2009 |
48 | EE | Kazukuni Kobara,
SeongHan Shin,
Mario Strefler:
Partnership in key exchange protocols.
ASIACCS 2009: 161-170 |
2008 |
47 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A security framework for personal networks.
COMSWARE 2008: 682-690 |
46 | EE | Kazukuni Kobara,
Kirill Morozov,
Raphael Overbeck:
Coding-Based Oblivious Transfer.
MMICS 2008: 142-156 |
45 | EE | Hanane Fathi,
SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
Protocols for purpose-restricted anonymous communications in IP-based wireless networks.
Computer Communications 31(15): 3662-3671 (2008) |
44 | EE | Ryo Nojima,
Hideki Imai,
Kazukuni Kobara,
Kirill Morozov:
Semantic security for the McEliece cryptosystem without random oracles.
Des. Codes Cryptography 49(1-3): 289-305 (2008) |
43 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Secure Authenticated Key Exchange Protocol for Credential Services.
IEICE Transactions 91-A(1): 139-149 (2008) |
42 | EE | Kazukuni Kobara,
Hideki Imai:
IVs to Skip for Immunizing WEP against FMS Attack.
IEICE Transactions 91-B(1): 164-171 (2008) |
41 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
RSA-Based Password-Authenticated Key Exchange, Revisited.
IEICE Transactions 91-D(5): 1424-1438 (2008) |
40 | EE | Yang Cui,
Kazukuni Kobara,
Kanta Matsuura,
Hideki Imai:
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Transactions 91-D(5): 1457-1465 (2008) |
2007 |
39 | EE | Shigenori Yamakawa,
Yang Cui,
Kazukuni Kobara,
Manabu Hagiwara,
Hideki Imai:
On the Key-Privacy Issue of McEliece Public-Key Encryption.
AAECC 2007: 168-177 |
38 | EE | Yutaka Oiwa,
Kazukuni Kobara,
Hajime Watanabe:
A New Variant for an Attack Against RSA Signature Verification Using Parameter Field.
EuroPKI 2007: 143-153 |
37 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol.
IWSEC 2007: 444-458 |
36 | EE | Kazuto Ogawa,
Goichiro Hanaoka,
Kazukuni Kobara,
Kanta Matsuura,
Hideki Imai:
Anonymous Pay-TV System with Secure Revenue Sharing.
KES (3) 2007: 984-991 |
35 | EE | Yang Cui,
Kazukuni Kobara,
Kanta Matsuura,
Hideki Imai:
Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
PerCom Workshops 2007: 223-228 |
34 | EE | Toru Hashimoto,
Takashi Itoh,
Masazumi Ueba,
Hisato Iwai,
Hideichi Sasaoka,
Kazukuni Kobara,
Hideki Imai:
Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.
WISA 2007: 173-187 |
33 | EE | Marc P. C. Fossorier,
Kazukuni Kobara,
Hideki Imai:
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem.
IEEE Transactions on Information Theory 53(1): 402-411 (2007) |
32 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction.
IEICE Transactions 90-A(2): 474-490 (2007) |
2006 |
31 | EE | Yang Cui,
Kazukuni Kobara,
Hideki Imai:
On Achieving Chosen Ciphertext Security with Decryption Errors.
AAECC 2006: 173-182 |
30 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security.
CIS 2006: 767-777 |
29 | EE | SeongHan Shin,
Hanane Fathi,
Mohamed Imine,
Kazukuni Kobara,
Neeli R. Prasad,
Hideki Imai:
A New Security Architecture for Personal Networks.
GLOBECOM 2006 |
28 | EE | Ryo Nojima,
Kazukuni Kobara,
Hideki Imai:
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.
INDOCRYPT 2006: 303-316 |
27 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
An Authentication and Key Exchange Protocol for Secure Credential Services.
ISC 2006: 443-458 |
26 | EE | Hanane Fathi,
SeongHan Shin,
Kazukuni Kobara,
Shyam S. Chakraborty,
Hideki Imai,
Ramjee Prasad:
LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links.
IEEE Journal on Selected Areas in Communications 24(9): 1725-1737 (2006) |
25 | EE | Kazukuni Kobara,
Hideki Imai:
Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - .
IEICE Transactions 89-A(8): 2198-2206 (2006) |
2005 |
24 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA.
ACNS 2005: 269-284 |
23 | EE | Yang Cui,
Kazukuni Kobara,
Hideki Imai:
A Generic Conversion with Optimal Redundancy.
CT-RSA 2005: 104-117 |
22 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange.
EuroPKI 2005: 191-205 |
21 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size.
ICN (2) 2005: 944-952 |
20 | | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Secure Network Storage System with Information Privacy.
WEWoRC 2005: 22-31 |
19 | EE | Hanane Fathi,
SeongHan Shin,
Kazukuni Kobara,
Shyam S. Chakraborty,
Hideki Imai,
Ramjee Prasad:
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks.
IEEE Journal on Selected Areas in Communications 23(11): 2182-2193 (2005) |
18 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications.
IEICE Transactions 88-A(3): 736-754 (2005) |
2004 |
17 | EE | Mira Kim,
Kazukuni Kobara,
Hideki Imai:
Dynamic Fingerprinting over Broadcast Using Revocation Scheme.
WISA 2004: 251-263 |
2003 |
16 | EE | SeongHan Shin,
Kazukuni Kobara,
Hideki Imai:
Leakage-Resilient Authenticated Key Establishment Protocols.
ASIACRYPT 2003: 155-172 |
15 | EE | Nuttapong Attrapadung,
Kazukuni Kobara,
Hideki Imai:
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
ASIACRYPT 2003: 374-391 |
14 | EE | Nuttapong Attrapadung,
Kazukuni Kobara,
Hideki Imai:
Broadcast encryption with short keys and transmissions.
Digital Rights Management Workshop 2003: 55-66 |
13 | EE | Yang Cui,
Kazukuni Kobara,
Hideki Imai:
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.
ICICS 2003: 269-279 |
12 | | Kazukuni Kobara,
Hideki Imai:
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC.
IEEE Transactions on Information Theory 49(12): 3160-3168 (2003) |
2002 |
11 | EE | Kazukuni Kobara,
Hideki Imai:
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000.
Public Key Cryptography 2002: 237-251 |
2001 |
10 | EE | Makoto Sugita,
Kazukuni Kobara,
Hideki Imai:
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.
ASIACRYPT 2001: 193-207 |
9 | EE | Kazukuni Kobara,
Hideki Imai:
Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC.
Public Key Cryptography 2001: 19-35 |
8 | EE | Kazukuni Kobara,
Hideki Imai:
Pretty-Simple Password-Authenticated Key-Exchange Protocol
CoRR cs.CR/0110024: (2001) |
2000 |
7 | | Makoto Sugita,
Kazukuni Kobara,
Kazuhiro Uehara,
Shuji Kubota,
Hideki Imai:
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2.
AES Candidate Conference 2000: 242-254 |
1999 |
6 | | Kazukuni Kobara,
Hideki Imai:
On the Channel Capacity of Narrow-Band Subliminal Channels.
ICICS 1999: 309-323 |
1998 |
5 | | Kazukuni Kobara,
Hideki Imai:
A successive carrier-transmission model for narrow-band subliminal channels.
ICISC 1998: 179-187 |
1997 |
4 | | Kazukuni Kobara,
Hideki Imai:
Self-synchronized message randomization methods for subliminal channels.
ICICS 1997: 325-334 |
1996 |
3 | | Kazukuni Kobara,
Hideki Imai:
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification.
ASIACRYPT 1996: 185-195 |
1994 |
2 | | Kazukuni Kobara,
Taiho Kanaoka,
Yoshihiko Hamamoto,
Shingo Tomita,
Koukichi Munechika:
Use of Gradated Patterns in An Associative Neural Memory for Invariant Pattern Recognition.
IJPRAI 8(2): 595-607 (1994) |
1992 |
1 | | Kazukuni Kobara,
Taiho Kanaoka,
Koukichi Munechika,
Yoshihiko Hamamoto,
Shingo Tomita:
Use of Gradated Patterns in an Associative Neural Memory for Invariant Pattern Recognition.
ICPIA 1992: 179-194 |