2009 | ||
---|---|---|
48 | EE | Kazukuni Kobara, SeongHan Shin, Mario Strefler: Partnership in key exchange protocols. ASIACCS 2009: 161-170 |
2008 | ||
47 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A security framework for personal networks. COMSWARE 2008: 682-690 |
46 | EE | Kazukuni Kobara, Kirill Morozov, Raphael Overbeck: Coding-Based Oblivious Transfer. MMICS 2008: 142-156 |
45 | EE | Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Hideki Imai: Protocols for purpose-restricted anonymous communications in IP-based wireless networks. Computer Communications 31(15): 3662-3671 (2008) |
44 | EE | Ryo Nojima, Hideki Imai, Kazukuni Kobara, Kirill Morozov: Semantic security for the McEliece cryptosystem without random oracles. Des. Codes Cryptography 49(1-3): 289-305 (2008) |
43 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Secure Authenticated Key Exchange Protocol for Credential Services. IEICE Transactions 91-A(1): 139-149 (2008) |
42 | EE | Kazukuni Kobara, Hideki Imai: IVs to Skip for Immunizing WEP against FMS Attack. IEICE Transactions 91-B(1): 164-171 (2008) |
41 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: RSA-Based Password-Authenticated Key Exchange, Revisited. IEICE Transactions 91-D(5): 1424-1438 (2008) |
40 | EE | Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way. IEICE Transactions 91-D(5): 1457-1465 (2008) |
2007 | ||
39 | EE | Shigenori Yamakawa, Yang Cui, Kazukuni Kobara, Manabu Hagiwara, Hideki Imai: On the Key-Privacy Issue of McEliece Public-Key Encryption. AAECC 2007: 168-177 |
38 | EE | Yutaka Oiwa, Kazukuni Kobara, Hajime Watanabe: A New Variant for an Attack Against RSA Signature Verification Using Parameter Field. EuroPKI 2007: 143-153 |
37 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. IWSEC 2007: 444-458 |
36 | EE | Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Anonymous Pay-TV System with Secure Revenue Sharing. KES (3) 2007: 984-991 |
35 | EE | Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack. PerCom Workshops 2007: 223-228 |
34 | EE | Toru Hashimoto, Takashi Itoh, Masazumi Ueba, Hisato Iwai, Hideichi Sasaoka, Kazukuni Kobara, Hideki Imai: Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. WISA 2007: 173-187 |
33 | EE | Marc P. C. Fossorier, Kazukuni Kobara, Hideki Imai: Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem. IEEE Transactions on Information Theory 53(1): 402-411 (2007) |
32 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction. IEICE Transactions 90-A(2): 474-490 (2007) |
2006 | ||
31 | EE | Yang Cui, Kazukuni Kobara, Hideki Imai: On Achieving Chosen Ciphertext Security with Decryption Errors. AAECC 2006: 173-182 |
30 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. CIS 2006: 767-777 |
29 | EE | SeongHan Shin, Hanane Fathi, Mohamed Imine, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai: A New Security Architecture for Personal Networks. GLOBECOM 2006 |
28 | EE | Ryo Nojima, Kazukuni Kobara, Hideki Imai: Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. INDOCRYPT 2006: 303-316 |
27 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: An Authentication and Key Exchange Protocol for Secure Credential Services. ISC 2006: 443-458 |
26 | EE | Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad: LR-AKE-Based AAA for Network Mobility (NEMO) Over Wireless Links. IEEE Journal on Selected Areas in Communications 24(9): 1725-1737 (2006) |
25 | EE | Kazukuni Kobara, Hideki Imai: Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - . IEICE Transactions 89-A(8): 2198-2206 (2006) |
2005 | ||
24 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. ACNS 2005: 269-284 |
23 | EE | Yang Cui, Kazukuni Kobara, Hideki Imai: A Generic Conversion with Optimal Redundancy. CT-RSA 2005: 104-117 |
22 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. EuroPKI 2005: 191-205 |
21 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. ICN (2) 2005: 944-952 |
20 | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Secure Network Storage System with Information Privacy. WEWoRC 2005: 22-31 | |
19 | EE | Hanane Fathi, SeongHan Shin, Kazukuni Kobara, Shyam S. Chakraborty, Hideki Imai, Ramjee Prasad: Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks. IEEE Journal on Selected Areas in Communications 23(11): 2182-2193 (2005) |
18 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications. IEICE Transactions 88-A(3): 736-754 (2005) |
2004 | ||
17 | EE | Mira Kim, Kazukuni Kobara, Hideki Imai: Dynamic Fingerprinting over Broadcast Using Revocation Scheme. WISA 2004: 251-263 |
2003 | ||
16 | EE | SeongHan Shin, Kazukuni Kobara, Hideki Imai: Leakage-Resilient Authenticated Key Establishment Protocols. ASIACRYPT 2003: 155-172 |
15 | EE | Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. ASIACRYPT 2003: 374-391 |
14 | EE | Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: Broadcast encryption with short keys and transmissions. Digital Rights Management Workshop 2003: 55-66 |
13 | EE | Yang Cui, Kazukuni Kobara, Hideki Imai: Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. ICICS 2003: 269-279 |
12 | Kazukuni Kobara, Hideki Imai: On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC. IEEE Transactions on Information Theory 49(12): 3160-3168 (2003) | |
2002 | ||
11 | EE | Kazukuni Kobara, Hideki Imai: New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. Public Key Cryptography 2002: 237-251 |
2001 | ||
10 | EE | Makoto Sugita, Kazukuni Kobara, Hideki Imai: Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. ASIACRYPT 2001: 193-207 |
9 | EE | Kazukuni Kobara, Hideki Imai: Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. Public Key Cryptography 2001: 19-35 |
8 | EE | Kazukuni Kobara, Hideki Imai: Pretty-Simple Password-Authenticated Key-Exchange Protocol CoRR cs.CR/0110024: (2001) |
2000 | ||
7 | Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai: Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. AES Candidate Conference 2000: 242-254 | |
1999 | ||
6 | Kazukuni Kobara, Hideki Imai: On the Channel Capacity of Narrow-Band Subliminal Channels. ICICS 1999: 309-323 | |
1998 | ||
5 | Kazukuni Kobara, Hideki Imai: A successive carrier-transmission model for narrow-band subliminal channels. ICISC 1998: 179-187 | |
1997 | ||
4 | Kazukuni Kobara, Hideki Imai: Self-synchronized message randomization methods for subliminal channels. ICICS 1997: 325-334 | |
1996 | ||
3 | Kazukuni Kobara, Hideki Imai: Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. ASIACRYPT 1996: 185-195 | |
1994 | ||
2 | Kazukuni Kobara, Taiho Kanaoka, Yoshihiko Hamamoto, Shingo Tomita, Koukichi Munechika: Use of Gradated Patterns in An Associative Neural Memory for Invariant Pattern Recognition. IJPRAI 8(2): 595-607 (1994) | |
1992 | ||
1 | Kazukuni Kobara, Taiho Kanaoka, Koukichi Munechika, Yoshihiko Hamamoto, Shingo Tomita: Use of Gradated Patterns in an Associative Neural Memory for Invariant Pattern Recognition. ICPIA 1992: 179-194 |