2014
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
Int. J. Netw. Secur., 2014
2010
Applications of Signcryption.
Proceedings of the Practical Signcryption, 2010
Efficient hybrid encryption from ID-based encryption.
Des. Codes Cryptogr., 2010
Practical Searching over Encrypted Data by Private Information Retrieval.
Proceedings of the Global Communications Conference, 2010
Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking.
Proceedings of the Global Communications Conference, 2010
2009
CCA-Secure Public Key Encryption without Group-Dependent Hash Functions.
IEICE Trans. Inf. Syst., 2009
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Tag-KEM from Set Partial Domain One-Way Permutations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Lightweight broadcast authentication protocols reconsidered.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Efficient and Adaptively Secure Append-Only Signature.
Proceedings of IEEE International Conference on Communications, 2009
2008
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Trans. Inf. Syst., 2008
2007
Formal Security Treatments for Signatures from Identity-Based Encryption.
Proceedings of the Provable Security, 2007
Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
On the Key-Privacy Issue of McEliece Public-Key Encryption.
Proceedings of the Applied Algebra, 2007
2006
Relations among Notions of Security for Identity Based Encryption Schemes.
Inf. Media Technol., 2006
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication.
IACR Cryptol. ePrint Arch., 2006
Relations Among Notions of Security for Identity Based Encryption Schemes.
Proceedings of the LATIN 2006: Theoretical Informatics, 2006
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.
Proceedings of the Progress in Cryptology, 2006
On Achieving Chosen Ciphertext Security with Decryption Errors.
Proceedings of the Applied Algebra, 2006
2005
Efficient Node Forwarding Strategies via Non-cooperative Game for Wireless Ad Hoc Networks.
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
A Generic Conversion with Optimal Redundancy.
Proceedings of the Topics in Cryptology, 2005
2003
Compact Conversion Schemes for the Probabilistic OW-PCA Primitives.
Proceedings of the Information and Communications Security, 5th International Conference, 2003