Yoshikazu Hanatani

According to our database1, Yoshikazu Hanatani authored at least 16 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Query-Based External Information Leakage Attacks on Face Recognition Models.
Proceedings of the International Joint Conference on Neural Networks, 2024

AdversariaLeak: External Information Leakage Attack Using Adversarial Samples on Face Recognition Systems.
Proceedings of the Computer Vision - ECCV 2024, 2024

2021
Verification of Group Key Management of IEEE 802.21 Using ProVerif.
IEICE Trans. Inf. Syst., 2021

2019
Non-malleable encryption with proofs of plaintext knowledge and applications to voting.
IACR Cryptol. ePrint Arch., 2019

2016
Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models.
Secur. Commun. Networks, 2016

Analyzing and Fixing the QACCE Security of QUIC.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

Secure Multicast Group Management and Key Distribution in IEEE 802.21.
Proceedings of the Security Standardisation Research - Third International Conference, 2016

2015
NM-CPA Secure Encryption with Proofs of Plaintext Knowledge.
Proceedings of the Advances in Information and Computer Security, 2015

2012
Factor-4 and 6 (De)compression for Values of Pairings using Trace Maps.
IACR Cryptol. ePrint Arch., 2012

Secure authenticated key exchange with revocation for smart grid.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

2011
Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption.
Proceedings of the Provable Security - 5th International Conference, 2011

A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication.
Proceedings of the Financial Cryptography and Data Security, 2011

2010
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility.
IACR Cryptol. ePrint Arch., 2010

Generating Parameters for Algebraic Torus-Based Cryptosystems.
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010

2007
Provably Secure Untraceable Electronic Cash against Insider Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
Provably Secure Electronic Cash Based on Blind Multisignature Schemes.
Proceedings of the Financial Cryptography and Data Security, 2006


  Loading...