Yuta Kodera
Orcid: 0000-0002-6482-6122
According to our database1,
Yuta Kodera
authored at least 60 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques.
Sensors, July, 2024
Int. J. Netw. Comput., 2024
Int. J. Netw. Comput., 2024
Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024
An In-depth Analysis of Kerberos and Blockchain Integration on VANETs' Security and Performance.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024
Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024
Optimizing CRYSTALS-Dilithium in Rust: Radix-4 NTT and Assembly-level Comparison with Official C Implementation.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2024
Proceedings of the 13th IEEE Global Conference on Consumer Electronics, 2024
2023
Period and Some Distribution Properties of a Nonlinear Filter Generator with Dynamic Mapping.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2023
Improvement of Miller Loop for a Pairing on FK12 Curve and Evaluation with other STNFS Curves.
Int. J. Netw. Comput., 2023
Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
A Consideration of Parameters for a Nonlinear Filter Generator and its Linear Complexity Profile.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
A Consideration of Averaging the Calculation Cost of CVMA for A Secure Session based Data Transmission.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023
An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive Operation.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
2022
A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain.
Sensors, 2022
Efficient Final Exponentiation for Cyclotomic Families of Pairing-Friendly Elliptic Curves with Any Prime Embedding Degrees.
Int. J. Netw. Comput., 2022
Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs.
Entropy, 2022
A Method to Eliminate Fruitless Cycles for Pollard's Rho Method by Splitting a Seed-point Table for a Random Walk.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022
Proceedings of the Tenth International Symposium on Computing and Networking, 2022
Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
2021
Sophisticated analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve.
Int. J. Netw. Comput., 2021
Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators.
Entropy, 2021
Consideration of Generating Suitable Parameters for Constructing type (h, m) Gauss Period Normal Basis.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
Secure Comparison Protocol for Promoting Business to Business Collaboration on the Blockchain.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
2020
Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist.
Int. J. Netw. Comput., 2020
Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020
Proceedings of the Advances in Information and Computer Security, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
2019
Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages.
Int. J. Netw. Comput., 2019
Algebraic Group Structure of the Random Number Generator: Theoretical Analysis of NTU Sequence(s).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019
Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-Box.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
2018
An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno.
Int. J. Netw. Comput., 2018
Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
2017
IACR Cryptol. ePrint Arch., 2017
An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom Sequence.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017