Search the dblp DataBase
Kazuo Ohta :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Kenji Koyama , Kazuo Ohta Identity-based Conference Key Distribution Systems. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1987, pp:175-184 [Conf ] Atsushi Fujioka , Tatsuaki Okamoto , Kazuo Ohta A Practical Secret Voting Scheme for Large Scale Elections. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:244-251 [Conf ] Kazuo Ohta , Kenji Koyama Meet-in-the-Middle Attack on Digital Signature Schemes. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:140-154 [Conf ] Kazuo Ohta , Tatsuaki Okamoto A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:139-148 [Conf ] Hikaru Morita , Kazuo Ohta , Shoji Miyaguchi Results of Switching-Closure-Test on FEAL (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:247-252 [Conf ] Yusuke Naito , Yu Sasaki , Takeshi Shimoyama , Jun Yajima , Noboru Kunihiro , Kazuo Ohta Improved Collision Search for SHA-0. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:21-36 [Conf ] Silvio Micali , Kazuo Ohta , Leonid Reyzin Accountable-subgroup multisignatures: extended abstract. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:245-254 [Conf ] Masahiro Mambo , Moises Rosales Salinas , Kazuo Ohta , Noboru Kunihiro Problems on the MR micropayment schemes. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2006, pp:363- [Conf ] Tatsuaki Okamoto , Kazuo Ohta How to Simultaneously Exchange Secrets by General Assumptions. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 1994, pp:184-192 [Conf ] Kazuki Yoneyama , Kazuo Ohta Ring signatures: universally composable definitions and constructions. [Citation Graph (0, 0)][DBLP ] ASIACCS, 2007, pp:374-376 [Conf ] Yuichi Komano , Kazuo Ohta Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2003, pp:366-382 [Conf ] Hikaru Morita , Kazuo Ohta , Shoji Miyaguchi A Switching Closure Test to Analyze Cryptosystems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:183-193 [Conf ] Kazuo Ohta , Kazumaro Aoki Linear Cryptanalysis of the Fast Data Encipherment Algorithm. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1994, pp:12-16 [Conf ] Kazuo Ohta , Mitsuru Matsui Differential Attack on Message Authentication Codes. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1993, pp:200-211 [Conf ] Kazuo Ohta , Shiho Moriai , Kazumaro Aoki Improving the Search Algorithm for the Best Linear Expression. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1995, pp:157-170 [Conf ] Kazuo Ohta , Tatsuaki Okamoto A Modification of the Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1988, pp:232-243 [Conf ] Kazuo Ohta , Tatsuaki Okamoto On Concrete Security Treatment of Signatures Derived from Identification. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1998, pp:354-369 [Conf ] Tatsuaki Okamoto , Kazuo Ohta Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:481-496 [Conf ] Tatsuaki Okamoto , Kazuo Ohta How to Utilize the Randomness of Zero-Knowledge Proofs. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:456-475 [Conf ] Tatsuaki Okamoto , Kazuo Ohta Universal Electronic Cash. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:324-337 [Conf ] Yuichi Komano , Kazuo Ohta , Atsushi Shimbo , Shin-ichi Kawamura Toward the Fair Anonymous Signatures: Deniable Ring Signatures. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2006, pp:174-191 [Conf ] Atsushi Fujioka , Tatsuaki Okamoto , Kazuo Ohta Interactive Bi-Proof Systems and Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:243-256 [Conf ] Kenji Koyama , Kazuo Ohta Security of Improved Identity-Based Conference Key Distribution Systems. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:11-19 [Conf ] Shoji Miyaguchi , Kazuo Ohta , Masahiko Iwata Confirmation that Some Hash Functions Are Not Collision Free. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:326-343 [Conf ] Kazuo Ohta , Tatsuaki Okamoto , Atsushi Fujioka Secure Bit Commitment Function against Divertibility. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:324-340 [Conf ] Kazuo Ohta , Tatsuaki Okamoto , Kenji Koyama Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:446-457 [Conf ] Tatsuaki Okamoto , David Chaum , Kazuo Ohta Direct Zero Knowledge Proofs of Computational Power in Five Rounds. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:96-105 [Conf ] Tatsuaki Okamoto , Kazuo Ohta Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:134-148 [Conf ] Yoshikazu Hanatani , Yuichi Komano , Kazuo Ohta , Noboru Kunihiro Provably Secure Electronic Cash Based on Blind Multisignature Schemes. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2006, pp:236-250 [Conf ] Yasuyoshi Kaneko , Shiho Moriai , Kazuo Ohta On strict estimation method of provable security against differential and linear cryptanalysis. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:258-268 [Conf ] Yuichi Komano , Kazuo Ohta Taxonomic Consideration to OAEP Variants and Their Security. [Citation Graph (0, 0)][DBLP ] ICICS, 2004, pp:105-117 [Conf ] Yusuke Naito , Yu Sasaki , Noboru Kunihiro , Kazuo Ohta Improved Collision Attack on MD4 with Probability Almost 1. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:129-145 [Conf ] Tetsuya Izu , Noboru Kunihiro , Kazuo Ohta , Masahiko Takenaka , Takashi Yoshioka A Sanitizable Signature Scheme with Aggregation. [Citation Graph (0, 0)][DBLP ] ISPEC, 2007, pp:51-64 [Conf ] Yuichi Komano , Kazuo Ohta , Atsushi Shimbo , Shin-ichi Kawamura Formal Security Model of Multisignatures. [Citation Graph (0, 0)][DBLP ] ISC, 2006, pp:146-160 [Conf ] Kazuo Ohta Remarks on Blind Decryption. [Citation Graph (0, 0)][DBLP ] ISW, 1997, pp:109-115 [Conf ] Yuichi Komano , Kazuo Ohta , Atsushi Shimbo , Shin-ichi Kawamura On the Security of Probabilistic Multisignature Schemes and Their Optimality. [Citation Graph (0, 0)][DBLP ] Mycrypt, 2005, pp:132-150 [Conf ] Masayuki Kanda , Youichi Takashima , Tsutomu Matsumoto , Kazumaro Aoki , Kazuo Ohta A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 1998, pp:264-279 [Conf ] Norio Adachi , Yuichi Komano , Satoshi Aoki , Kazuo Ohta The Security Problems of Rivest and Shamir's PayWord Scheme. [Citation Graph (0, 0)][DBLP ] CEC, 2003, pp:20-23 [Conf ] Tetsuya Izu , Noboru Kunihiro , Kazuo Ohta , Takeshi Shimoyama Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. [Citation Graph (0, 0)][DBLP ] WISA, 2005, pp:232-242 [Conf ] Bagus Santoso , Noboru Kunihiro , Naoki Kanayama , Kazuo Ohta Factorization of Square-Free Integers with High Bits Known. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:115-130 [Conf ] Yu Sasaki , Yusuke Naito , Jun Yajima , Takeshi Shimoyama , Noboru Kunihiro , Kazuo Ohta How to Construct Sufficient Conditions for Hash Functions. [Citation Graph (0, 0)][DBLP ] VIETCRYPT, 2006, pp:243-259 [Conf ] Norio Adachi , Satoshi Aoki , Yuichi Komano , Kazuo Ohta Solutions to Security Problems of Rivest and Shamir's PayWord Scheme. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:195-202 [Journal ] Yuichi Komano , Kazuo Ohta OAEP-ES - Methodology of Universal Padding Technique. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:110-119 [Journal ] Kazuo Ohta , Tetsuo Nishino , Seiya Okubo , Noboru Kunihiro A Quantum Algorithm Using NMR Computers to Break Secret-Key Cryptosystems. [Citation Graph (0, 0)][DBLP ] New Generation Comput., 2003, v:21, n:2, pp:- [Journal ] Jun Yajima , Yu Sasaki , Yusuke Naito , Terutoshi Iwasaki , Takeshi Shimoyama , Noboru Kunihiro , Kazuo Ohta A New Strategy for Finding a Differential Path of SHA-1. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:45-58 [Conf ] Yu Sasaki , Lei Wang , Kazuo Ohta , Noboru Kunihiro New Message Difference for MD4. [Citation Graph (0, 0)][DBLP ] FSE, 2007, pp:329-348 [Conf ] Masayuki Terada , Kazuki Yoneyama , Sadayuki Hongo , Kazuo Ohta Modeling Agreement Problems in the Universal Composability Framework. [Citation Graph (0, 0)][DBLP ] ICICS, 2007, pp:350-361 [Conf ] Takashi Nishide , Kazuo Ohta Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:343-360 [Conf ] Yet Another Sanitizable Signature from Bilinear Maps. [Citation Graph (, )][DBLP ] A New Approach for Implementing the MPL Method toward Higher SPA Resistance. [Citation Graph (, )][DBLP ] Multiple Designated Verifiers Signatures Reconsidered. [Citation Graph (, )][DBLP ] Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks. [Citation Graph (, )][DBLP ] Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures. [Citation Graph (, )][DBLP ] Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. [Citation Graph (, )][DBLP ] How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! [Citation Graph (, )][DBLP ] A strict evaluation method on the number of conditions for the SHA-1 collision search. [Citation Graph (, )][DBLP ] Fault Sensitivity Analysis. [Citation Graph (, )][DBLP ] Fault Analysis Attack against an AES Prototype Chip Using RSL. [Citation Graph (, )][DBLP ] Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness. [Citation Graph (, )][DBLP ] Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. [Citation Graph (, )][DBLP ] Power Variance Analysis breaks a masked ASIC implementation of AES. [Citation Graph (, )][DBLP ] Improved countermeasure against Address-bit DPA for ECC scalar multiplication. [Citation Graph (, )][DBLP ] New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. [Citation Graph (, )][DBLP ] Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform. [Citation Graph (, )][DBLP ] Secret Handshake: Strong Anonymity Definition and Construction. [Citation Graph (, )][DBLP ] Bit-Free Collision: Application to APOP Attack. [Citation Graph (, )][DBLP ] Sanitizable and Deletable Signature. [Citation Graph (, )][DBLP ] Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. [Citation Graph (, )][DBLP ] Leaky Random Oracle (Extended Abstract). [Citation Graph (, )][DBLP ] Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. [Citation Graph (, )][DBLP ] Search in 0.071secs, Finished in 0.074secs