Koutarou Suzuki
Orcid: 0000-0003-3464-1933
According to our database1,
Koutarou Suzuki
authored at least 46 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
2023
IEEE Access, 2023
2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
2020
Proceedings of the Advances in Information and Computer Security, 2020
2017
IACR Cryptol. ePrint Arch., 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
Des. Codes Cryptogr., 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Advances in Information and Computer Security, 2014
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014
Proceedings of the Progress in Cryptology - AFRICACRYPT 2014, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
Ephemeral Key Leakage Resilient and Efficient ID-AKEs That Can Share Identities, Private and Master Keys.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010
2009
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2009
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
2008
2007
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IACR Cryptol. ePrint Arch., 2007
2005
Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Secure distributed constraint satisfaction: reaching agreement without revealing private information.
Artif. Intell., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Financial Cryptography and Data Security, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Proceedings of the Financial Cryptography, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Financial Cryptography, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Information Security, 5th International Conference, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions.
Proceedings of the First International Joint Conference on Autonomous Agents & Multiagent Systems, 2002
2000
Proceedings of the Information Security and Cryptology, 2000