The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Kazukuni Kobara: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Yang Cui, Kazukuni Kobara, Hideki Imai
    On Achieving Chosen Ciphertext Security with Decryption Errors. [Citation Graph (0, 0)][DBLP]
    AAECC, 2006, pp:173-182 [Conf]
  2. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:269-284 [Conf]
  3. Makoto Sugita, Kazukuni Kobara, Kazuhiro Uehara, Shuji Kubota, Hideki Imai
    Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:242-254 [Conf]
  4. Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
    Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:374-391 [Conf]
  5. Kazukuni Kobara, Hideki Imai
    Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:185-195 [Conf]
  6. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    Leakage-Resilient Authenticated Key Establishment Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:155-172 [Conf]
  7. Makoto Sugita, Kazukuni Kobara, Hideki Imai
    Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:193-207 [Conf]
  8. Yang Cui, Kazukuni Kobara, Hideki Imai
    A Generic Conversion with Optimal Redundancy. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2005, pp:104-117 [Conf]
  9. Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai
    Broadcast encryption with short keys and transmissions. [Citation Graph (0, 0)][DBLP]
    Digital Rights Management Workshop, 2003, pp:55-66 [Conf]
  10. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2005, pp:191-205 [Conf]
  11. Yang Cui, Kazukuni Kobara, Hideki Imai
    Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. [Citation Graph (0, 0)][DBLP]
    ICICS, 2003, pp:269-279 [Conf]
  12. Kazukuni Kobara, Hideki Imai
    Self-synchronized message randomization methods for subliminal channels. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:325-334 [Conf]
  13. Kazukuni Kobara, Hideki Imai
    On the Channel Capacity of Narrow-Band Subliminal Channels. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:309-323 [Conf]
  14. Kazukuni Kobara, Hideki Imai
    A successive carrier-transmission model for narrow-band subliminal channels. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:179-187 [Conf]
  15. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. [Citation Graph (0, 0)][DBLP]
    ICN (2), 2005, pp:944-952 [Conf]
  16. Kazukuni Kobara, Taiho Kanaoka, Koukichi Munechika, Yoshihiko Hamamoto, Shingo Tomita
    Use of Gradated Patterns in an Associative Neural Memory for Invariant Pattern Recognition. [Citation Graph (0, 0)][DBLP]
    ICPIA, 1992, pp:179-194 [Conf]
  17. Ryo Nojima, Kazukuni Kobara, Hideki Imai
    Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:303-316 [Conf]
  18. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    An Authentication and Key Exchange Protocol for Secure Credential Services. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:443-458 [Conf]
  19. Kazukuni Kobara, Hideki Imai
    Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:19-35 [Conf]
  20. Kazukuni Kobara, Hideki Imai
    New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:237-251 [Conf]
  21. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Secure Network Storage System with Information Privacy. [Citation Graph (0, 0)][DBLP]
    WEWoRC, 2005, pp:22-31 [Conf]
  22. Mira Kim, Kazukuni Kobara, Hideki Imai
    Dynamic Fingerprinting over Broadcast Using Revocation Scheme. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:251-263 [Conf]
  23. Kazukuni Kobara, Hideki Imai
    Pretty-Simple Password-Authenticated Key-Exchange Protocol [Citation Graph (0, 0)][DBLP]
    CoRR, 2001, v:0, n:, pp:- [Journal]
  24. Kazukuni Kobara, Taiho Kanaoka, Yoshihiko Hamamoto, Shingo Tomita, Koukichi Munechika
    Use of Gradated Patterns in An Associative Neural Memory for Invariant Pattern Recognition. [Citation Graph (0, 0)][DBLP]
    IJPRAI, 1994, v:8, n:2, pp:595-607 [Journal]
  25. Kazukuni Kobara, Hideki Imai
    On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2003, v:49, n:12, pp:3160-3168 [Journal]
  26. Marc P. C. Fossorier, Kazukuni Kobara, Hideki Imai
    Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:402-411 [Journal]
  27. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:767-777 [Conf]
  28. Yutaka Oiwa, Kazukuni Kobara, Hajime Watanabe
    A New Variant for an Attack Against RSA Signature Verification Using Parameter Field. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:143-153 [Conf]
  29. SeongHan Shin, Kazukuni Kobara, Hideki Imai
    A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:444-458 [Conf]
  30. Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai
    Anonymous Pay-TV System with Secure Revenue Sharing. [Citation Graph (0, 0)][DBLP]
    KES (3), 2007, pp:984-991 [Conf]
  31. SeongHan Shin, Hanane Fathi, Mohamed Imine, Kazukuni Kobara, Neeli R. Prasad, Hideki Imai
    A New Security Architecture for Personal Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  32. Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. [Citation Graph (, )][DBLP]


  33. On the Key-Privacy Issue of McEliece Public-Key Encryption. [Citation Graph (, )][DBLP]


  34. Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. [Citation Graph (, )][DBLP]


  35. Partnership in key exchange protocols. [Citation Graph (, )][DBLP]


  36. A security framework for personal networks. [Citation Graph (, )][DBLP]


  37. A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results. [Citation Graph (, )][DBLP]


  38. Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack. [Citation Graph (, )][DBLP]


  39. Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. [Citation Graph (, )][DBLP]


  40. Code-Based Public-Key Cryptosystems and Their Applications. [Citation Graph (, )][DBLP]


  41. Coding-Based Oblivious Transfer. [Citation Graph (, )][DBLP]


  42. Lightweight broadcast authentication protocols reconsidered. [Citation Graph (, )][DBLP]


  43. A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks. [Citation Graph (, )][DBLP]


  44. Protocols for purpose-restricted anonymous communications in IP-based wireless networks. [Citation Graph (, )][DBLP]


  45. Semantic security for the McEliece cryptosystem without random oracles. [Citation Graph (, )][DBLP]


Search in 0.019secs, Finished in 0.021secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002