Search the dblp DataBase
Kazukuni Kobara :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Yang Cui , Kazukuni Kobara , Hideki Imai On Achieving Chosen Ciphertext Security with Decryption Errors. [Citation Graph (0, 0)][DBLP ] AAECC, 2006, pp:173-182 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:269-284 [Conf ] Makoto Sugita , Kazukuni Kobara , Kazuhiro Uehara , Shuji Kubota , Hideki Imai Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2. [Citation Graph (0, 0)][DBLP ] AES Candidate Conference, 2000, pp:242-254 [Conf ] Nuttapong Attrapadung , Kazukuni Kobara , Hideki Imai Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:374-391 [Conf ] Kazukuni Kobara , Hideki Imai Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:185-195 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai Leakage-Resilient Authenticated Key Establishment Protocols. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2003, pp:155-172 [Conf ] Makoto Sugita , Kazukuni Kobara , Hideki Imai Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2001, pp:193-207 [Conf ] Yang Cui , Kazukuni Kobara , Hideki Imai A Generic Conversion with Optimal Redundancy. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2005, pp:104-117 [Conf ] Nuttapong Attrapadung , Kazukuni Kobara , Hideki Imai Broadcast encryption with short keys and transmissions. [Citation Graph (0, 0)][DBLP ] Digital Rights Management Workshop, 2003, pp:55-66 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2005, pp:191-205 [Conf ] Yang Cui , Kazukuni Kobara , Hideki Imai Compact Conversion Schemes for the Probabilistic OW-PCA Primitives. [Citation Graph (0, 0)][DBLP ] ICICS, 2003, pp:269-279 [Conf ] Kazukuni Kobara , Hideki Imai Self-synchronized message randomization methods for subliminal channels. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:325-334 [Conf ] Kazukuni Kobara , Hideki Imai On the Channel Capacity of Narrow-Band Subliminal Channels. [Citation Graph (0, 0)][DBLP ] ICICS, 1999, pp:309-323 [Conf ] Kazukuni Kobara , Hideki Imai A successive carrier-transmission model for narrow-band subliminal channels. [Citation Graph (0, 0)][DBLP ] ICISC, 1998, pp:179-187 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. [Citation Graph (0, 0)][DBLP ] ICN (2), 2005, pp:944-952 [Conf ] Kazukuni Kobara , Taiho Kanaoka , Koukichi Munechika , Yoshihiko Hamamoto , Shingo Tomita Use of Gradated Patterns in an Associative Neural Memory for Invariant Pattern Recognition. [Citation Graph (0, 0)][DBLP ] ICPIA, 1992, pp:179-194 [Conf ] Ryo Nojima , Kazukuni Kobara , Hideki Imai Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2006, pp:303-316 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai An Authentication and Key Exchange Protocol for Secure Credential Services. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:443-458 [Conf ] Kazukuni Kobara , Hideki Imai Semantically Secure McEliece Public-Key Cryptosystems-Conversions for McEliece PKC. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2001, pp:19-35 [Conf ] Kazukuni Kobara , Hideki Imai New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2002, pp:237-251 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai A Secure Network Storage System with Information Privacy. [Citation Graph (0, 0)][DBLP ] WEWoRC, 2005, pp:22-31 [Conf ] Mira Kim , Kazukuni Kobara , Hideki Imai Dynamic Fingerprinting over Broadcast Using Revocation Scheme. [Citation Graph (0, 0)][DBLP ] WISA, 2004, pp:251-263 [Conf ] Kazukuni Kobara , Hideki Imai Pretty-Simple Password-Authenticated Key-Exchange Protocol [Citation Graph (0, 0)][DBLP ] CoRR, 2001, v:0, n:, pp:- [Journal ] Kazukuni Kobara , Taiho Kanaoka , Yoshihiko Hamamoto , Shingo Tomita , Koukichi Munechika Use of Gradated Patterns in An Associative Neural Memory for Invariant Pattern Recognition. [Citation Graph (0, 0)][DBLP ] IJPRAI, 1994, v:8, n:2, pp:595-607 [Journal ] Kazukuni Kobara , Hideki Imai On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2003, v:49, n:12, pp:3160-3168 [Journal ] Marc P. C. Fossorier , Kazukuni Kobara , Hideki Imai Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2007, v:53, n:1, pp:402-411 [Journal ] SeongHan Shin , Kazukuni Kobara , Hideki Imai An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. [Citation Graph (0, 0)][DBLP ] CIS, 2006, pp:767-777 [Conf ] Yutaka Oiwa , Kazukuni Kobara , Hajime Watanabe A New Variant for an Attack Against RSA Signature Verification Using Parameter Field. [Citation Graph (0, 0)][DBLP ] EuroPKI, 2007, pp:143-153 [Conf ] SeongHan Shin , Kazukuni Kobara , Hideki Imai A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol. [Citation Graph (0, 0)][DBLP ] IWSEC, 2007, pp:444-458 [Conf ] Kazuto Ogawa , Goichiro Hanaoka , Kazukuni Kobara , Kanta Matsuura , Hideki Imai Anonymous Pay-TV System with Secure Revenue Sharing. [Citation Graph (0, 0)][DBLP ] KES (3), 2007, pp:984-991 [Conf ] SeongHan Shin , Hanane Fathi , Mohamed Imine , Kazukuni Kobara , Neeli R. Prasad , Hideki Imai A New Security Architecture for Personal Networks. [Citation Graph (0, 0)][DBLP ] GLOBECOM, 2006, pp:- [Conf ] Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions. [Citation Graph (, )][DBLP ] On the Key-Privacy Issue of McEliece Public-Key Encryption. [Citation Graph (, )][DBLP ] Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE. [Citation Graph (, )][DBLP ] Partnership in key exchange protocols. [Citation Graph (, )][DBLP ] A security framework for personal networks. [Citation Graph (, )][DBLP ] A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results. [Citation Graph (, )][DBLP ] Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack. [Citation Graph (, )][DBLP ] Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System. [Citation Graph (, )][DBLP ] Code-Based Public-Key Cryptosystems and Their Applications. [Citation Graph (, )][DBLP ] Coding-Based Oblivious Transfer. [Citation Graph (, )][DBLP ] Lightweight broadcast authentication protocols reconsidered. [Citation Graph (, )][DBLP ] A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks. [Citation Graph (, )][DBLP ] Protocols for purpose-restricted anonymous communications in IP-based wireless networks. [Citation Graph (, )][DBLP ] Semantic security for the McEliece cryptosystem without random oracles. [Citation Graph (, )][DBLP ] Search in 0.005secs, Finished in 0.006secs