What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kazuki Yoneyama
Google Scholar
48
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiapkc
Formal Verification and Proof of Impossibility for Four-Card XOR Protocols Using Only Random Cuts.
Kazuhiro Fujita
Shota Ikeda
Kazumasa Shinagawa
Kazuki Yoneyama
2024
conf/acisp
Formal Verification of Challenge Flow in EMV 3-D Secure.
Kakeru Watanabe
Kazuki Yoneyama
2024
conf/icisc
Simultaneous Multiplication Protocol Based on Packed Linear Secret Sharing and Its Applications.
Shohei Mita
Kazuki Yoneyama
2024
conf/asiapkc
Formal Verification of Wireless Charging Standard Qi.
Kazuhiro Fujita
Kazuki Yoneyama
2024
conf/asiapkc
Tightly Secure ID-based Authenticated Key Exchange.
Takumu Mita
Kazuki Yoneyama
2023
conf/acisp
Compact Password Authenticated Key Exchange from Group Actions.
Ren Ishibashi
Kazuki Yoneyama
2022
conf/pkc
Post-quantum Anonymous One-Sided Authenticated Key Exchange Without Random Oracles.
Ren Ishibashi
Kazuki Yoneyama
2022
conf/icics
Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises.
Makoto Yuito
Kenta Suzuki
Kazuki Yoneyama
2022
conf/iwsec
Quantum Key Recovery Attacks on 3-Round Feistel-2 Structure Without Quantum Encryption Oracles.
Takanori Daiza
Kazuki Yoneyama
2021
conf/ccs
Universally Composable Forward Secure Dynamic Searchable Symmetric Encryption.
Toshiya Shibata
Kazuki Yoneyama
2021
conf/acns
Adaptive-ID Secure Hierarchical ID-Based Authenticated Key Exchange Under Standard Assumptions Without Random Oracles.
Ren Ishibashi
Kazuki Yoneyama
2021
conf/icisc
Revocable Hierarchical Identity-Based Authenticated Key Exchange.
Yuki Okano
Junichi Tomida
Akira Nagai
Kazuki Yoneyama
Atsushi Fujioka
Koutarou Suzuki
2020
conf/ccs
Verification of Group Key Management of IEEE 802.21 using ProVerif.
Ryoga Noguchi
Yoshikazu Hanatani
Kazuki Yoneyama
2019
conf/provsec
Password-Based Authenticated Key Exchange from Standard Isogeny Assumptions.
Shintaro Terada
Kazuki Yoneyama
2019
conf/provsec
One-Round Authenticated Group Key Exchange from Isogenies.
Atsushi Fujioka
Katsuyuki Takashima
Kazuki Yoneyama
2018
conf/icisc
Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange.
Atsushi Fujioka
Katsuyuki Takashima
Shintaro Terada
Kazuki Yoneyama
2018
conf/provsec
Single Private-Key Generator Security Implies Multiple Private-Key Generators Security.
Atsushi Fujioka
Kazuki Yoneyama
2018
conf/iwsec
Verification of LINE Encryption Version 1.0 Using ProVerif.
Cheng Shi
Kazuki Yoneyama
2017
conf/icics
Verifiable and Forward Secure Dynamic Searchable Symmetric Encryption with Storage Efficiency.
Kazuki Yoneyama
Shogo Kimura
2016
conf/provsec
Multi-cast Key Distribution: Scalable, Dynamic and Provably Secure Construction.
Kazuki Yoneyama
Reo Yoshida
Yuto Kawahara
Tetsutaro Kobayashi
Hitoshi Fuji
Tomohide Yamamoto
2016
conf/iwsec
UC-Secure Dynamic Searchable Symmetric Encryption Scheme.
Kaoru Kurosawa
Keisuke Sasaki
Kiyohiko Ohta
Kazuki Yoneyama
2015
conf/acns
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.
Jae Hong Seo
Keita Emura
Keita Xagawa
Kazuki Yoneyama
2014
conf/acns
Password-Based Authenticated Key Exchange without Centralized Trusted Setup.
Kazuki Yoneyama
2014
conf/acns
Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions.
Yusuke Naito
Kazuki Yoneyama
Kazuo Ohta
2014
conf/icisc
Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs.
Kazuki Yoneyama
2014
conf/provsec
Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols.
Kazuki Yoneyama
2014
conf/provsec
Compact Public Key Encryption with Minimum Ideal Property of Hash Functions.
Kazuki Yoneyama
Goichiro Hanaoka
2014
conf/iwsec
Secure Multi-Party Computation for Elliptic Curves.
Koutarou Suzuki
Kazuki Yoneyama
2014
conf/africacrypt
Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum.
Kazuma Ohara
Kazuo Ohta
Koutarou Suzuki
Kazuki Yoneyama
2014
conf/cans
Converting PKI-Based Authenticated Key Exchange to Identity-Based.
Koutarou Suzuki
Kazuki Yoneyama
2013
conf/ccs
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
Atsushi Fujioka
Koutarou Suzuki
Keita Xagawa
Kazuki Yoneyama
2013
conf/acns
Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.
Koutarou Suzuki
Kazuki Yoneyama
2013
conf/iwsec
One-Round Authenticated Key Exchange without Implementation Trick.
Kazuki Yoneyama
2012
conf/pkc
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
Atsushi Fujioka
Koutarou Suzuki
Keita Xagawa
Kazuki Yoneyama
2012
conf/iwsec
One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary.
Kazuki Yoneyama
2011
conf/icisc
Two-Party Round-Optimal Session-Policy Attribute-Based Authenticated Key Exchange without Random Oracles.
Kazuki Yoneyama
2011
conf/provsec
Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model.
Yusuke Naito
Kazuki Yoneyama
Lei Wang
Kazuo Ohta
2011
conf/provsec
Taxonomical Security Consideration of Authenticated Key Exchange Resilient to Intermediate Computation Leakage.
Kazuki Yoneyama
Yunlei Zhao
2010
conf/wisa
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
Atsushi Fujioka
Koutarou Suzuki
Kazuki Yoneyama
2010
conf/wisa
Cross-Realm Password-Based Server Aided Key Exchange.
Kazuki Yoneyama
2010
conf/iwsec
Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
Atsushi Fujioka
Koutarou Suzuki
Kazuki Yoneyama
2010
conf/iwsec
Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments.
Kazuki Yoneyama
Masayuki Terada
Sadayuki Hongo
Kazuo Ohta
2009
conf/asiacrypt
How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!
Yusuke Naito
Kazuki Yoneyama
Lei Wang
Kazuo Ohta
2008
conf/acns
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures.
Takashi Nishide
Kazuki Yoneyama
Kazuo Ohta
2008
conf/provsec
Leaky Random Oracle (Extended Abstract).
Kazuki Yoneyama
Satoshi Miyagawa
Kazuo Ohta
2008
conf/wisa
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.
Yutaka Kawai
Shotaro Tanno
Takahiro Kondo
Kazuki Yoneyama
Noboru Kunihiro
Kazuo Ohta
2007
conf/ccs
Ring signatures: universally composable definitions and constructions.
Kazuki Yoneyama
Kazuo Ohta
2007
conf/icics
Modeling Agreement Problems in the Universal Composability Framework.
Masayuki Terada
Kazuki Yoneyama
Sadayuki Hongo
Kazuo Ohta
Coauthors
Akira Nagai
(1)
Atsushi Fujioka
(8)
Cheng Shi
(1)
Goichiro Hanaoka
(1)
Hitoshi Fuji
(1)
Jae Hong Seo
(1)
Junichi Tomida
(1)
Kakeru Watanabe
(1)
Kaoru Kurosawa
(1)
Katsuyuki Takashima
(2)
Kazuhiro Fujita
(2)
Kazuki Yoneyama
(48)
Kazuma Ohara
(1)
Kazumasa Shinagawa
(1)
Kazuo Ohta
(10)
Keisuke Sasaki
(1)
Keita Emura
(1)
Keita Xagawa
(3)
Kenta Suzuki
(1)
Kiyohiko Ohta
(1)
Koutarou Suzuki
(9)
Lei Wang
(2)
Makoto Yuito
(1)
Masayuki Terada
(2)
Noboru Kunihiro
(1)
Ren Ishibashi
(3)
Reo Yoshida
(1)
Ryoga Noguchi
(1)
Sadayuki Hongo
(2)
Satoshi Miyagawa
(1)
Shintaro Terada
(2)
Shogo Kimura
(1)
Shohei Mita
(1)
Shota Ikeda
(1)
Shotaro Tanno
(1)
Takahiro Kondo
(1)
Takanori Daiza
(1)
Takashi Nishide
(1)
Takumu Mita
(1)
Tetsutaro Kobayashi
(1)
Tomohide Yamamoto
(1)
Toshiya Shibata
(1)
Yoshikazu Hanatani
(1)
Yuki Okano
(1)
Yunlei Zhao
(1)
Yusuke Naito
(3)
Yutaka Kawai
(1)
Yuto Kawahara
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to