dblp.uni-trier.dewww.uni-trier.de

Kazukuni Kobara

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
48EEKazukuni Kobara, SeongHan Shin, Mario Strefler: Partnership in key exchange protocols. ASIACCS 2009: 161-170
2008
47EESeongHan Shin, Kazukuni Kobara, Hideki Imai: A security framework for personal networks. COMSWARE 2008: 682-690
46EEKazukuni Kobara, Kirill Morozov, Raphael Overbeck: Coding-Based Oblivious Transfer. MMICS 2008: 142-156
45EEHanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai: Protocols for purpose-restricted anonymous communications in IP-based wireless networks. Computer Communications 31(15): 3662-3671 (2008)
44EERyo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptography 49(1-3): 289-305 (2008)
43EESeongHan Shin, Kazukuni Kobara, Hideki Imai: A Secure Authenticated Key Exchange Protocol for Credential Services. IEICE Transactions 91-A(1): 139-149 (2008)
42EEKazukuni Kobara, Hideki Imai: IVs to Skip for Immunizing WEP against FMS Attack. IEICE Transactions 91-B(1): 164-171 (2008)
41EESeongHan Shin, Kazukuni Kobara, Hideki Imai: RSA-Based Password-Authenticated Key Exchange, Revisited. IEICE Transactions 91-D(5): 1424-1438 (2008)
40EEYang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way. IEICE Transactions 91-D(5): 1457-1465 (2008)
2007
39EEShigenori Yamakawa, Yang Cui, Kazukuni Kobara, Manabu Hagiwara, Hideki Imai: On the Key-Privacy Issue of McEliece Public-Key Encryption. AAECC 2007: 168-177
38EEYutaka Oiwa, Kazukuni Kobara, Hajime Watanabe: A New Variant for an Attack Against RSA Signature Verification Using Parameter Field. EuroPKI 2007: 143-153
37EESeongHan Shin, Kazukuni Kobara, Hideki Imai: A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. IWSEC 2007: 444-458
36EEKazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Anonymous Pay-TV System with Secure Revenue Sharing. KES (3) 2007: 984-991
35EEYang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack. PerCom Workshops 2007: 223-228
34EEToru Hashimoto, Takashi Itoh, Masazumi Ueba, Hisato Iwai, Hideichi Sasaoka, Kazukuni Kobara, Hideki Imai: Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. WISA 2007: 173-187
33EEMarc P. C. Fossorier, Kazukuni Kobara, Hideki Imai: Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem. IEEE Transactions on Information Theory 53(1): 402-411 (2007)
32EESeongHan Shin, Kazukuni Kobara, Hideki Imai: An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction. IEICE Transactions 90-A(2): 474-490 (2007)
2006
31EEYang Cui, Kazukuni Kobara, Hideki Imai: On Achieving Chosen Ciphertext Security with Decryption Errors. AAECC 2006: 173-182
30EESeongHan Shin, Kazukuni Kobara, Hideki Imai: An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. CIS 2006: 767-777
29EESeongHan Shin, Hanane Fathi, Mohamed Imine, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai: A New Security Architecture for Personal Networks. GLOBECOM 2006
28EERyo Nojima, Kazukuni Kobara, Hideki Imai: Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. INDOCRYPT 2006: 303-316
27EESeongHan Shin, Kazukuni Kobara, Hideki Imai: An Authentication and Key Exchange Protocol for Secure Credential Services. ISC 2006: 443-458
26EEHanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad: LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links. IEEE Journal on Selected Areas in Communications 24(9): 1725-1737 (2006)
25EEKazukuni Kobara, Hideki Imai: Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - . IEICE Transactions 89-A(8): 2198-2206 (2006)
2005
24EESeongHan Shin, Kazukuni Kobara, Hideki Imai: Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. ACNS 2005: 269-284
23EEYang Cui, Kazukuni Kobara, Hideki Imai: A Generic Conversion with Optimal Redundancy. CT-RSA 2005: 104-117
22EESeongHan Shin, Kazukuni Kobara, Hideki Imai: A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. EuroPKI 2005: 191-205
21EESeongHan Shin, Kazukuni Kobara, Hideki Imai: A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. ICN (2) 2005: 944-952
20 SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Secure Network Storage System with Information Privacy. WEWoRC 2005: 22-31
19EEHanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad: Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks. IEEE Journal on Selected Areas in Communications 23(11): 2182-2193 (2005)
18EESeongHan Shin, Kazukuni Kobara, Hideki Imai: A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications. IEICE Transactions 88-A(3): 736-754 (2005)
2004
17EEMira Kim, Kazukuni Kobara, Hideki Imai: Dynamic Fingerprinting over Broadcast Using Revocation Scheme. WISA 2004: 251-263
2003
16EESeongHan Shin, Kazukuni Kobara, Hideki Imai: Leakage-Resilient Authenticated Key Establishment Protocols. ASIACRYPT 2003: 155-172
15EENuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. ASIACRYPT 2003: 374-391
14EENuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: Broadcast encryption with short keys and transmissions. Digital Rights Management Workshop 2003: 55-66
13EEYang Cui, Kazukuni Kobara, Hideki Imai: Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. ICICS 2003: 269-279
12 Kazukuni Kobara, Hideki Imai: On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC. IEEE Transactions on Information Theory 49(12): 3160-3168 (2003)
2002
11EEKazukuni Kobara, Hideki Imai: New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. Public Key Cryptography 2002: 237-251
2001
10EEMakoto Sugita, Kazukuni Kobara, Hideki Imai: Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. ASIACRYPT 2001: 193-207
9EEKazukuni Kobara, Hideki Imai: Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. Public Key Cryptography 2001: 19-35
8EEKazukuni Kobara, Hideki Imai: Pretty-Simple Password-Authenticated Key-Exchange Protocol CoRR cs.CR/0110024: (2001)
2000
7 Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai: Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. AES Candidate Conference 2000: 242-254
1999
6 Kazukuni Kobara, Hideki Imai: On the Channel Capacity of Narrow-Band Subliminal Channels. ICICS 1999: 309-323
1998
5 Kazukuni Kobara, Hideki Imai: A successive carrier-transmission model for narrow-band subliminal channels. ICISC 1998: 179-187
1997
4 Kazukuni Kobara, Hideki Imai: Self-synchronized message randomization methods for subliminal channels. ICICS 1997: 325-334
1996
3 Kazukuni Kobara, Hideki Imai: Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. ASIACRYPT 1996: 185-195
1994
2 Kazukuni Kobara, Taiho Kanaoka, Yoshihiko Hamamoto, Shingo Tomita, Koukichi Munechika: Use of Gradated Patterns in An Associative Neural Memory for Invariant Pattern Recognition. IJPRAI 8(2): 595-607 (1994)
1992
1 Kazukuni Kobara, Taiho Kanaoka, Koukichi Munechika, Yoshihiko Hamamoto, Shingo Tomita: Use of Gradated Patterns in an Associative Neural Memory for Invariant Pattern Recognition. ICPIA 1992: 179-194

Coauthor Index

1Nuttapong Attrapadung [14] [15]
2Shyam S. Chakraborty [19] [26]
3Yang Cui [13] [23] [31] [35] [39] [40]
4Hanane Fathi [19] [26] [29] [45]
5Marc P. C. Fossorier [33]
6Manabu Hagiwara [39]
7Yoshihiko Hamamoto [1] [2]
8Goichiro Hanaoka [36]
9Toru Hashimoto [34]
10Hideki Imai [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [21] [22] [23] [24] [25] [26] [27] [28] [29] [30] [31] [32] [33] [34] [35] [36] [37] [39] [40] [41] [42] [43] [44] [45] [47]
11Mohamed Imine [29]
12Takashi Itoh [34]
13Hisato Iwai [34]
14Taiho Kanaoka [1] [2]
15Mira Kim [17]
16Shuji Kubota [7]
17Kanta Matsuura [35] [36] [40]
18Kirill Morozov [44] [46]
19Koukichi Munechika [1] [2]
20Ryo Nojima [28] [44]
21Kazuto Ogawa [36]
22Yutaka Oiwa [38]
23Raphael Overbeck [46]
24Neeli R. Prasad [29]
25Ramjee Prasad [19] [26]
26Hideichi Sasaoka [34]
27SeongHan Shin [16] [18] [19] [20] [21] [22] [24] [26] [27] [29] [30] [32] [37] [41] [43] [45] [47] [48]
28Mario Strefler [48]
29Makoto Sugita [7] [10]
30Shingo Tomita [1] [2]
31Masazumi Ueba [34]
32Kazuhiro Uehara [7]
33Hajime Watanabe [38]
34Shigenori Yamakawa [39]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)