Personal information

Activities

Works (50 of 79)

Items per page:
Page 1 of 2

Cyber Physical Security for Industrial Control Systems and IoT

Ieice Transactions on Information and Systems
2016 | Journal article
WOSUID:

WOS:000375973800002

Contributors: Kobara, Kazukuni
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Hidden Credential Retrieval, Revisited

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2015 | Journal article
WOSUID:

WOS:000359464100047

Contributors: Shin, SeongHan; Kobara, Kazukuni
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Key Establishment Using Physically Unclonable Functions

2015 International Conference on Computational Science and Computational Intelligence (Csci)
2015 | Journal article
WOSUID:

WOS:000380405100063

Contributors: Shin, SeongHan; Kobara, Kazukuni; Arabnia, HR; Deligiannidis, L; Tran, QN
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

On Finding Secure Domain Parameters Resistant to Cheon's Algorithm

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2015 | Journal article
WOSUID:

WOS:000367096000012

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

On Unlinkability of Password-Based Anonymous Authentication

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2015 | Journal article
WOSUID:

WOS:000359466600024

Contributors: Shin, SeongHan; Kobara, Kazukuni
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

About Validity Checks of Augmented PAKE in IEEE 1363.2 and ISO/IEC 11770-4

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2014 | Journal article
WOSUID:

WOS:000330553400052

Contributors: Shin, SeongHan; Kobara, Kazukuni
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

In Search of Secure Domain Parameters under Strong Diffie-Hellman and Related Assumptions

2014 International Symposium on Information Theory and Its Applications (Isita)
2014 | Journal article
WOSUID:

WOS:000366046700100

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki; IEEE
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

RSA-based Password-Authenticated Key Retrieval using Multiple Servers

2013 World Congress on Internet Security (Worldcis)
2013 | Book chapter
WOSUID:

WOS:000349777000015

Contributors: Shin, SeongHan; Kobara, Kazukuni; IEEE
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Comparison of Tools and Simulators for Control System Security Studies

2012 10th Ieee International Conference on Industrial Informatics (Indin)
2012 | Journal article
WOSUID:

WOS:000312724900008

Contributors: Wu, Jun; Kobara, Kazukuni; IEEE
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

HBb Protocol For Lightweight Authentication; Its Information Theoretic Indistinguishability Against MITM Attack Watching Reader's Response

2012 International Symposium on Information Theory and Its Applications (Isita 2012)
2012 | Journal article
WOSUID:

WOS:000320850700112

Contributors: Song, Xuedi; Kobara, Kazukuni; Imafuku, Kentaro; Imai, Hideki; IEEE
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks

Ieice Transactions on Information and Systems
2011 | Journal article
WOSUID:

WOS:000296673400005

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

A Note on a Fatal Error of Optimized LFC Private Information Retrieval Scheme and Its Corrected Results

Financial Cryptography and Data Security
2010 | Journal article
WOSUID:

WOS:000282837200004

Contributors: Tamura, Jin; Kobara, Kazukuni; Fathi, Hanane; Imai, Hideki; Sion, R; Curtmola, R; Dietrich, S; Kiayias, A; Miret, JM; Sako, K et al.
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2010 | Journal article
WOSUID:

WOS:000279250100012

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2010 | Journal article
WOSUID:

WOS:000274505900012

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Code-Based Public-Key Cryptosystems and Their Applications

Information Theoretic Security
2010 | Journal article
WOSUID:

WOS:000286345700005

Contributors: Kobara, Kazukuni; Kurosawa, K
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

How to Strengthen the Security of RSA-OAEP

Ieee Transactions on Information Theory
2010 | Journal article
WOSUID:

WOS:000283449000038

Contributors: Boldyreva, Alexandra; Imai, Hideki; Kobara, Kazukuni
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking

2010 Ieee Global Telecommunications Conference Globecom 2010
2010 | Journal article
WOSUID:

WOS:000287977405188

Contributors: Sekino, Tomohiro; Cui, Yang; Kobara, Kazukuni; Imai, Hideki; IEEE
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems

Wireless Personal Communications
2010 | Journal article
WOSUID:

WOS:000278585200015

Contributors: Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2010 | Journal article
WOSUID:

WOS:000284448800028

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE

Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes
2009 | Journal article
WOSUID:

WOS:000267677400017

Contributors: Cui, Yang; Morozov, Kirill; Kobara, Kazukuni; Imai, Hideki; BrasAmoros, M; Hoholdt, T
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

New Security Layer for OverLay Networks

Journal of Communications and Networks
2009 | Journal article
WOSUID:

WOS:000267954200001

Contributors: Imai, Hideki; Shin, SeongHan; Kobara, Kazukuni
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions

Applied Algebra, Algebraic Algorithms, and Error-Correcting Codes
2009 | Journal article
WOSUID:

WOS:000267677400016

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki; BrasAmoros, M; Hoholdt, T
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

A new security architecture for personal networks and its performance evaluation

Ieice Transactions on Communications
2008 | Journal article
WOSUID:

WOS:000258170500023

Contributors: Shin, SeongHan; Fathi, Hanane; Kobara, Kazukuni; Prasad, Neeli R.; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

A Note on the Error of Optimized LFC Private Information Retrieval Scheme

2008 International Symposium on Information Theory and Its Applications, Vols 1-3
2008 | Journal article
WOSUID:

WOS:000273504800184

Contributors: Tamura, Jin; Kobara, Kazukuni; Nojima, Ryo; Imai, Hideki; Lipmaa, Helger; IEEE
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

A secure authenticated key exchange protocol for credential services

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2008 | Journal article
WOSUID:

WOS:000252617400016

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2008 | Journal article
WOSUID:

WOS:000263078600029

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

A security framework for personal networks

2008 3rd International Conference on Communication System Software and Middleware and Workshops, Vols 1 and 2
2008 | Journal article
WOSUID:

WOS:000258929300098

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki; IEEE
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

A Study on a Key Establishment Scheme with QC LDPC Codes and UH-Protocols

2008 International Symposium on Information Theory and Its Applications, Vols 1-3
2008 | Journal article
WOSUID:

WOS:000273504800094

Contributors: Matsunaga, Yuto; Hagiwara, Manabu; Kobara, Kazukuni; Imai, Hideki; IEEE
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Coding-Based Oblivious Transfer

Mathematical Methods in Computer Science
2008 | Journal article
WOSUID:

WOS:000262975900012

Contributors: Kobara, Kazukuni; Morozov, Kirill; Overbeck, Raphael; Calmet, J; Geiselmann, W; MullerQuade, J
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Introduction to Leakage-Resilient Authenticated Key Exchange Protocols and Their Applications

2008 | Journal article
WOSUID:

KJD:ART001308648

Contributors: Imai, Hideki; Shin, SeongHan; Kobara, Kazukuni
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

IVs to skip for immunizing WEP against FMS attack

Ieice Transactions on Communications
2008 | Journal article
WOSUID:

WOS:000252617100021

Contributors: Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Lightweight privacy-preserving authentication protocols secure against active attack in an asymmetric way

Ieice Transactions on Information and Systems
2008 | Journal article
WOSUID:

WOS:000256860900026

Contributors: Cui, Yang; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Protocols for purpose-restricted anonymous communications in IP-based wireless networks

Computer Communications
2008 | Journal article
WOSUID:

WOS:000259945700012

Contributors: Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

RSA-based Password-Authenticated Key Exchange, revisited

Ieice Transactions on Information and Systems
2008 | Journal article
WOSUID:

WOS:000256860900023

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Semantic security for the McEliece cryptosystem without random oracles

Designs Codes and Cryptography
2008 | Journal article
WOSUID:

WOS:000258933600022

Contributors: Nojima, Ryo; Imai, Hideki; Kobara, Kazukuni; Morozov, Kirill
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

A new variant for an attack against RSA signature verification using parameter field

Public Key Infrastructure, Proceedings
2007 | Book chapter
WOSUID:

WOS:000247967900010

Contributors: Oiwa, Yutaka; Kobara, Kazukuni; Watanabe, Hajime; Lopez, J; Samarati, P; Ferrer, JL
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

A secure threshold anonymous password-authenticated key exchange protocol

Advances in Information and Computer Security, Proceedings
2007 | Book chapter
WOSUID:

WOS:000250750200030

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki; Miyaji, A; Kikuchi, H; Rannenberg, K
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

An efficient and leakage-resilient RSA-based authenticated key exchange protocol with tight security reduction

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2007 | Journal article
WOSUID:

WOS:000244547000024

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

An elliptic curve based authenticated key agreement protocol for wireless security

Computational Intelligence and Security
2007 | Book chapter
WOSUID:

WOS:000251348000080

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki; Wang, Y; Cheung, YM; Liu, H
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Anonymous Pay-TV system with secure revenue sharing

Knowledge-Based Intelligent Information and Engineering Systems: KES 2007 - WIRN 2007, Pt III, Proceedings
2007 | Book chapter
WOSUID:

WOS:000250749400120

Contributors: Ogawa, Kazuto; Hanaoka, Goichiro; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki; Apolloni, B; Howlett, RJ; Jain, L
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Comparative studies in key disagreement correction process on wireless key agreement system

Information Security Applications
2007 | Journal article
WOSUID:

WOS:000253475800013

Contributors: Hashimoto, Toru; Itoh, Takashi; Ueba, Masazumi; Iwai, Hisato; Sasaoka, Hideichi; Kobara, Kazukuni; Imai, Hideki; Kim, S; Yung, M; Lee, HW
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Lightweight asymmetric privacy-preserving authentication protocols secure against active attack

Fifth Annual Ieee International Conference on Pervasive Computing and Communications Workshops, Proceedings
2007 | Journal article
WOSUID:

WOS:000246105700039

Contributors: Cui, Yang; Kobara, Kazukuni; Matsuura, Kanta; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Modeling bit flipping decoding based on nonorthogonal check sums with application to iterative decoding attack of McEliece cryptosystem

Ieee Transactions on Information Theory
2007 | Journal article
WOSUID:

WOS:000243317600029

Contributors: Fossorier, Marc P. C.; Kobara, Kazukuni; Imai, Hideki
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

On the key-privacy issue of McEliece public-key encryption

Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, Proceedings
2007 | Journal article
WOSUID:

WOS:000252180600021

Contributors: Yamakawa, Shigenori; Cui, Yang; Kobara, Kazukuni; Hagiwara, Manabu; Imai, Hideki; Boztas, S; Lu, HF
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Protocols for authenticated anonymous communications

2007 Ieee 18th International Symposium on Personal, Indoor and Mobile Radio Communications, Vols 1-9
2007 | Journal article
WOSUID:

WOS:000253402501163

Contributors: Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki; IEEE
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Secure AAA and mobility for nested mobile networks

2007 7th International Conference on ITS Telecommunications, Proceedings
2007 | Journal article
WOSUID:

WOS:000249644400070

Contributors: Fathi, Hanane; Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki; Ulrich, F; Masayuki, F; Christain, B; Massimiliano, L; Shozo, K; Guangjun, W
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

A New Security Architecture for Personal Networks

Globecom 2006 - 2006 Ieee Global Telecommunications Conference
2006 | Journal article
WOSUID:

WOS:000288765601047

Contributors: Shin, SeongHan; Fathi, Hanane; Imine, Mohamed; Kobara, Kazukuni; Prasad, Neeli R.; Imai, Hideki; IEEE
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

An authentication and key exchange protocol for secure credential services

Information Security, Proceedings
2006 | Book chapter
WOSUID:

WOS:000240592800032

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki; Katsikas, SK; Lopez, J; Backe, M; Gritzalis, S; Preneel, B
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Efficient shared-key authentication scheme from any weak pseudorandom function

Progress in Cryptology - INDOCRYPT 2006, Proceedings
2006 | Book chapter
WOSUID:

WOS:000244580600021

Contributors: Nojima, Ryo; Kobara, Kazukuni; Imai, Hideki; Barua, R; Lange, T
Source: Self-asserted source
Kazukuni Kobara via ResearcherID

Elliptic curve based authenticated key agreement protocol for wireless security

2006 International Conference on Computational Intelligence and Security, Pts 1 and 2, Proceedings
2006 | Journal article
WOSUID:

WOS:000243679800231

Contributors: Shin, SeongHan; Kobara, Kazukuni; Imai, Hideki; Cheung, YM; Wang, Y; Lium, H
Source: Self-asserted source
Kazukuni Kobara via ResearcherID
Items per page:
Page 1 of 2