eighth Asia joint conference on information security, 85-89, 2013 | 25 | 2013 |
On the list decodability of insertions and deletions T Hayashi, K Yasunaga IEEE Transactions on Information Theory 66 (9), 5335-5343, 2020 | 24 | 2020 |
Practical card-based protocol for three-input majority K Yasunaga IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020 | 19 | 2020 |
General constructions of rational secret sharing with expected constant-round reconstruction A Kawachi, Y Okamoto, K Tanaka, K Yasunaga The Computer Journal 60 (5), 711-728, 2017 | 17 | 2017 |
Rational proofs against rational verifiers K Inasawa, K Yasunaga IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017 | 13 | 2017 |
A game-theoretic perspective on oblivious transfer H Higo, K Tanaka, A Yamada, K Yasunaga Australasian Conference on Information Security and Privacy, 29-42, 2012 | 11 | 2012 |
Replacing probability distributions in security games via Hellinger distance K Yasunaga 2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021 | 9 | 2021 |
Leakage-resilience of stateless/stateful public-key encryption from hash proofs MH Nguyen, K Yasunaga, K Tanaka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013 | 9 | 2013 |
Bit security as computational cost for winning games with high probability S Watanabe, K Yasunaga International Conference on the Theory and Application of Cryptology and …, 2021 | 8 | 2021 |
On the limitations of computational fuzzy extractors K Yasunaga, K Yuzawa Cryptology ePrint Archive, 2014 | 8 | 2014 |
Game-theoretic security for bit commitment H Higo, K Tanaka, K Yasunaga International workshop on security, 303-318, 2013 | 8 | 2013 |
Public-key encryption with lazy parties K Yasunaga IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016 | 6 | 2016 |
Randomness leakage in the kem/dem framework H Namiki, K Tanaka, K Yasunaga Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011 | 6 | 2011 |
Determination of the local weight distribution of binary linear block codes K Yasunaga, T Fujiwara IEEE transactions on information theory 52 (10), 4444-4454, 2006 | 5 | 2006 |
An algorithm for computing the local distance profile of binary linear codes closed under a group of permutations K YASUNAGA IEICE Technical Report, IT2003-47, 2003 | 5 | 2003 |
Improved bounds for codes correcting insertions and deletions K Yasunaga Designs, Codes and Cryptography 92 (5), 1267-1278, 2024 | 4 | 2024 |
Unified view for notions of bit security S Watanabe, K Yasunaga International Conference on the Theory and Application of Cryptology and …, 2023 | 4 | 2023 |
Repeated games for generating randomness in encryption K Yasunaga, K Yuzawa IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018 | 4 | 2018 |
Post-challenge leakage resilient public-key cryptosystem in split state model E Fujisaki, A Kawachi, R Nishimaki, K Tanaka, K Yasunaga IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015 | 4 | 2015 |
The local weight distributions of the (128, 50) extended binary primitive BCH code and the (128, 64) Reed-Muller code K Yasunaga, T Fujiwara IEICE Technical Report; IEICE Tech. Rep. 104 (229), 7-12, 2004 | 4 | 2004 |