What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kazuo Ohta
Google Scholar
86
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiapkc
Revisiting Relations of Security Notions in Searchable Encryption.
Kazuki Sato
Takumi Amada
Kyoichi Asano
Yohei Watanabe
Mitsugu Iwamoto
Kazuo Ohta
2024
conf/sacrypt
Multi-user Dynamic Searchable Encryption for Prefix-Fixing Predicates from Symmetric-Key Primitives.
Takato Hirano
Yutaka Kawai
Yoshihiro Koseki
Satoshi Yasuda
Yohei Watanabe
Takumi Amada
Mitsugu Iwamoto
Kazuo Ohta
2020
conf/provsec
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers.
Kaoru Takemure
Yusuke Sakai
Bagus Santoso
Goichiro Hanaoka
Kazuo Ohta
2019
conf/tcc
Efficient Private PEZ Protocols for Symmetric Functions.
Yoshiki Abe
Mitsugu Iwamoto
Kazuo Ohta
2016
conf/iwsec
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Takato Hirano
Mitsuhiro Hattori
Yutaka Kawai
Nori Matsuda
Mitsugu Iwamoto
Kazuo Ohta
Yusuke Sakai
Tatsuji Munaka
2016
conf/cans
Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.
Kenichiro Hayasaka
Yutaka Kawai
Yoshihiro Koseki
Takato Hirano
Kazuo Ohta
Mitsugu Iwamoto
2016
conf/cans
Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations.
Takeshi Nakai
Yuuki Tokushige
Yuto Misawa
Mitsugu Iwamoto
Kazuo Ohta
2015
conf/acisp
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Yusuke Sakai
Keita Emura
Jacob C. N. Schuldt
Goichiro Hanaoka
Kazuo Ohta
2014
conf/ccs
Privacy-preserving smart metering with verifiability for both billing and energy management.
Kazuma Ohara
Yusuke Sakai
Fumiaki Yoshida
Mitsugu Iwamoto
Kazuo Ohta
2014
conf/acns
Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions.
Yusuke Naito
Kazuki Yoneyama
Kazuo Ohta
2014
conf/ctrsa
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl.
Yu Sasaki
Yuuki Tokushige
Lei Wang
Mitsugu Iwamoto
Kazuo Ohta
2014
conf/africacrypt
Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum.
Kazuma Ohara
Kazuo Ohta
Koutarou Suzuki
Kazuki Yoneyama
2012
journals/tifs
Information-Theoretic Approach to Optimal Differential Fault Analysis.
Kazuo Sakiyama
Yang Li
Mitsugu Iwamoto
Kazuo Ohta
2012
journals/tifs
New Fault-Based Side-Channel Attack Using Fault Sensitivity.
Yang Li
Kazuo Ohta
Kazuo Sakiyama
2012
conf/icisc
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher.
Toshiki Nakasone
Yang Li
Yu Sasaki
Mitsugu Iwamoto
Kazuo Ohta
Kazuo Sakiyama
2012
conf/pkc
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
Yusuke Sakai
Jacob C. N. Schuldt
Keita Emura
Goichiro Hanaoka
Kazuo Ohta
2012
conf/fdtc
An Efficient Countermeasure against Fault Sensitivity Analysis Using Configurable Delay Blocks.
Sho Endo
Yang Li
Naofumi Homma
Kazuo Sakiyama
Kazuo Ohta
Takafumi Aoki
2012
conf/iwsec
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function.
Lei Wang
Yu Sasaki
Kazuo Sakiyama
Kazuo Ohta
2012
conf/iwsec
Boomerang Distinguishers for Full HAS-160 Compression Function.
Yu Sasaki
Lei Wang
Yasuhiro Takasaki
Kazuo Sakiyama
Kazuo Ohta
2012
conf/africacrypt
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA.
Yu Sasaki
Lei Wang
Yasuhide Sakai
Kazuo Sakiyama
Kazuo Ohta
2011
conf/fc
A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication.
Yoshikazu Hanatani
Miyako Ohkubo
Shin'ichiro Matsuo
Kazuo Sakiyama
Kazuo Ohta
2011
conf/provsec
Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model.
Yusuke Naito
Kazuki Yoneyama
Lei Wang
Kazuo Ohta
2011
conf/ches
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches.
Dai Yamamoto
Kazuo Sakiyama
Mitsugu Iwamoto
Kazuo Ohta
Takao Ochiai
Masahiko Takenaka
Kouichi Itoh
2011
conf/ches
On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attacks in a Combined Setting.
Amir Moradi
Oliver Mischke
Christof Paar
Yang Li
Kazuo Ohta
Kazuo Sakiyama
2011
conf/host
Revisit fault sensitivity analysis on WDDL-AES.
Yang Li
Kazuo Ohta
Kazuo Sakiyama
2011
conf/ctrsa
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach.
Lei Wang
Yu Sasaki
Wataru Komatsubara
Kazuo Ohta
Kazuo Sakiyama
2011
conf/fdtc
Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems.
Hikaru Sakamoto
Yang Li
Kazuo Ohta
Kazuo Sakiyama
2011
conf/iwsec
Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity.
Yu Sasaki
Naoyuki Takayanagi
Kazuo Sakiyama
Kazuo Ohta
2010
conf/ches
Fault Sensitivity Analysis.
Yang Li
Kazuo Sakiyama
Shigeto Gomisawa
Toshinori Fukunaga
Junko Takahashi
Kazuo Ohta
2010
conf/host
Prototyping Platform for Performance Evaluation of SHA-3 Candidates.
Kazuyuki Kobayashi
Jun Ikegami
Kazuo Sakiyama
Kazuo Ohta
Miroslav Knezevic
Ünal Koçabas
Junfeng Fan
Ingrid Verbauwhede
Eric Xu Guo
Shin'ichiro Matsuo
Sinan Huang
Leyla Nazhandali
Akashi Satoh
2010
conf/wisa
Combination of SW Countermeasure and CPU Modification on FPGA against Power Analysis.
Daisuke Nakatsu
Yang Li
Kazuo Sakiyama
Kazuo Ohta
2010
conf/ctrsa
Improving Efficiency of an ‘On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.
Bagus Santoso
Kazuo Ohta
Kazuo Sakiyama
Goichiro Hanaoka
2010
conf/iwsec
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.
Yusuke Sakai
Goichiro Hanaoka
Kaoru Kurosawa
Kazuo Ohta
2010
conf/iwsec
Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments.
Kazuki Yoneyama
Masayuki Terada
Sadayuki Hongo
Kazuo Ohta
2010
conf/asiacrypt
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl.
Yu Sasaki
Yang Li
Lei Wang
Kazuo Sakiyama
Kazuo Ohta
2009
conf/acns
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN.
Yuichi Komano
Kazuo Ohta
Hideyuki Miyake
Atsushi Shimbo
2009
conf/icics
Security Evaluation of a DPA-Resistant S-Box Based on the Fourier Transform.
Yang Li
Kazuo Sakiyama
Shin-ichi Kawamura
Yuichi Komano
Kazuo Ohta
2009
conf/ctrsa
Fault Analysis Attack against an AES Prototype Chip Using RSL.
Kazuo Sakiyama
Tatsuya Yagi
Kazuo Ohta
2009
conf/iwsec
Bit-Free Collision: Application to APOP Attack.
Lei Wang
Yu Sasaki
Kazuo Sakiyama
Kazuo Ohta
2009
conf/asiacrypt
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!
Yusuke Naito
Kazuki Yoneyama
Lei Wang
Kazuo Ohta
2008
conf/ccs
A strict evaluation method on the number of conditions for the SHA-1 collision search.
Jun Yajima
Terutoshi Iwasaki
Yusuke Naito
Yu Sasaki
Takeshi Shimoyama
Noboru Kunihiro
Kazuo Ohta
2008
conf/acns
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures.
Takashi Nishide
Kazuki Yoneyama
Kazuo Ohta
2008
conf/provsec
Leaky Random Oracle (Extended Abstract).
Kazuki Yoneyama
Satoshi Miyagawa
Kazuo Ohta
2008
conf/wisa
Sanitizable and Deletable Signature.
Tetsuya Izu
Noboru Kunihiro
Kazuo Ohta
Makoto Sano
Masahiko Takenaka
2008
conf/wisa
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.
Yutaka Kawai
Shotaro Tanno
Takahiro Kondo
Kazuki Yoneyama
Noboru Kunihiro
Kazuo Ohta
2008
conf/ctrsa
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.
Yu Sasaki
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2008
conf/eurocrypt
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2008
conf/africacrypt
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function.
Yu Sasaki
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2007
conf/fse
New Message Difference for MD4.
Yu Sasaki
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2007
conf/ccs
Ring signatures: universally composable definitions and constructions.
Kazuki Yoneyama
Kazuo Ohta
2007
conf/acisp
A New Strategy for Finding a Differential Path of SHA-1.
Jun Yajima
Yu Sasaki
Yusuke Naito
Terutoshi Iwasaki
Takeshi Shimoyama
Noboru Kunihiro
Kazuo Ohta
2007
conf/pkc
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol.
Takashi Nishide
Kazuo Ohta
2007
conf/icics
Modeling Agreement Problems in the Universal Composability Framework.
Masayuki Terada
Kazuki Yoneyama
Sadayuki Hongo
Kazuo Ohta
2006
conf/ccs
Problems on the MR micropayment schemes.
Masahiro Mambo
Moisés Salinas-Rosales
Kazuo Ohta
Noboru Kunihiro
2006
conf/fc
Provably Secure Electronic Cash Based on Blind Multisignature Schemes.
Yoshikazu Hanatani
Yuichi Komano
Kazuo Ohta
Noboru Kunihiro
2006
conf/ctrsa
Toward the Fair Anonymous Signatures: Deniable Ring Signatures.
Yuichi Komano
Kazuo Ohta
Atsushi Shimbo
Shin-ichi Kawamura
2006
conf/asiacrypt
Improved Collision Search for SHA-0.
Yusuke Naito
Yu Sasaki
Takeshi Shimoyama
Jun Yajima
Noboru Kunihiro
Kazuo Ohta
2005
conf/icisc
Improved Collision Attack on MD4 with Probability Almost 1.
Yusuke Naito
Yu Sasaki
Noboru Kunihiro
Kazuo Ohta
2005
conf/wisa
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.
Tetsuya Izu
Noboru Kunihiro
Kazuo Ohta
Takeshi Shimoyama
2004
conf/icics
Taxonomic Consideration to OAEP Variants and Their Security.
Yuichi Komano
Kazuo Ohta
2003
conf/crypto
Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation.
Yuichi Komano
Kazuo Ohta
2001
conf/ccs
Accountable-subgroup multisignatures: extended abstract.
Silvio Micali
Kazuo Ohta
Leonid Reyzin
1998
conf/crypto
On Concrete Security Treatment of Signatures Derived from Identification.
Kazuo Ohta
Tatsuaki Okamoto
1998
conf/sacrypt
A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.
Masayuki Kanda
Youichi Takashima
Tsutomu Matsumoto
Kazumaro Aoki
Kazuo Ohta
1997
conf/icics
On strict estimation method of provable security against differential and linear cryptanalysis.
Yasuyoshi Kaneko
Shiho Moriai
Kazuo Ohta
1995
conf/crypto
Improving the Search Algorithm for the Best Linear Expression.
Kazuo Ohta
Shiho Moriai
Kazumaro Aoki
1994
conf/ccs
How to Simultaneously Exchange Secrets by General Assumptions.
Tatsuaki Okamoto
Kazuo Ohta
1994
conf/crypto
Linear Cryptanalysis of the Fast Data Encipherment Algorithm.
Kazuo Ohta
Kazumaro Aoki
1993
conf/crypto
Differential Attack on Message Authentication Codes.
Kazuo Ohta
Mitsuru Matsui
1992
conf/eurocrypt
Secure Bit Commitment Function against Divertibility.
Kazuo Ohta
Tatsuaki Okamoto
Atsushi Fujioka
1992
conf/asiacrypt
A Practical Secret Voting Scheme for Large Scale Elections.
Atsushi Fujioka
Tatsuaki Okamoto
Kazuo Ohta
1991
conf/crypto
Universal Electronic Cash.
Tatsuaki Okamoto
Kazuo Ohta
1991
conf/crypto
A Switching Closure Test to Analyze Cryptosystems.
Hikaru Morita
Kazuo Ohta
Shoji Miyaguchi
1991
conf/eurocrypt
Interactive Bi-Proof Systems and Undeniable Signature Schemes.
Atsushi Fujioka
Tatsuaki Okamoto
Kazuo Ohta
1991
conf/eurocrypt
Direct Zero Knowledge Proofs of Computational Power in Five Rounds.
Tatsuaki Okamoto
David Chaum
Kazuo Ohta
1991
conf/asiacrypt
A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme.
Kazuo Ohta
Tatsuaki Okamoto
1991
conf/asiacrypt
Results of Switching-Closure-Test on FEAL (Extended Abstract).
Hikaru Morita
Kazuo Ohta
Shoji Miyaguchi
1990
conf/crypto
How to Utilize the Randomness of Zero-Knowledge Proofs.
Tatsuaki Okamoto
Kazuo Ohta
1990
conf/eurocrypt
Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme.
Kazuo Ohta
Tatsuaki Okamoto
Kenji Koyama
1990
conf/eurocrypt
Confirmation that Some Hash Functions Are Not Collision Free.
Shoji Miyaguchi
Kazuo Ohta
Masahiko Iwata
1990
conf/asiacrypt
Meet-in-the-Middle Attack on Digital Signature Schemes.
Kazuo Ohta
Kenji Koyama
1989
conf/crypto
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash.
Tatsuaki Okamoto
Kazuo Ohta
1989
conf/eurocrypt
Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility.
Tatsuaki Okamoto
Kazuo Ohta
1988
conf/crypto
A Modification of the Fiat-Shamir Scheme.
Kazuo Ohta
Tatsuaki Okamoto
1988
conf/eurocrypt
Security of Improved Identity-Based Conference Key Distribution Systems.
Kenji Koyama
Kazuo Ohta
1987
conf/crypto
Identity-based Conference Key Distribution Systems.
Kenji Koyama
Kazuo Ohta
Coauthors
Akashi Satoh
(1)
Amir Moradi
(1)
Atsushi Fujioka
(3)
Atsushi Shimbo
(2)
Bagus Santoso
(2)
Christof Paar
(1)
Dai Yamamoto
(1)
Daisuke Nakatsu
(1)
David Chaum
(1)
Eric Xu Guo
(1)
Fumiaki Yoshida
(1)
Goichiro Hanaoka
(5)
Hideyuki Miyake
(1)
Hikaru Morita
(2)
Hikaru Sakamoto
(1)
Ingrid Verbauwhede
(1)
Jacob C. N. Schuldt
(2)
Jun Ikegami
(1)
Jun Yajima
(3)
Junfeng Fan
(1)
Junko Takahashi
(1)
Kaoru Kurosawa
(1)
Kaoru Takemure
(1)
Kazuki Sato
(1)
Kazuki Yoneyama
(10)
Kazuma Ohara
(2)
Kazumaro Aoki
(3)
Kazuo Ohta
(86)
Kazuo Sakiyama
(22)
Kazuyuki Kobayashi
(1)
Keita Emura
(2)
Kenichiro Hayasaka
(1)
Kenji Koyama
(4)
Kouichi Itoh
(1)
Koutarou Suzuki
(1)
Kyoichi Asano
(1)
Lei Wang
(13)
Leonid Reyzin
(1)
Leyla Nazhandali
(1)
Makoto Sano
(1)
Masahiko Iwata
(1)
Masahiko Takenaka
(2)
Masahiro Mambo
(1)
Masayuki Kanda
(1)
Masayuki Terada
(2)
Miroslav Knezevic
(1)
Mitsugu Iwamoto
(11)
Mitsuhiro Hattori
(1)
Mitsuru Matsui
(1)
Miyako Ohkubo
(1)
Moisés Salinas-Rosales
(1)
Naofumi Homma
(1)
Naoyuki Takayanagi
(1)
Noboru Kunihiro
(13)
Nori Matsuda
(1)
Oliver Mischke
(1)
Sadayuki Hongo
(2)
Satoshi Miyagawa
(1)
Satoshi Yasuda
(1)
Shigeto Gomisawa
(1)
Shiho Moriai
(2)
Shin'ichiro Matsuo
(2)
Shin-ichi Kawamura
(2)
Sho Endo
(1)
Shoji Miyaguchi
(3)
Shotaro Tanno
(1)
Silvio Micali
(1)
Sinan Huang
(1)
Takafumi Aoki
(1)
Takahiro Kondo
(1)
Takao Ochiai
(1)
Takashi Nishide
(2)
Takato Hirano
(3)
Takeshi Nakai
(1)
Takeshi Shimoyama
(4)
Takumi Amada
(2)
Tatsuaki Okamoto
(13)
Tatsuji Munaka
(1)
Tatsuya Yagi
(1)
Terutoshi Iwasaki
(2)
Tetsuya Izu
(2)
Toshiki Nakasone
(1)
Toshinori Fukunaga
(1)
Tsutomu Matsumoto
(1)
Ünal Koçabas
(1)
Wataru Komatsubara
(1)
Yang Li
(11)
Yasuhide Sakai
(1)
Yasuhiro Takasaki
(1)
Yasuyoshi Kaneko
(1)
Yohei Watanabe
(2)
Yoshihiro Koseki
(2)
Yoshikazu Hanatani
(2)
Yoshiki Abe
(1)
Youichi Takashima
(1)
Yu Sasaki
(16)
Yuichi Komano
(6)
Yusuke Naito
(7)
Yusuke Sakai
(6)
Yutaka Kawai
(4)
Yuto Misawa
(1)
Yuuki Tokushige
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to