Kanta Matsuura
Orcid: 0009-0005-0348-026X
According to our database1,
Kanta Matsuura
authored at least 100 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Int. J. Inf. Sec., February, 2024
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the IEEE International Conference on Blockchain, 2024
On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the IEEE International Conference on Communications, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
2022
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures.
IEICE Trans. Inf. Syst., November, 2022
Ledger, June, 2022
Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks.
Proceedings of the 25th International Symposium on Research in Attacks, 2022
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022
2021
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers.
DTRAP, 2021
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets.
IEICE Trans. Inf. Syst., 2020
IEICE Trans. Inf. Syst., 2020
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Privacy Analysis and Evaluation Policy of Blockchain-based Anonymous Cryptocurrencies.
CoRR, 2020
2019
Improvement of Anomaly Detection Performance Using Packet Flow Regularity in Industrial Control Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
My script engines know what you did in the dark: converting engines into script API tracers.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions.
Proceedings of the Information Security - 21st International Conference, 2018
Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2016
Secur. Commun. Networks, 2016
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
2015
Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models.
J. Inf. Process., 2015
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2015
Light-weight secrecy system using channels with insertion errors: Cryptographic implications.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015
2014
Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics.
IEEE Trans. Inf. Forensics Secur., 2014
A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification.
IEICE Trans. Inf. Syst., 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
2013
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Sci. China Inf. Sci., 2013
Proceedings of the 6th ACM India Computing Convention, 2013
Sectoral and Regional Interdependency of Japanese Firms Under the Influence of Information Security Risks.
Proceedings of the Economics of Information Security and Privacy, 2013
2012
Des. Codes Cryptogr., 2012
Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012
2011
Analysis of Awareness Gap between Security Managers and Workers in an Organization with Regard to the Effectiveness of the Information Security Measures.
J. Inf. Process., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Appl. Math. Lett., 2011
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting.
Proceedings of the Applied Cryptography and Network Security, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Progress in Cryptology, 2009
Proceedings of the Information and Communications Security, 11th International Conference, 2009
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
Proceedings of the Topics in Cryptology, 2009
Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model.
Proceedings of the Managing Information Risk and the Economics of Security, 2009
2008
Empirical-Analysis Methodology for Information-Security Investment and Its Application to Reliable Survey of Japanese Firms.
Inf. Media Technol., 2008
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Trans. Inf. Syst., 2008
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Trans. Inf. Syst., 2008
Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008
Proceedings of the Public Key Cryptography, 2008
Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.
Proceedings of the Information Security and Cryptology, 2008
2007
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007
Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Proceedings of the Provable Security, 2007
Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
2006
Inf. Media Technol., 2006
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication.
IACR Cryptol. ePrint Arch., 2006
An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006
Proceedings of the LATIN 2006: Theoretical Informatics, 2006
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.
Proceedings of the Progress in Cryptology, 2006
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
Proceedings of the Applied Algebra, 2006
2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005
2004
The Challenge of Providing a Voter Registration System for Millions of Filipinos Living Overseas.
Proceedings of the Electronic Government: Third International Conference, 2004
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004
2003
An Architecture of a Secure Database for Networked Collaborative Activities.
Proceedings of the ICEIS 2003, 2003
2002
Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal.
Proceedings of the ICEIS 2002, 2002
2001
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce.
Proceedings of the Information and Communications Security, Third International Conference, 2001
1999
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack.
Proceedings of the Information and Communication Security, Second International Conference, 1999
1998
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1998
1995
IEEE Trans. Biomed. Eng., 1995