Kazukuni Kobara
Orcid: 0000-0002-4854-5742
According to our database1,
Kazukuni Kobara
authored at least 102 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Power Analysis of Floating-Point Operations for Leakage Resistance Evaluation of Neural Network Model Parameters.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
2019
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
2018
IEICE Trans. Inf. Syst., 2018
2017
IEEE Trans. Dependable Secur. Comput., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
2016
IEICE Trans. Inf. Syst., 2016
A secure anonymous password-based authentication protocol with control of authentication numbers.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
2014
Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays.
J. Inf. Process., 2014
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE.
Int. J. Netw. Secur., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Kernel Memory Protection by an Insertable Hypervisor Which Has VM Introspection and Stealth Breakpoints.
Proceedings of the Advances in Information and Computer Security, 2014
In search of secure domain parameters under strong diffie-hellman and related assumptions.
Proceedings of the International Symposium on Information Theory and its Applications, 2014
2013
Proceedings of the 2013 World Congress on Internet Security, 2013
Proceedings of the MEDINFO 2013, 2013
Energy and area saving effect of Dynamic Partial Reconfiguration on a 28-nm process FPGA.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013
2012
RFC, June, 2012
HB<sup>♭</sup> protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's response.
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012
2011
Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks.
IEICE Trans. Inf. Syst., 2011
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011
2010
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems.
Wirel. Pers. Commun., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the Global Communications Conference, 2010
A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results.
Proceedings of the Financial Cryptography and Data Security, 2010
2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009
Proceedings of the Information Theoretic Security, 4th International Conference, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
Proceedings of the Applied Algebra, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Commun., 2008
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Trans. Inf. Syst., 2008
IACR Cryptol. ePrint Arch., 2008
Des. Codes Cryptogr., 2008
Protocols for purpose-restricted anonymous communications in IP-based wireless networks.
Comput. Commun., 2008
Proceedings of the Mathematical Methods in Computer Science, 2008
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
2007
Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem.
IEEE Trans. Inf. Theory, 2007
An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IACR Cryptol. ePrint Arch., 2007
Comparative Studies in Key Disagreement Correction Process on Wireless Key Agreement System.
Proceedings of the Information Security Applications, 8th International Workshop, 2007
Proceedings of the IEEE 18th International Symposium on Personal, 2007
Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007
A New Variant for an Attack Against RSA Signature Verification Using Parameter Field.
Proceedings of the Public Key Infrastructure, 2007
Proceedings of the Applied Algebra, 2007
2006
IEEE J. Sel. Areas Commun., 2006
Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns - .
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Privacy Enhanced and Light Weight RFID System without Tag Synchronization and Exhaustive Search.
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the IEEE International Conference on Systems, 2006
A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006
Proceedings of the Information Security, 9th International Conference, 2006
Proceedings of the Progress in Cryptology, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Applied Algebra, 2006
2005
Leakage-resilient security architecture for mobile IPv6 in wireless overlay networks.
IEEE J. Sel. Areas Commun., 2005
A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Security Proof of "Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA".
IACR Cryptol. ePrint Arch., 2005
Proceedings of the WEWoRC 2005, 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size.
Proceedings of the Networking, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Proceedings of the Public Key Infrastructure, 2005
Proceedings of the Topics in Cryptology, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
Proceedings of the Information Security Applications, 5th International Workshop, 2004
Application of trust-metrics for evaluating performance system in ad-hoc networks with privacy.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004
2003
On the one-wayness against chosen-plaintext attacks of the Loidreau's modified McEliece PKC.
IEEE Trans. Inf. Theory, 2003
Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Information and Communications Security, 5th International Conference, 2003
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IACR Cryptol. ePrint Arch., 2002
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000.
Proceedings of the Public Key Cryptography, 2002
2001
Proceedings of the Public Key Cryptography, 2001
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.
Proceedings of the Advances in Cryptology, 2001
2000
Relationships among Differential, Truncated Differential, Impossible Differential Cryptanalyses against Word-Oriented Block Ciphers like RIJNDAEL, E2.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000
1999
Proceedings of the Information and Communication Security, Second International Conference, 1999
1998
A successive carrier-transmission model for narrow-band subliminal channels.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification.
Proceedings of the Advances in Cryptology, 1996
1994
Use of Gradated Patterns in An Associative Neural Memory for Invariant Pattern Recognition.
Int. J. Pattern Recognit. Artif. Intell., 1994