The SCEAS System
Navigation Menu

Search the dblp DataBase


Kazuo Ohta: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kenji Koyama, Kazuo Ohta
    Identity-based Conference Key Distribution Systems. [Citation Graph (1, 0)][DBLP]
    CRYPTO, 1987, pp:175-184 [Conf]
  2. Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta
    A Practical Secret Voting Scheme for Large Scale Elections. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:244-251 [Conf]
  3. Kazuo Ohta, Kenji Koyama
    Meet-in-the-Middle Attack on Digital Signature Schemes. [Citation Graph (0, 0)][DBLP]
    AUSCRYPT, 1990, pp:140-154 [Conf]
  4. Kazuo Ohta, Tatsuaki Okamoto
    A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:139-148 [Conf]
  5. Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi
    Results of Switching-Closure-Test on FEAL (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:247-252 [Conf]
  6. Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
    Improved Collision Search for SHA-0. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:21-36 [Conf]
  7. Silvio Micali, Kazuo Ohta, Leonid Reyzin
    Accountable-subgroup multisignatures: extended abstract. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:245-254 [Conf]
  8. Masahiro Mambo, Moises Rosales Salinas, Kazuo Ohta, Noboru Kunihiro
    Problems on the MR micropayment schemes. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:363- [Conf]
  9. Tatsuaki Okamoto, Kazuo Ohta
    How to Simultaneously Exchange Secrets by General Assumptions. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 1994, pp:184-192 [Conf]
  10. Kazuki Yoneyama, Kazuo Ohta
    Ring signatures: universally composable definitions and constructions. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2007, pp:374-376 [Conf]
  11. Yuichi Komano, Kazuo Ohta
    Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2003, pp:366-382 [Conf]
  12. Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi
    A Switching Closure Test to Analyze Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:183-193 [Conf]
  13. Kazuo Ohta, Kazumaro Aoki
    Linear Cryptanalysis of the Fast Data Encipherment Algorithm. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:12-16 [Conf]
  14. Kazuo Ohta, Mitsuru Matsui
    Differential Attack on Message Authentication Codes. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:200-211 [Conf]
  15. Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
    Improving the Search Algorithm for the Best Linear Expression. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:157-170 [Conf]
  16. Kazuo Ohta, Tatsuaki Okamoto
    A Modification of the Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1988, pp:232-243 [Conf]
  17. Kazuo Ohta, Tatsuaki Okamoto
    On Concrete Security Treatment of Signatures Derived from Identification. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:354-369 [Conf]
  18. Tatsuaki Okamoto, Kazuo Ohta
    Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1989, pp:481-496 [Conf]
  19. Tatsuaki Okamoto, Kazuo Ohta
    How to Utilize the Randomness of Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:456-475 [Conf]
  20. Tatsuaki Okamoto, Kazuo Ohta
    Universal Electronic Cash. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:324-337 [Conf]
  21. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
    Toward the Fair Anonymous Signatures: Deniable Ring Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2006, pp:174-191 [Conf]
  22. Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta
    Interactive Bi-Proof Systems and Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:243-256 [Conf]
  23. Kenji Koyama, Kazuo Ohta
    Security of Improved Identity-Based Conference Key Distribution Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1988, pp:11-19 [Conf]
  24. Shoji Miyaguchi, Kazuo Ohta, Masahiko Iwata
    Confirmation that Some Hash Functions Are Not Collision Free. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:326-343 [Conf]
  25. Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka
    Secure Bit Commitment Function against Divertibility. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1992, pp:324-340 [Conf]
  26. Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama
    Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:446-457 [Conf]
  27. Tatsuaki Okamoto, David Chaum, Kazuo Ohta
    Direct Zero Knowledge Proofs of Computational Power in Five Rounds. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1991, pp:96-105 [Conf]
  28. Tatsuaki Okamoto, Kazuo Ohta
    Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:134-148 [Conf]
  29. Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro
    Provably Secure Electronic Cash Based on Blind Multisignature Schemes. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:236-250 [Conf]
  30. Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta
    On strict estimation method of provable security against differential and linear cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:258-268 [Conf]
  31. Yuichi Komano, Kazuo Ohta
    Taxonomic Consideration to OAEP Variants and Their Security. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:105-117 [Conf]
  32. Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
    Improved Collision Attack on MD4 with Probability Almost 1. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:129-145 [Conf]
  33. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka
    A Sanitizable Signature Scheme with Aggregation. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:51-64 [Conf]
  34. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
    Formal Security Model of Multisignatures. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:146-160 [Conf]
  35. Kazuo Ohta
    Remarks on Blind Decryption. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:109-115 [Conf]
  36. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura
    On the Security of Probabilistic Multisignature Schemes and Their Optimality. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:132-150 [Conf]
  37. Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta
    A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:264-279 [Conf]
  38. Norio Adachi, Yuichi Komano, Satoshi Aoki, Kazuo Ohta
    The Security Problems of Rivest and Shamir's PayWord Scheme. [Citation Graph (0, 0)][DBLP]
    CEC, 2003, pp:20-23 [Conf]
  39. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama
    Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:232-242 [Conf]
  40. Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta
    Factorization of Square-Free Integers with High Bits Known. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:115-130 [Conf]
  41. Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
    How to Construct Sufficient Conditions for Hash Functions. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:243-259 [Conf]
  42. Norio Adachi, Satoshi Aoki, Yuichi Komano, Kazuo Ohta
    Solutions to Security Problems of Rivest and Shamir's PayWord Scheme. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:195-202 [Journal]
  43. Yuichi Komano, Kazuo Ohta
    OAEP-ES - Methodology of Universal Padding Technique. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:110-119 [Journal]
  44. Kazuo Ohta, Tetsuo Nishino, Seiya Okubo, Noboru Kunihiro
    A Quantum Algorithm Using NMR Computers to Break Secret-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    New Generation Comput., 2003, v:21, n:2, pp:- [Journal]
  45. Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
    A New Strategy for Finding a Differential Path of SHA-1. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:45-58 [Conf]
  46. Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
    New Message Difference for MD4. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:329-348 [Conf]
  47. Masayuki Terada, Kazuki Yoneyama, Sadayuki Hongo, Kazuo Ohta
    Modeling Agreement Problems in the Universal Composability Framework. [Citation Graph (0, 0)][DBLP]
    ICICS, 2007, pp:350-361 [Conf]
  48. Takashi Nishide, Kazuo Ohta
    Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:343-360 [Conf]

  49. Yet Another Sanitizable Signature from Bilinear Maps. [Citation Graph (, )][DBLP]

  50. A New Approach for Implementing the MPL Method toward Higher SPA Resistance. [Citation Graph (, )][DBLP]

  51. Multiple Designated Verifiers Signatures Reconsidered. [Citation Graph (, )][DBLP]

  52. Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks. [Citation Graph (, )][DBLP]

  53. Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. [Citation Graph (, )][DBLP]

  54. Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. [Citation Graph (, )][DBLP]

  55. How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! [Citation Graph (, )][DBLP]

  56. A strict evaluation method on the number of conditions for the SHA-1 collision search. [Citation Graph (, )][DBLP]

  57. Fault Sensitivity Analysis. [Citation Graph (, )][DBLP]

  58. Fault Analysis Attack against an AES Prototype Chip Using RSL. [Citation Graph (, )][DBLP]

  59. Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. [Citation Graph (, )][DBLP]

  60. Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. [Citation Graph (, )][DBLP]

  61. Power Variance Analysis breaks a masked ASIC implementation of AES. [Citation Graph (, )][DBLP]

  62. Improved countermeasure against Address-bit DPA for ECC scalar multiplication. [Citation Graph (, )][DBLP]

  63. New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. [Citation Graph (, )][DBLP]

  64. Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. [Citation Graph (, )][DBLP]

  65. Secret Handshake: Strong Anonymity Definition and Construction. [Citation Graph (, )][DBLP]

  66. Bit-Free Collision: Application to APOP Attack. [Citation Graph (, )][DBLP]

  67. Sanitizable and Deletable Signature. [Citation Graph (, )][DBLP]

  68. Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. [Citation Graph (, )][DBLP]

  69. Leaky Random Oracle (Extended Abstract). [Citation Graph (, )][DBLP]

  70. Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. [Citation Graph (, )][DBLP]

Search in 0.071secs, Finished in 0.074secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002