Kenji Yasunaga

Orcid: 0000-0002-5552-8457

According to our database1, Kenji Yasunaga authored at least 39 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improved bounds for codes correcting insertions and deletions.
Des. Codes Cryptogr., May, 2024

2023
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023

On the Limitations of Computational Fuzzy Extractors.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Rational Broadcast Protocols against Timid Adversaries.
IACR Cryptol. ePrint Arch., 2023

Bit-Security Preserving Hardness Amplification.
IACR Cryptol. ePrint Arch., 2023

Fuzzy Signature with Biometric-Independent Verification.
Proceedings of the 22nd International Conference of the Biometrics Special Interest Group, 2023

2022
Perfectly Secure Message Transmission Against Rational Adversaries.
IEEE J. Sel. Areas Inf. Theory, 2022

Unified View for Notions of Bit Security.
IACR Cryptol. ePrint Arch., 2022

2021
Replacing Probability Distributions in Security Games via Hellinger Distance.
IACR Cryptol. ePrint Arch., 2021

Bit Security as Computational Cost for Winning Games with High Probability.
IACR Cryptol. ePrint Arch., 2021

Improved Asymptotic Bounds for Codes Correcting Insertions and Deletions.
CoRR, 2021

2020
On the List Decodability of Insertions and Deletions.
IEEE Trans. Inf. Theory, 2020

Practical Card-Based Protocol for Three-Input Majority.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

A Construction of Robustly Reusable Fuzzy Extractors over Blockchains.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2019
Error Correction by Structural Simplicity: Correcting Samplable Additive Errors.
Comput. J., 2019

Perfectly Secure Message Transmission Against Independent Rational Adversaries.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

2018
Repeated Games for Generating Randomness in Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Perfectly Secure Message Transmission Against Rational Timid Adversaries.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

2017
Rational Proofs against Rational Verifiers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction.
Comput. J., 2017

2016
Public-Key Encryption with Lazy Parties.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Game-Theoretic Security for Two-Party Protocols.
IACR Cryptol. ePrint Arch., 2016

Error-Correcting Codes Against Chosen-Codeword Attacks.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

2015
Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
Randomness Leakage in the KEM/DEM Framework.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

On the Limits of Computational Fuzzy Extractors.
IACR Cryptol. ePrint Arch., 2014

Correction of samplable additive errors.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

2013
List Decoding of Reed-Muller Codes Based on a Generalized Plotkin Construction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Game-Theoretic Security for Bit Commitment.
Proceedings of the Advances in Information and Computer Security, 2013

Preventing Abuse of Cookies Stolen by XSS.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
A Game-Theoretic Perspective on Oblivious Transfer.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Weak Oblivious Transfer from Strong One-Way Functions.
Proceedings of the Provable Security - 5th International Conference, 2011

2010
On correctable errors of binary linear codes.
IEEE Trans. Inf. Theory, 2010

2008
Uncorrectable errors of weight half the minimum distance for binary linear codes.
Proceedings of the 2008 IEEE International Symposium on Information Theory, 2008

2007
Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Correctable Errors of Weight Half the Minimum Distance Plus One for the First-Order Reed-Muller Codes.
Proceedings of the Applied Algebra, 2007

2006
Determination of the Local Weight Distribution of Binary Linear Block Codes.
IEEE Trans. Inf. Theory, 2006

2005
Relations between the local weight distributions of a linear block code, its extended code, and its even weight subcode.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005


  Loading...