フォロー
Kenji Yasunaga
Kenji Yasunaga
確認したメール アドレス: ist.osaka-u.ac.jp
タイトル
引用先
引用先
Preventing abuse of cookies stolen by XSS
H Takahashi, K Yasunaga, M Mambo, K Kim, HY Youm
2013 Eighth Asia joint conference on information security, 85-89, 2013
252013
On the list decodability of insertions and deletions
T Hayashi, K Yasunaga
IEEE Transactions on Information Theory 66 (9), 5335-5343, 2020
242020
Practical card-based protocol for three-input majority
K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020
192020
General constructions of rational secret sharing with expected constant-round reconstruction
A Kawachi, Y Okamoto, K Tanaka, K Yasunaga
The Computer Journal 60 (5), 711-728, 2017
172017
Rational proofs against rational verifiers
K Inasawa, K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
132017
A game-theoretic perspective on oblivious transfer
H Higo, K Tanaka, A Yamada, K Yasunaga
Australasian Conference on Information Security and Privacy, 29-42, 2012
112012
Replacing probability distributions in security games via Hellinger distance
K Yasunaga
2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021
92021
Leakage-resilience of stateless/stateful public-key encryption from hash proofs
MH Nguyen, K Yasunaga, K Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
92013
Bit security as computational cost for winning games with high probability
S Watanabe, K Yasunaga
International Conference on the Theory and Application of Cryptology and …, 2021
82021
On the limitations of computational fuzzy extractors
K Yasunaga, K Yuzawa
Cryptology ePrint Archive, 2014
82014
Game-theoretic security for bit commitment
H Higo, K Tanaka, K Yasunaga
International workshop on security, 303-318, 2013
82013
Public-key encryption with lazy parties
K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
62016
Randomness leakage in the kem/dem framework
H Namiki, K Tanaka, K Yasunaga
Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011
62011
Determination of the local weight distribution of binary linear block codes
K Yasunaga, T Fujiwara
IEEE transactions on information theory 52 (10), 4444-4454, 2006
52006
An algorithm for computing the local distance profile of binary linear codes closed under a group of permutations
K YASUNAGA
IEICE Technical Report, IT2003-47, 2003
52003
Improved bounds for codes correcting insertions and deletions
K Yasunaga
Designs, Codes and Cryptography 92 (5), 1267-1278, 2024
42024
Unified view for notions of bit security
S Watanabe, K Yasunaga
International Conference on the Theory and Application of Cryptology and …, 2023
42023
Repeated games for generating randomness in encryption
K Yasunaga, K Yuzawa
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
42018
Post-challenge leakage resilient public-key cryptosystem in split state model
E Fujisaki, A Kawachi, R Nishimaki, K Tanaka, K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015
42015
The local weight distributions of the (128, 50) extended binary primitive BCH code and the (128, 64) Reed-Muller code
K Yasunaga, T Fujiwara
IEICE Technical Report; IEICE Tech. Rep. 104 (229), 7-12, 2004
42004
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20