BibTeX records: Kazuo Ohta

download as .bib file

@article{DBLP:journals/ieiceta/AbeNWIO23,
  author       = {Yoshiki Abe and
                  Takeshi Nakai and
                  Yohei Watanabe and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {A Computationally Efficient Card-Based Majority Voting Protocol with
                  Fewer Cards in the Private Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {3},
  pages        = {315--324},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022cip0021},
  doi          = {10.1587/TRANSFUN.2022CIP0021},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/AbeNWIO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakemureSSHO23,
  author       = {Kaoru Takemure and
                  Yusuke Sakai and
                  Bagus Santoso and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  title        = {More Efficient Two-Round Multi-Signature Scheme with Provably Secure
                  Parameters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/155},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/TakemureSSHO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/WatanabeNONLIO22,
  author       = {Yohei Watanabe and
                  Takeshi Nakai and
                  Kazuma Ohara and
                  Takuya Nojima and
                  Yexuan Liu and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {How to Make a Secure Index for Searchable Symmetric Encryption, Revisited},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {12},
  pages        = {1559--1577},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021eap1163},
  doi          = {10.1587/TRANSFUN.2021EAP1163},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/WatanabeNONLIO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/NakaiSTIO22,
  author       = {Takeshi Nakai and
                  Satoshi Shirouchi and
                  Yuuki Tokushige and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {Secure Computation for Threshold Functions with Physical Cards: Power
                  of Private Permutations},
  journal      = {New Gener. Comput.},
  volume       = {40},
  number       = {1},
  pages        = {95--113},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00354-022-00153-7},
  doi          = {10.1007/S00354-022-00153-7},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/NakaiSTIO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/AbeNKSKWIO22,
  author       = {Yoshiki Abe and
                  Takeshi Nakai and
                  Yoshihisa Kuroki and
                  Shinnosuke Suzuki and
                  Yuta Koga and
                  Yohei Watanabe and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {Efficient Card-Based Majority Voting Protocols},
  journal      = {New Gener. Comput.},
  volume       = {40},
  number       = {1},
  pages        = {173--198},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00354-022-00161-7},
  doi          = {10.1007/S00354-022-00161-7},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/AbeNKSKWIO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/0001OIO22,
  author       = {Yohei Watanabe and
                  Kazuma Ohara and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Anupam Joshi and
                  Maribel Fern{\'{a}}ndez and
                  Rakesh M. Verma},
  title        = {Efficient Dynamic Searchable Encryption with Forward Privacy under
                  the Decent Leakage},
  booktitle    = {{CODASPY} '22: Twelveth {ACM} Conference on Data and Application Security
                  and Privacy, Baltimore, MD, USA, April 24 - 27, 2022},
  pages        = {312--323},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3508398.3511521},
  doi          = {10.1145/3508398.3511521},
  timestamp    = {Wed, 20 Apr 2022 12:17:48 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/0001OIO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secitc/KomanoIOS22,
  author       = {Yuichi Komano and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Giampaolo Bella and
                  Mihai Doinea and
                  Helge Janicke},
  title        = {Lightweight Authentication Using Noisy Key Derived from Physically
                  Unclonable Function},
  booktitle    = {Innovative Security Solutions for Information Technology and Communications
                  - 15th International Conference, SecITC 2022, Virtual Event, December
                  8-9, 2022, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13809},
  pages        = {203--221},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-32636-3\_12},
  doi          = {10.1007/978-3-031-32636-3\_12},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secitc/KomanoIOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/TakemureSSHO21,
  author       = {Kaoru Takemure and
                  Yusuke Sakai and
                  Bagus Santoso and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  title        = {Achieving Pairing-Free Aggregate Signatures using Pre-Communication
                  between Signers},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {9},
  pages        = {1188--1205},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020dmp0023},
  doi          = {10.1587/TRANSFUN.2020DMP0023},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/TakemureSSHO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/NakaiMTIO21,
  author       = {Takeshi Nakai and
                  Yuto Misawa and
                  Yuuki Tokushige and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {How to Solve Millionaires' Problem with Two Kinds of Cards},
  journal      = {New Gener. Comput.},
  volume       = {39},
  number       = {1},
  pages        = {73--96},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00354-020-00118-8},
  doi          = {10.1007/S00354-020-00118-8},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/NakaiMTIO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/WatanabeNONLIO21,
  author       = {Yohei Watanabe and
                  Takeshi Nakai and
                  Kazuma Ohara and
                  Takuya Nojima and
                  Yexuan Liu and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {How to Make a Secure Index for Searchable Symmetric Encryption, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {948},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/948},
  timestamp    = {Mon, 09 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/WatanabeNONLIO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/AbeIO20,
  author       = {Yoshiki Abe and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {How to Detect Malicious Behaviors in a Card-Based Majority Voting
                  Protocol with Three Inputs},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020},
  pages        = {377--381},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/9366184},
  timestamp    = {Mon, 22 Mar 2021 15:48:59 +0100},
  biburl       = {https://dblp.org/rec/conf/isita/AbeIO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/UemuraWLMISO20,
  author       = {Tomoki Uemura and
                  Yohei Watanabe and
                  Yang Li and
                  Noriyuki Miura and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {A Key Recovery Algorithm Using Random Key Leakage from {AES} Key Schedule},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020},
  pages        = {382--386},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/9366106},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/UemuraWLMISO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/TakemureSSHO20,
  author       = {Kaoru Takemure and
                  Yusuke Sakai and
                  Bagus Santoso and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  editor       = {Khoa Nguyen and
                  Wenling Wu and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang},
  title        = {Achieving Pairing-Free Aggregate Signatures using Pre-Communication
                  between Signers},
  booktitle    = {Provable and Practical Security - 14th International Conference, ProvSec
                  2020, Singapore, November 29 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  pages        = {65--84},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62576-4\_4},
  doi          = {10.1007/978-3-030-62576-4\_4},
  timestamp    = {Sat, 17 Dec 2022 21:30:21 +0100},
  biburl       = {https://dblp.org/rec/conf/provsec/TakemureSSHO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaOSSTZ20,
  author       = {Goichiro Hanaoka and
                  Kazuo Ohta and
                  Yusuke Sakai and
                  Bagus Santoso and
                  Kaoru Takemure and
                  Yunlei Zhao},
  title        = {Cryptanalysis of Aggregate {\(\Gamma\)}-Signature and Practical Countermeasures
                  in Application to Bitcoin},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1484},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1484},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaOSSTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OharaWIO19,
  author       = {Kazuma Ohara and
                  Yohei Watanabe and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {Multi-Party Computation for Modular Exponentiation Based on Replicated
                  Secret Sharing},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {9},
  pages        = {1079--1090},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.1079},
  doi          = {10.1587/TRANSFUN.E102.A.1079},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/OharaWIO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OharaEHIOS19,
  author       = {Kazuma Ohara and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Ai Ishida and
                  Kazuo Ohta and
                  Yusuke Sakai},
  title        = {Shortening the Libert-Peters-Yung Revocable Group Signature Scheme
                  by Using the Random Oracle Methodology},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {9},
  pages        = {1101--1117},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.1101},
  doi          = {10.1587/TRANSFUN.E102.A.1101},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OharaEHIOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KomanoOSIV19,
  author       = {Yuichi Komano and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Ingrid Verbauwhede},
  title        = {Single-Round Pattern Matching Key Generation Using Physically Unclonable
                  Function},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1719585:1--1719585:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1719585},
  doi          = {10.1155/2019/1719585},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KomanoOSIV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AbeIO19,
  author       = {Yoshiki Abe and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Efficient Private {PEZ} Protocols for Symmetric Functions},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11891},
  pages        = {372--392},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36030-6\_15},
  doi          = {10.1007/978-3-030-36030-6\_15},
  timestamp    = {Mon, 25 Nov 2019 13:58:16 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AbeIO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-02944,
  author       = {A. J. Han Vinck and
                  Kees A. Schouhamer Immink and
                  Tadashi Wadayama and
                  Van Khu Vu and
                  Akiko Manada and
                  Kui Cai and
                  Shunsuke Horii and
                  Yoshiki Abe and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Xingwei Zhong and
                  Zhen Mei and
                  Renfei Bu and
                  Jos H. Weber and
                  Vitaly Skachek and
                  Hiroyoshi Morita and
                  N. Hovhannisyan and
                  Hiroshi Kamabe and
                  Shan Lu and
                  Hirosuke Yamamoto and
                  Kengo Hashimoto and
                  {\O}yvind Ytrehus and
                  Shigeaki Kuzuoka and
                  Mikihiko Nishiara and
                  Han Mao Kiah and
                  Jun Muramatsu and
                  Shigeki Miyake},
  title        = {Proceedings of the 11th Asia-Europe Workshop on Concepts in Information
                  Theory},
  journal      = {CoRR},
  volume       = {abs/1907.02944},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.02944},
  eprinttype    = {arXiv},
  eprint       = {1907.02944},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-02944.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeIO19,
  author       = {Yoshiki Abe and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {Efficient Private {PEZ} Protocols for Symmetric Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1069},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1069},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeIO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/IwamotoOS18,
  author       = {Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Junji Shikata},
  title        = {Security Formalizations and Their Relationships for Encryption and
                  Key Agreement in Information-Theoretic Cryptography},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {64},
  number       = {1},
  pages        = {654--685},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIT.2017.2744650},
  doi          = {10.1109/TIT.2017.2744650},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/IwamotoOS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/WatanabeKSKIO18,
  author       = {Yohei Watanabe and
                  Yoshihisa Kuroki and
                  Shinnosuke Suzuki and
                  Yuta Koga and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {Card-Based Majority Voting Protocols with Three Inputs Using Three
                  Cards},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2018, Singapore, October 28-31, 2018},
  pages        = {218--222},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ISITA.2018.8664324},
  doi          = {10.23919/ISITA.2018.8664324},
  timestamp    = {Wed, 11 Aug 2021 11:51:25 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/WatanabeKSKIO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/NakaiSIO17,
  author       = {Takeshi Nakai and
                  Satoshi Shirouchi and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Junji Shikata},
  title        = {Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol
                  Utilizing Private Permutations},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {153--165},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_9},
  doi          = {10.1007/978-3-319-72089-0\_9},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/NakaiSIO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KawaiHOK16,
  author       = {Yutaka Kawai and
                  Goichiro Hanaoka and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {A limitation on security evaluation of cryptographic primitives with
                  fixed keys},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1663--1675},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1457},
  doi          = {10.1002/SEC.1457},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KawaiHOK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SakaiESHO16,
  author       = {Yusuke Sakai and
                  Keita Emura and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  title        = {Constructions of dynamic and non-dynamic threshold public-key encryption
                  schemes with decryption consistency},
  journal      = {Theor. Comput. Sci.},
  volume       = {630},
  pages        = {95--116},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.tcs.2016.04.003},
  doi          = {10.1016/J.TCS.2016.04.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/SakaiESHO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/HayasakaKKHOI16,
  author       = {Kenichiro Hayasaka and
                  Yutaka Kawai and
                  Yoshihiro Koseki and
                  Takato Hirano and
                  Kazuo Ohta and
                  Mitsugu Iwamoto},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Probabilistic Generation of Trapdoors: Reducing Information Leakage
                  of Searchable Symmetric Encryption},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {350--364},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_21},
  doi          = {10.1007/978-3-319-48965-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/HayasakaKKHOI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/NakaiTMIO16,
  author       = {Takeshi Nakai and
                  Yuuki Tokushige and
                  Yuto Misawa and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Efficient Card-Based Cryptographic Protocols for Millionaires' Problem
                  Utilizing Private Permutations},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {500--517},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_30},
  doi          = {10.1007/978-3-319-48965-0\_30},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/NakaiTMIO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HiranoHKMIOSM16,
  author       = {Takato Hirano and
                  Mitsuhiro Hattori and
                  Yutaka Kawai and
                  Nori Matsuda and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Yusuke Sakai and
                  Tatsuji Munaka},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Simple, Secure, and Efficient Searchable Symmetric Encryption with
                  Multiple Encrypted Indexes},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {91--110},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_6},
  doi          = {10.1007/978-3-319-44524-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HiranoHKMIOSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OharaEHIOS16,
  author       = {Kazuma Ohara and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Ai Ishida and
                  Kazuo Ohta and
                  Yusuke Sakai},
  title        = {Shortening the Libert-Peters-Yung Revocable Group Signature Scheme
                  by Using the Random Oracle Methodology},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {477},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/477},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OharaEHIOS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YamamotoSIOTIT15,
  author       = {Dai Yamamoto and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Masahiko Takenaka and
                  Kouichi Itoh and
                  Naoya Torii},
  title        = {A new method for enhancing variety and maintaining reliability of
                  {PUF} responses and its evaluation on ASICs},
  journal      = {J. Cryptogr. Eng.},
  volume       = {5},
  number       = {3},
  pages        = {187--199},
  year         = {2015},
  url          = {https://doi.org/10.1007/s13389-014-0091-9},
  doi          = {10.1007/S13389-014-0091-9},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YamamotoSIOTIT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/EndoLHSOFNKDA15,
  author       = {Sho Endo and
                  Yang Li and
                  Naofumi Homma and
                  Kazuo Sakiyama and
                  Kazuo Ohta and
                  Daisuke Fujimoto and
                  Makoto Nagata and
                  Toshihiro Katashita and
                  Jean{-}Luc Danger and
                  Takafumi Aoki},
  title        = {A Silicon-Level Countermeasure Against Fault Sensitivity Analysis
                  and Its Evaluation},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {23},
  number       = {8},
  pages        = {1429--1438},
  year         = {2015},
  url          = {https://doi.org/10.1109/TVLSI.2014.2339892},
  doi          = {10.1109/TVLSI.2014.2339892},
  timestamp    = {Wed, 11 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tvlsi/EndoLHSOFNKDA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SakaiESHO15,
  author       = {Yusuke Sakai and
                  Keita Emura and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Dynamic Threshold Public-Key Encryption with Decryption Consistency
                  from Static Assumptions},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {77--92},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_5},
  doi          = {10.1007/978-3-319-19962-7\_5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SakaiESHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/ClavierDDEGGHKLLNOSSSSVWW14,
  author       = {Christophe Clavier and
                  Jean{-}Luc Danger and
                  Guillaume Duc and
                  M. Abdelaziz Elaabid and
                  Beno{\^{\i}}t G{\'{e}}rard and
                  Sylvain Guilley and
                  Annelie Heuser and
                  Michael Kasper and
                  Yang Li and
                  Victor Lomn{\'{e}} and
                  Daisuke Nakatsu and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Laurent Sauvage and
                  Werner Schindler and
                  Marc St{\"{o}}ttinger and
                  Nicolas Veyrat{-}Charvillon and
                  Matthieu Walle and
                  Antoine Wurcker},
  title        = {Practical improvements of side-channel attacks on {AES:} feedback
                  from the 2nd {DPA} contest},
  journal      = {J. Cryptogr. Eng.},
  volume       = {4},
  number       = {4},
  pages        = {259--274},
  year         = {2014},
  url          = {https://doi.org/10.1007/s13389-014-0075-9},
  doi          = {10.1007/S13389-014-0075-9},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/ClavierDDEGGHKLLNOSSSSVWW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/SakiyamaLGHIHAO14,
  author       = {Kazuo Sakiyama and
                  Yang Li and
                  Shigeto Gomisawa and
                  Yu{-}ichi Hayashi and
                  Mitsugu Iwamoto and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Kazuo Ohta},
  title        = {Practical {DFA} Strategy for {AES} Under Limited-access Conditions},
  journal      = {J. Inf. Process.},
  volume       = {22},
  number       = {2},
  pages        = {142--151},
  year         = {2014},
  url          = {https://doi.org/10.2197/ipsjjip.22.142},
  doi          = {10.2197/IPSJJIP.22.142},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/SakiyamaLGHIHAO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NaitoYO14,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Ioana Boureanu and
                  Philippe Owesarski and
                  Serge Vaudenay},
  title        = {Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass
                  Hash Functions},
  booktitle    = {Applied Cryptography and Network Security - 12th International Conference,
                  {ACNS} 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8479},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-07536-5\_15},
  doi          = {10.1007/978-3-319-07536-5\_15},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NaitoYO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/OharaOSY14,
  author       = {Kazuma Ohara and
                  Kazuo Ohta and
                  Koutarou Suzuki and
                  Kazuki Yoneyama},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {Constant Rounds Almost Linear Complexity Multi-party Computation for
                  Prefix Sum},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {285--299},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_18},
  doi          = {10.1007/978-3-319-06734-6\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/OharaOSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OharaSYIO14,
  author       = {Kazuma Ohara and
                  Yusuke Sakai and
                  Fumiaki Yoshida and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yunlei Zhao},
  title        = {Privacy-preserving smart metering with verifiability for both billing
                  and energy management},
  booktitle    = {ASIAPKC'14, Proceedings of the 2nd {ACM} Wookshop on {ASIA} Public-Key
                  Cryptography, June 3, 2014, Kyoto, Japan},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600694.2600700},
  doi          = {10.1145/2600694.2600700},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OharaSYIO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiTWIO14,
  author       = {Yu Sasaki and
                  Yuuki Tokushige and
                  Lei Wang and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Josh Benaloh},
  title        = {An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers
                  and Proposals of ShiftBytes Parameters for Gr{\o}stl},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {424--443},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_22},
  doi          = {10.1007/978-3-319-04852-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SasakiTWIO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/NishideIIO14,
  author       = {Takashi Nishide and
                  Mitsugu Iwamoto and
                  Atsushi Iwasaki and
                  Kazuo Ohta},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {Secure {(M+1)} st-Price Auction with Automatic Tie-Break},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {422--437},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_27},
  doi          = {10.1007/978-3-319-27998-5\_27},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/NishideIIO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/LumyongIO14,
  author       = {Pichanee Lumyong and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {Cheating on a visual secret sharing scheme under a realistic scenario},
  booktitle    = {International Symposium on Information Theory and its Applications,
                  {ISITA} 2014, Melbourne, Australia, October 26-29, 2014},
  pages        = {575--579},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/6979909/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/LumyongIO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/IwamotoOKO14,
  author       = {Mitsugu Iwamoto and
                  Tsukasa Omino and
                  Yuichi Komano and
                  Kazuo Ohta},
  title        = {A new model of Client-Server Communications under information theoretic
                  security},
  booktitle    = {2014 {IEEE} Information Theory Workshop, {ITW} 2014, Hobart, Tasmania,
                  Australia, November 2-5, 2014},
  pages        = {511--515},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/ITW.2014.6970884},
  doi          = {10.1109/ITW.2014.6970884},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/itw/IwamotoOKO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/rfidsec/LiMWOS14,
  author       = {Yang Li and
                  Shugo Mikami and
                  Dai Watanabe and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Nai{-}Wei Lo and
                  Yingjiu Li and
                  Kuo{-}Hui Yeh},
  title        = {Single-Chip Implementation and Evaluation of Passive {UHF} {RFID}
                  Tag with Hash-Based Mutual Authentication},
  booktitle    = {Radio Frequency Identification System Security - RFIDsec'14 Asia Workshop
                  Proceedings, Hualien, Taiwan, November 27-28, 2014},
  series       = {Cryptology and Information Security Series},
  volume       = {12},
  pages        = {3--15},
  publisher    = {{IOS} Press},
  year         = {2014},
  url          = {https://doi.org/10.3233/978-1-61499-462-6-3},
  doi          = {10.3233/978-1-61499-462-6-3},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/rfidsec/LiMWOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/NaitoO14,
  author       = {Yusuke Naito and
                  Kazuo Ohta},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Improved Indifferentiable Security Analysis of {PHOTON}},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {340--357},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_20},
  doi          = {10.1007/978-3-319-10879-7\_20},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/NaitoO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/IwamotoOS14,
  author       = {Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Junji Shikata},
  title        = {Security Formalizations and Their Relationships for Encryption and
                  Key Agreement in Information-Theoretic Cryptography},
  journal      = {CoRR},
  volume       = {abs/1410.1120},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.1120},
  eprinttype    = {arXiv},
  eprint       = {1410.1120},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/IwamotoOS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HattoriHIMMSO13,
  author       = {Mitsuhiro Hattori and
                  Takato Hirano and
                  Takashi Ito and
                  Nori Matsuda and
                  Takumi Mori and
                  Yusuke Sakai and
                  Kazuo Ohta},
  title        = {Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {53--67},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.53},
  doi          = {10.1587/TRANSFUN.E96.A.53},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HattoriHIMMSO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiOS13,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {A New Type of Fault-Based Attack: Fault Behavior Analysis},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {177--184},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.177},
  doi          = {10.1587/TRANSFUN.E96.A.177},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jce/YamamotoSIOTI13,
  author       = {Dai Yamamoto and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Masahiko Takenaka and
                  Kouichi Itoh},
  title        = {Variety enhancement of {PUF} responses using the locations of random
                  outputting {RS} latches},
  journal      = {J. Cryptogr. Eng.},
  volume       = {3},
  number       = {4},
  pages        = {197--211},
  year         = {2013},
  url          = {https://doi.org/10.1007/s13389-012-0044-0},
  doi          = {10.1007/S13389-012-0044-0},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jce/YamamotoSIOTI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/LiEDHALDOS13,
  author       = {Yang Li and
                  Sho Endo and
                  Nicolas Debande and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Thanh{-}Ha Le and
                  Jean{-}Luc Danger and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Emmanuel Prouff},
  title        = {Exploring the Relations between Fault Sensitivity and Power Consumption},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 4th International
                  Workshop, {COSADE} 2013, Paris, France, March 6-8, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7864},
  pages        = {137--153},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40026-1\_9},
  doi          = {10.1007/978-3-642-40026-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/LiEDHALDOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/LiHMHAOS13,
  author       = {Yang Li and
                  Yu{-}ichi Hayashi and
                  Arisa Matsubara and
                  Naofumi Homma and
                  Takafumi Aoki and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Jean{-}Luc Danger and
                  Mourad Debbabi and
                  Jean{-}Yves Marion and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Nur Zincir{-}Heywood},
  title        = {Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts},
  booktitle    = {Foundations and Practice of Security - 6th International Symposium,
                  {FPS} 2013, La Rochelle, France, October 21-22, 2013, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8352},
  pages        = {272--287},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-05302-8\_17},
  doi          = {10.1007/978-3-319-05302-8\_17},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/LiHMHAOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/SasakiKSWISO13,
  author       = {Yu Sasaki and
                  Wataru Komatsubara and
                  Yasuhide Sakai and
                  Lei Wang and
                  Mitsugu Iwamoto and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Pierangela Samarati},
  title        = {Meet-in-the-Middle Preimage Attacks Revisited - New Results on {MD5}
                  and {HAVAL}},
  booktitle    = {{SECRYPT} 2013 - Proceedings of the 10th International Conference
                  on Security and Cryptography, Reykjav{\'{\i}}k, Iceland, 29-31
                  July, 2013},
  pages        = {111--122},
  publisher    = {SciTePress},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/document/7223160/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/SasakiKSWISO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangSKSO12,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Wataru Komatsubara and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch
                  Hash Functions {RIPEMD} and {RIPEMD-128}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {100--110},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.100},
  doi          = {10.1587/TRANSFUN.E95.A.100},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangSKSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiOS12,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {Toward Effective Countermeasures against an Improved Fault Sensitivity
                  Analysis},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {234--241},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.234},
  doi          = {10.1587/TRANSFUN.E95.A.234},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiOS12,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {New Fault-Based Side-Channel Attack Using Fault Sensitivity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {1},
  pages        = {88--97},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2011.2169666},
  doi          = {10.1109/TIFS.2011.2169666},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/SakiyamaLIO12,
  author       = {Kazuo Sakiyama and
                  Yang Li and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {Information-Theoretic Approach to Optimal Differential Fault Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {7},
  number       = {1},
  pages        = {109--120},
  year         = {2012},
  url          = {https://doi.org/10.1109/TIFS.2011.2174984},
  doi          = {10.1109/TIFS.2011.2174984},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/SakiyamaLIO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvlsi/KnezevicKIMSKFKSSVOHA12,
  author       = {Miroslav Knezevic and
                  Kazuyuki Kobayashi and
                  Jun Ikegami and
                  Shin'ichiro Matsuo and
                  Akashi Satoh and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Junfeng Fan and
                  Toshihiro Katashita and
                  Takeshi Sugawara and
                  Kazuo Sakiyama and
                  Ingrid Verbauwhede and
                  Kazuo Ohta and
                  Naofumi Homma and
                  Takafumi Aoki},
  title        = {Fair and Consistent Hardware Evaluation of Fourteen Round Two {SHA-3}
                  Candidates},
  journal      = {{IEEE} Trans. Very Large Scale Integr. Syst.},
  volume       = {20},
  number       = {5},
  pages        = {827--840},
  year         = {2012},
  url          = {https://doi.org/10.1109/TVLSI.2011.2128353},
  doi          = {10.1109/TVLSI.2011.2128353},
  timestamp    = {Fri, 26 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvlsi/KnezevicKIMSKFKSSVOHA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SasakiWSSO12,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Yasuhide Sakai and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Aikaterini Mitrokotsa and
                  Serge Vaudenay},
  title        = {Three-Subset Meet-in-the-Middle Attack on Reduced {XTEA}},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2012 - 5th International Conference
                  on Cryptology in Africa, Ifrance, Morocco, July 10-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7374},
  pages        = {138--154},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31410-0\_9},
  doi          = {10.1007/978-3-642-31410-0\_9},
  timestamp    = {Sun, 02 Jun 2019 21:14:37 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/SasakiWSSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiOS12,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {An Extension of Fault Sensitivity Analysis Based on Clockwise Collision},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {46--59},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_4},
  doi          = {10.1007/978-3-642-38519-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/EndoLHSOA12,
  author       = {Sho Endo and
                  Yang Li and
                  Naofumi Homma and
                  Kazuo Sakiyama and
                  Kazuo Ohta and
                  Takafumi Aoki},
  editor       = {Guido Bertoni and
                  Benedikt Gierlichs},
  title        = {An Efficient Countermeasure against Fault Sensitivity Analysis Using
                  Configurable Delay Blocks},
  booktitle    = {2012 Workshop on Fault Diagnosis and Tolerance in Cryptography, Leuven,
                  Belgium, September 9, 2012},
  pages        = {95--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/FDTC.2012.12},
  doi          = {10.1109/FDTC.2012.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/EndoLHSOA12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NakasoneLSIOS12,
  author       = {Toshiki Nakasone and
                  Yang Li and
                  Yu Sasaki and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision
                  Distinguisher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {395--409},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_28},
  doi          = {10.1007/978-3-642-37682-5\_28},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/NakasoneLSIOS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KoyamaWSSO12,
  author       = {Takuma Koyama and
                  Lei Wang and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {New Truncated Differential Cryptanalysis on 3D Block Cipher},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {109--125},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_8},
  doi          = {10.1007/978-3-642-29101-2\_8},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/KoyamaWSSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/Sasaki0TSO12,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Yasuhiro Takasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Boomerang Distinguishers for Full {HAS-160} Compression Function},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {156--169},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_10},
  doi          = {10.1007/978-3-642-34117-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/Sasaki0TSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/0007SSO12,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash
                  Function},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {170--181},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_11},
  doi          = {10.1007/978-3-642-34117-5\_11},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/0007SSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SakaiSEHO12,
  author       = {Yusuke Sakai and
                  Jacob C. N. Schuldt and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {On the Security of Dynamic Group Signatures: Preventing Signature
                  Hijacking},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {715--732},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_42},
  doi          = {10.1007/978-3-642-30057-8\_42},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SakaiSEHO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/isc/TakahashiFGLSO12,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Shigeto Gomisawa and
                  Yang Li and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Marc Joye and
                  Michael Tunstall},
  title        = {Fault Injection and Key Retrieval Experiments on an Evaluation Board},
  booktitle    = {Fault Analysis in Cryptography},
  series       = {Information Security and Cryptography},
  pages        = {313--331},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29656-7\_18},
  doi          = {10.1007/978-3-642-29656-7\_18},
  timestamp    = {Fri, 27 Mar 2020 08:31:50 +0100},
  biburl       = {https://dblp.org/rec/series/isc/TakahashiFGLSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SakaiSEHO12,
  author       = {Yusuke Sakai and
                  Jacob C. N. Schuldt and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  title        = {On the Security of Dynamic Group Signatures: Preventing Signature
                  Hijacking},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SakaiSEHO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NaitoYWO11,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  title        = {Security of Cryptosystems Using Merkle-Damg{\aa}rd in the Random Oracle
                  Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {57--70},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.57},
  doi          = {10.1587/TRANSFUN.E94.A.57},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NaitoYWO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SantosoOSH11,
  author       = {Bagus Santoso and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Goichiro Hanaoka},
  title        = {An Efficient Authentication for Lightweight Devices by Perfecting
                  Zero-Knowledgeness},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {92--103},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.92},
  doi          = {10.1587/TRANSFUN.E94.A.92},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/SantosoOSH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiSKO11,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Shin{-}ichi Kawamura and
                  Kazuo Ohta},
  title        = {Power Analysis against a DPA-Resistant S-Box Implementation Based
                  on the Fourier Transform},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {191--199},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.191},
  doi          = {10.1587/TRANSFUN.E94.A.191},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiSKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SakaiOS11,
  author       = {Fuminori Sakai and
                  Kazuo Ohta and
                  Kunio Sawaya},
  title        = {Ultra-Wideband Array Antenna Utilizing Novel Scanning System with
                  Tapped Delay Lines for Short Range Radar},
  journal      = {{IEICE} Trans. Commun.},
  volume       = {94-B},
  number       = {5},
  pages        = {1194--1200},
  year         = {2011},
  url          = {https://doi.org/10.1587/transcom.E94.B.1194},
  doi          = {10.1587/TRANSCOM.E94.B.1194},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SakaiOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoneyamaTHO11,
  author       = {Kazuki Yoneyama and
                  Masayuki Terada and
                  Sadayuki Hongo and
                  Kazuo Ohta},
  title        = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile
                  Environments},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {6},
  pages        = {1263--1273},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1263},
  doi          = {10.1587/TRANSFUN.E94.A.1263},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoneyamaTHO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SakaiHKO11,
  author       = {Yusuke Sakai and
                  Goichiro Hanaoka and
                  Kaoru Kurosawa and
                  Kazuo Ohta},
  title        = {How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms
                  in the Random Oracle Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {6},
  pages        = {1293--1305},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1293},
  doi          = {10.1587/TRANSFUN.E94.A.1293},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SakaiHKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/UshidaKYO11,
  author       = {Mebae Ushida and
                  Yutaka Kawai and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  title        = {Proxiable Designated Verifier Signature},
  journal      = {J. Inf. Process.},
  volume       = {19},
  pages        = {430--440},
  year         = {2011},
  url          = {https://doi.org/10.2197/ipsjjip.19.430},
  doi          = {10.2197/IPSJJIP.19.430},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/UshidaKYO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/IzuIKO11,
  author       = {Tetsuya Izu and
                  Masami Izumi and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Yet Another Sanitizable and Deletable Signatures},
  booktitle    = {25th {IEEE} International Conference on Advanced Information Networking
                  and Applications Workshops, {WAINA} 2011, Biopolis, Singapore, March
                  22-25, 2011},
  pages        = {574--579},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WAINA.2011.117},
  doi          = {10.1109/WAINA.2011.117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/IzuIKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/MoradiMPLOS11,
  author       = {Amir Moradi and
                  Oliver Mischke and
                  Christof Paar and
                  Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {On the Power of Fault Sensitivity Analysis and Collision Side-Channel
                  Attacks in a Combined Setting},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {292--311},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_20},
  doi          = {10.1007/978-3-642-23951-9\_20},
  timestamp    = {Sat, 19 Oct 2019 20:26:25 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/MoradiMPLOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/YamamotoSIOOTI11,
  author       = {Dai Yamamoto and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Takao Ochiai and
                  Masahiko Takenaka and
                  Kouichi Itoh},
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Uniqueness Enhancement of {PUF} Responses Based on the Locations of
                  Random Outputting {RS} Latches},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  pages        = {390--406},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9\_26},
  doi          = {10.1007/978-3-642-23951-9\_26},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/YamamotoSIOOTI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/WangSKOS11,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Wataru Komatsubara and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Aggelos Kiayias},
  title        = {(Second) Preimage Attacks on Step-Reduced {RIPEMD/RIPEMD-128} with
                  a New Local-Collision Approach},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2011 - The Cryptographers' Track at
                  the {RSA} Conference 2011, San Francisco, CA, USA, February 14-18,
                  2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6558},
  pages        = {197--212},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19074-2\_14},
  doi          = {10.1007/978-3-642-19074-2\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/WangSKOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HanataniOMSO11,
  author       = {Yoshikazu Hanatani and
                  Miyako Ohkubo and
                  Shin'ichiro Matsuo and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {George Danezis and
                  Sven Dietrich and
                  Kazue Sako},
  title        = {A Study on Computational Formal Verification for Practical Cryptographic
                  Protocol: The Case of Synchronous {RFID} Authentication},
  booktitle    = {Financial Cryptography and Data Security - {FC} 2011 Workshops, {RLCPS}
                  and {WECSR} 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7126},
  pages        = {70--87},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29889-9\_7},
  doi          = {10.1007/978-3-642-29889-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HanataniOMSO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fdtc/SakamotoLOS11,
  author       = {Hikaru Sakamoto and
                  Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  editor       = {Luca Breveglieri and
                  Sylvain Guilley and
                  Israel Koren and
                  David Naccache and
                  Junko Takahashi},
  title        = {Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems},
  booktitle    = {2011 Workshop on Fault Diagnosis and Tolerance in Cryptography, {FDTC}
                  2011, Tokyo, Japan, September 29, 2011},
  pages        = {11--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/FDTC.2011.17},
  doi          = {10.1109/FDTC.2011.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fdtc/SakamotoLOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/LiOS11,
  author       = {Yang Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {Revisit fault sensitivity analysis on {WDDL-AES}},
  booktitle    = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
                  Diego, California, {USA}},
  pages        = {148--153},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HST.2011.5955013},
  doi          = {10.1109/HST.2011.5955013},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/LiOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/HattoriHIMMSO11,
  author       = {Mitsuhiro Hattori and
                  Takato Hirano and
                  Takashi Ito and
                  Nori Matsuda and
                  Takumi Mori and
                  Yusuke Sakai and
                  Kazuo Ohta},
  editor       = {Liqun Chen},
  title        = {Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application
                  to Searchable Encryption in Multi-user Setting},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {190--209},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_12},
  doi          = {10.1007/978-3-642-25516-8\_12},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/HattoriHIMMSO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/IwamotoO11,
  author       = {Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Alexander Kuleshov and
                  Vladimir M. Blinovsky and
                  Anthony Ephremides},
  title        = {Security notions for information theoretically secure encryptions},
  booktitle    = {2011 {IEEE} International Symposium on Information Theory Proceedings,
                  {ISIT} 2011, St. Petersburg, Russia, July 31 - August 5, 2011},
  pages        = {1777--1781},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISIT.2011.6033854},
  doi          = {10.1109/ISIT.2011.6033854},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/IwamotoO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SasakiTSO11,
  author       = {Yu Sasaki and
                  Naoyuki Takayanagi and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Tetsu Iwata and
                  Masakatsu Nishigaki},
  title        = {Experimental Verification of Super-Sbox Analysis - Confirmation of
                  Detailed Attack Complexity},
  booktitle    = {Advances in Information and Computer Security - 6th International
                  Workshop, {IWSEC} 2011, Tokyo, Japan, November 8-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7038},
  pages        = {178--192},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25141-2\_12},
  doi          = {10.1007/978-3-642-25141-2\_12},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SasakiTSO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NaitoYWO11,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Security of Practical Cryptosystems Using Merkle-Damg{\aa}rd Hash
                  Function in the Ideal Cipher Model},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {281--296},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_20},
  doi          = {10.1007/978-3-642-24316-5\_20},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NaitoYWO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1106-1731,
  author       = {Mitsugu Iwamoto and
                  Kazuo Ohta},
  title        = {Security Notions for Information Theoretically Secure Encryptions},
  journal      = {CoRR},
  volume       = {abs/1106.1731},
  year         = {2011},
  url          = {http://arxiv.org/abs/1106.1731},
  eprinttype    = {arXiv},
  eprint       = {1106.1731},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1106-1731.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiNLOS11,
  author       = {Yang Li and
                  Daisuke Nakatsu and
                  Qi Li and
                  Kazuo Ohta and
                  Kazuo Sakiyama},
  title        = {Clockwise Collision Analysis - Overlooked Side-Channel Leakage Inside
                  Your Measurements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {579},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/579},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiNLOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWOAK10,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Kazumaro Aoki and
                  Noboru Kunihiro},
  title        = {Practical Password Recovery Attacks on {MD4} Based Prefix and Hybrid
                  Authentication Protocols},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {84--92},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.84},
  doi          = {10.1587/TRANSFUN.E93.A.84},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiWOAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SakiyamaO10,
  author       = {Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {On Clock-Based Fault Analysis Attack for an {AES} Hardware Using {RSL}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {172--179},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.172},
  doi          = {10.1587/TRANSFUN.E93.A.172},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SakiyamaO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangOSSK10,
  author       = {Lei Wang and
                  Kazuo Ohta and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Noboru Kunihiro},
  title        = {Cryptanalysis of Two MD5-Based Authentication Protocols: {APOP} and
                  {NMAC}},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {5},
  pages        = {1087--1095},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.1087},
  doi          = {10.1587/TRANSINF.E93.D.1087},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangOSSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KawaiTKYOK10,
  author       = {Yutaka Kawai and
                  Shotaro Tanno and
                  Takahiro Kondo and
                  Kazuki Yoneyama and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone
                  Condition},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {6},
  pages        = {1122--1131},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1122},
  doi          = {10.1587/TRANSFUN.E93.A.1122},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KawaiTKYOK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/UshidaITO10,
  author       = {Mebae Ushida and
                  Tetsuya Izu and
                  Masahiko Takenaka and
                  Kazuo Ohta},
  title        = {Multiple Designated Verifiers Signatures Reconsidered},
  booktitle    = {{ARES} 2010, Fifth International Conference on Availability, Reliability
                  and Security, 15-18 February 2010, Krakow, Poland},
  pages        = {586--590},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ARES.2010.58},
  doi          = {10.1109/ARES.2010.58},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/UshidaITO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SasakiLWSO10,
  author       = {Yu Sasaki and
                  Yang Li and
                  Lei Wang and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Masayuki Abe},
  title        = {Non-full-active Super-Sbox Analysis: Applications to {ECHO} and Gr{\o}stl},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2010 - 16th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 5-9, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6477},
  pages        = {38--55},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17373-8\_3},
  doi          = {10.1007/978-3-642-17373-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SasakiLWSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/LiSGFTO10,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Shigeto Gomisawa and
                  Toshinori Fukunaga and
                  Junko Takahashi and
                  Kazuo Ohta},
  editor       = {Stefan Mangard and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Fault Sensitivity Analysis},
  booktitle    = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International
                  Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6225},
  pages        = {320--334},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15031-9\_22},
  doi          = {10.1007/978-3-642-15031-9\_22},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/LiSGFTO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/YoneyamaUO10,
  author       = {Kazuki Yoneyama and
                  Mebae Ushida and
                  Kazuo Ohta},
  editor       = {Xuejia Lai and
                  Moti Yung and
                  Dongdai Lin},
  title        = {Rigorous Security Requirements for Designated Verifier Signatures},
  booktitle    = {Information Security and Cryptology - 6th International Conference,
                  Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6584},
  pages        = {318--335},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-21518-6\_22},
  doi          = {10.1007/978-3-642-21518-6\_22},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/YoneyamaUO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SantosoOSH10,
  author       = {Bagus Santoso and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Goichiro Hanaoka},
  editor       = {Josef Pieprzyk},
  title        = {Improving Efficiency of an `On the Fly' Identification Scheme by Perfecting
                  Zero-Knowledgeness},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {284--301},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_20},
  doi          = {10.1007/978-3-642-11925-5\_20},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SantosoOSH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/IzumiISO10,
  author       = {Masami Izumi and
                  Jun Ikegami and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {Improved countermeasure against Address-bit {DPA} for {ECC} scalar
                  multiplication},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {981--984},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5456907},
  doi          = {10.1109/DATE.2010.5456907},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/IzumiISO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/LiSBNO10,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Lejla Batina and
                  Daisuke Nakatsu and
                  Kazuo Ohta},
  editor       = {Giovanni De Micheli and
                  Bashir M. Al{-}Hashimi and
                  Wolfgang M{\"{u}}ller and
                  Enrico Macii},
  title        = {Power Variance Analysis breaks a masked {ASIC} implementation of {AES}},
  booktitle    = {Design, Automation and Test in Europe, {DATE} 2010, Dresden, Germany,
                  March 8-12, 2010},
  pages        = {1059--1064},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/DATE.2010.5456966},
  doi          = {10.1109/DATE.2010.5456966},
  timestamp    = {Thu, 22 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/date/LiSBNO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/KobayashiISOKKFVGMHNS10,
  author       = {Kazuyuki Kobayashi and
                  Jun Ikegami and
                  Kazuo Sakiyama and
                  Kazuo Ohta and
                  Miroslav Knezevic and
                  {\"{U}}nal Ko{\c{c}}abas and
                  Junfeng Fan and
                  Ingrid Verbauwhede and
                  Eric Xu Guo and
                  Shin'ichiro Matsuo and
                  Sinan Huang and
                  Leyla Nazhandali and
                  Akashi Satoh},
  editor       = {Jim Plusquellic and
                  Ken Mai},
  title        = {Prototyping Platform for Performance Evaluation of {SHA-3} Candidates},
  booktitle    = {{HOST} 2010, Proceedings of the 2010 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 13-14 June 2010, Anaheim
                  Convention Center, California, {USA}},
  pages        = {60--63},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/HST.2010.5513111},
  doi          = {10.1109/HST.2010.5513111},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/KobayashiISOKKFVGMHNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/UshidaKYO10,
  author       = {Mebae Ushida and
                  Yutaka Kawai and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Mohammad S. Obaidat and
                  George A. Tsihrintzis and
                  Joaquim Filipe},
  title        = {Proxiable Designated Verifier Signature},
  booktitle    = {e-Business and Telecommunications - 7th International Joint Conference,
                  {ICETE} 2010, Athens, Greece, July 26-28, 2010, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {222},
  pages        = {220--232},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-25206-8\_14},
  doi          = {10.1007/978-3-642-25206-8\_14},
  timestamp    = {Sat, 19 Oct 2019 20:35:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/UshidaKYO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YoneyamaTHO10,
  author       = {Kazuki Yoneyama and
                  Masayuki Terada and
                  Sadayuki Hongo and
                  Kazuo Ohta},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Universally Composable NBAC-Based Fair Voucher Exchange for Mobile
                  Environments},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  pages        = {42--59},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  timestamp    = {Thu, 15 Sep 2011 15:14:43 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YoneyamaTHO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SakaiHKO10,
  author       = {Yusuke Sakai and
                  Goichiro Hanaoka and
                  Kaoru Kurosawa and
                  Kazuo Ohta},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {A Generic Method for Reducing Ciphertext Length of Reproducible KEMs
                  in the {RO} Model},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_5},
  doi          = {10.1007/978-3-642-16825-3\_5},
  timestamp    = {Mon, 15 Jun 2020 17:00:57 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SakaiHKO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/HirotaIKO10,
  author       = {Naoyuki Hirota and
                  Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Tomoya Enokido and
                  Fatos Xhafa and
                  Leonard Barolli and
                  Makoto Takizawa and
                  Minoru Uehara and
                  Arjan Durresi},
  title        = {An Evaluation of the Sieving Device {YASD} for 1024-Bit Integers},
  booktitle    = {The 13th International Conference on Network-Based Information Systems,
                  NBiS 2010, Takayama, Gifu, Japan, 14-16 September 2010},
  pages        = {546--551},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NBiS.2010.61},
  doi          = {10.1109/NBIS.2010.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/HirotaIKO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UshidaOKY10,
  author       = {Mebae Ushida and
                  Kazuo Ohta and
                  Yutaka Kawai and
                  Kazuki Yoneyama},
  editor       = {Sokratis K. Katsikas and
                  Pierangela Samarati},
  title        = {Proxiable Designated Verifier Signature},
  booktitle    = {{SECRYPT} 2010 - Proceedings of the International Conference on Security
                  and Cryptography, Athens, Greece, July 26-28, 2010, {SECRYPT} is part
                  of {ICETE} - The International Joint Conference on e-Business and
                  Telecommunications},
  pages        = {344--353},
  publisher    = {SciTePress},
  year         = {2010},
  timestamp    = {Fri, 07 Jan 2011 08:40:23 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/UshidaOKY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/NakatsuLSO10,
  author       = {Daisuke Nakatsu and
                  Yang Li and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Yongwha Chung and
                  Moti Yung},
  title        = {Combination of {SW} Countermeasure and {CPU} Modification on {FPGA}
                  against Power Analysis},
  booktitle    = {Information Security Applications - 11th International Workshop, {WISA}
                  2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6513},
  pages        = {258--272},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17955-6\_19},
  doi          = {10.1007/978-3-642-17955-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/NakatsuLSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KobayashiIMSO10,
  author       = {Kazuyuki Kobayashi and
                  Jun Ikegami and
                  Shin'ichiro Matsuo and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Evaluation of Hardware Performance for the {SHA-3} Candidates Using
                  {SASEBO-GII}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {10},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/010},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KobayashiIMSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiGSO10,
  author       = {Yang Li and
                  Shigeto Gomisawa and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {An Information Theoretic Perspective on the Differential Fault Analysis
                  against {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiGSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GomisawaLTFSSO10,
  author       = {Shigeto Gomisawa and
                  Yang Li and
                  Junko Takahashi and
                  Toshinori Fukunaga and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Efficient Differential Fault Analysis for {AES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {336},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/336},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GomisawaLTFSSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OhkuboMHSO10,
  author       = {Miyako Ohkubo and
                  Shin'ichiro Matsuo and
                  Yoshikazu Hanatani and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {Robust {RFID} Authentication Protocol with Formal Proof and Its Feasibility},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OhkuboMHSO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Ohta09,
  author       = {Kazuo Ohta},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {1--2},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1},
  doi          = {10.1587/TRANSFUN.E92.A.1},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Ohta09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishideYO09,
  author       = {Takashi Nishide and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  title        = {Attribute-Based Encryption with Partially Hidden Ciphertext Policies},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {22--32},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.22},
  doi          = {10.1587/TRANSFUN.E92.A.22},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishideYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangOK09,
  author       = {Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Near-Collision Attacks on {MD4:} Applied to MD4-Based Protocols},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {76--86},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.76},
  doi          = {10.1587/TRANSFUN.E92.A.76},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangOK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YajimaINSSPKO09,
  author       = {Jun Yajima and
                  Terutoshi Iwasaki and
                  Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Thomas Peyrin and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {A Strict Evaluation on the Number of Conditions for {SHA-1} Collision
                  Search},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {87--95},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.87},
  doi          = {10.1587/TRANSFUN.E92.A.87},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YajimaINSSPKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWOK09,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {96--104},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.96},
  doi          = {10.1587/TRANSFUN.E92.A.96},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiWOK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SantosoO09,
  author       = {Bagus Santoso and
                  Kazuo Ohta},
  title        = {A New 'On the Fly' Identification Scheme: An Asymptoticity Trade-Off
                  between {ZK} and Correctness},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {122--136},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.122},
  doi          = {10.1587/TRANSFUN.E92.A.122},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/SantosoO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoneyamaMO09,
  author       = {Kazuki Yoneyama and
                  Satoshi Miyagawa and
                  Kazuo Ohta},
  title        = {Leaky Random Oracle},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {8},
  pages        = {1795--1807},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1795},
  doi          = {10.1587/TRANSFUN.E92.A.1795},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoneyamaMO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IzumiSO09,
  author       = {Masami Izumi and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  title        = {A New Approach for Implementing the {MPL} Method toward Higher {SPA}
                  Resistance},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {181--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.61},
  doi          = {10.1109/ARES.2009.61},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/IzumiSO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IzuKOST09,
  author       = {Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta and
                  Makoto Sano and
                  Masahiko Takenaka},
  title        = {Yet Another Sanitizable Signature from Bilinear Maps},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {941--946},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.14},
  doi          = {10.1109/ARES.2009.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/IzuKOST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KomanoOMS09,
  author       = {Yuichi Komano and
                  Kazuo Ohta and
                  Hideyuki Miyake and
                  Atsushi Shimbo},
  editor       = {Michel Abdalla and
                  David Pointcheval and
                  Pierre{-}Alain Fouque and
                  Damien Vergnaud},
  title        = {Algorithmic Tamper Proof {(ATP)} Counter Units for Authentication
                  Devices Using {PIN}},
  booktitle    = {Applied Cryptography and Network Security, 7th International Conference,
                  {ACNS} 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5536},
  pages        = {306--323},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01957-9\_19},
  doi          = {10.1007/978-3-642-01957-9\_19},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KomanoOMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaitoYWO09,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  editor       = {Mitsuru Matsui},
  title        = {How to Confirm Cryptosystems Security: The Original Merkle-Damg{\aa}rd
                  Is Still Alive!},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {382--398},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_23},
  doi          = {10.1007/978-3-642-10366-7\_23},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NaitoYWO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SakiyamaYO09,
  author       = {Kazuo Sakiyama and
                  Tatsuya Yagi and
                  Kazuo Ohta},
  editor       = {Marc Fischlin},
  title        = {Fault Analysis Attack against an {AES} Prototype Chip Using {RSL}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2009, The Cryptographers' Track at
                  the {RSA} Conference 2009, San Francisco, CA, USA, April 20-24, 2009.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5473},
  pages        = {429--443},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00862-7\_29},
  doi          = {10.1007/978-3-642-00862-7\_29},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SakiyamaYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LiSKKO09,
  author       = {Yang Li and
                  Kazuo Sakiyama and
                  Shin{-}ichi Kawamura and
                  Yuichi Komano and
                  Kazuo Ohta},
  editor       = {Sihan Qing and
                  Chris J. Mitchell and
                  Guilin Wang},
  title        = {Security Evaluation of a DPA-Resistant S-Box Based on the Fourier
                  Transform},
  booktitle    = {Information and Communications Security, 11th International Conference,
                  {ICICS} 2009, Beijing, China, December 14-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5927},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-11145-7\_3},
  doi          = {10.1007/978-3-642-11145-7\_3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LiSKKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/KawaiYO09,
  author       = {Yutaka Kawai and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Secret Handshake: Strong Anonymity Definition and Construction},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {219--229},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_20},
  doi          = {10.1007/978-3-642-00843-6\_20},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/KawaiYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangSSO09,
  author       = {Lei Wang and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Kazuo Ohta},
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Bit-Free Collision: Application to {APOP} Attack},
  booktitle    = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  pages        = {3--21},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3\_2},
  doi          = {10.1007/978-3-642-04846-3\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangSSO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoYWO09,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  title        = {How to Prove the Security of Practical Cryptosystems with Merkle-Damg{\aa}rd
                  Hashing by Adopting Indifferentiability},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {40},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoYWO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoYWO09a,
  author       = {Yusuke Naito and
                  Kazuki Yoneyama and
                  Lei Wang and
                  Kazuo Ohta},
  title        = {Security of Practical Cryptosystems Using Merkle-Damgard Hash Function
                  in the Ideal Cipher Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoYWO09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawaiYO09,
  author       = {Yutaka Kawai and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  title        = {Secret Handshake: Strong Anonymity Definition and Construction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {148},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/148},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawaiYO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoWO09,
  author       = {Yusuke Naito and
                  Lei Wang and
                  Kazuo Ohta},
  title        = {How to Construct Cryptosystems and Hash Functions in Weakened Random
                  Oracle Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {550},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/550},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoWO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NaitoOK08,
  author       = {Yusuke Naito and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Improved Collision Search for Hash Functions: New Advanced Message
                  Modification},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {46--54},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.46},
  doi          = {10.1093/IETFEC/E91-A.1.46},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NaitoOK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWKO08,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {New Message Differences for Collision Attacks on {MD4} and {MD5}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {55--63},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.55},
  doi          = {10.1093/IETFEC/E91-A.1.55},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiWKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KomanoOSK08,
  author       = {Yuichi Komano and
                  Kazuo Ohta and
                  Atsushi Shimbo and
                  Shin{-}ichi Kawamura},
  title        = {Provably Secure Multisignatures in Formal Security Model and Their
                  Optimality},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {107--118},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.107},
  doi          = {10.1093/IETFEC/E91-A.1.107},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KomanoOSK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SantosoKKO08,
  author       = {Bagus Santoso and
                  Noboru Kunihiro and
                  Naoki Kanayama and
                  Kazuo Ohta},
  title        = {Factorization of Square-Free Integers with High Bits Known},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {306--315},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.306},
  doi          = {10.1093/IETFEC/E91-A.1.306},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/SantosoKKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NishideYO08,
  author       = {Takashi Nishide and
                  Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Steven M. Bellovin and
                  Rosario Gennaro and
                  Angelos D. Keromytis and
                  Moti Yung},
  title        = {Attribute-Based Encryption with Partially Hidden Encryptor-Specified
                  Access Structures},
  booktitle    = {Applied Cryptography and Network Security, 6th International Conference,
                  {ACNS} 2008, New York, NY, USA, June 3-6, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5037},
  pages        = {111--129},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68914-0\_7},
  doi          = {10.1007/978-3-540-68914-0\_7},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NishideYO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SasakiWOK08,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Serge Vaudenay},
  title        = {Password Recovery on Challenge and Response: Impossible Differential
                  Attack on Hash Function},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {290--307},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_20},
  doi          = {10.1007/978-3-540-68164-9\_20},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/SasakiWOK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YajimaINSSKO08,
  author       = {Jun Yajima and
                  Terutoshi Iwasaki and
                  Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {A strict evaluation method on the number of conditions for the {SHA-1}
                  collision search},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {10--20},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368316},
  doi          = {10.1145/1368310.1368316},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YajimaINSSKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiWOK08,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Tal Malkin},
  title        = {Security of {MD5} Challenge and Response: Extension of {APOP} Password
                  Recovery Attack},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_1},
  doi          = {10.1007/978-3-540-79263-5\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SasakiWOK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WangOK08,
  author       = {Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Nigel P. Smart},
  title        = {New Key-Recovery Attacks on {HMAC/NMAC-MD4} and {NMAC-MD5}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {237--253},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_14},
  doi          = {10.1007/978-3-540-78967-3\_14},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WangOK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoneyamaMO08,
  author       = {Kazuki Yoneyama and
                  Satoshi Miyagawa and
                  Kazuo Ohta},
  editor       = {Joonsang Baek and
                  Feng Bao and
                  Kefei Chen and
                  Xuejia Lai},
  title        = {Leaky Random Oracle (Extended Abstract)},
  booktitle    = {Provable Security, Second International Conference, ProvSec 2008,
                  Shanghai, China, October 30 - November 1, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5324},
  pages        = {226--240},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88733-1\_16},
  doi          = {10.1007/978-3-540-88733-1\_16},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YoneyamaMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IzuKOST08,
  author       = {Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta and
                  Makoto Sano and
                  Masahiko Takenaka},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Sanitizable and Deletable Signature},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_10},
  doi          = {10.1007/978-3-642-00306-6\_10},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IzuKOST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KawaiTKYKO08,
  author       = {Yutaka Kawai and
                  Shotaro Tanno and
                  Takahiro Kondo and
                  Kazuki Yoneyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone
                  Condition},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_12},
  doi          = {10.1007/978-3-642-00306-6\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KawaiTKYKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiNKO07,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Improved Collision Attacks on {MD4} and {MD5}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {36--47},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.36},
  doi          = {10.1093/IETFEC/E90-A.1.36},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiNKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KomanoOSK07,
  author       = {Yuichi Komano and
                  Kazuo Ohta and
                  Atsushi Shimbo and
                  Shin{-}ichi Kawamura},
  title        = {Toward the Fair Anonymous Signatures: Deniable Ring Signatures},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {54--64},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.54},
  doi          = {10.1093/IETFEC/E90-A.1.54},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KomanoOSK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OtaYKTO07,
  author       = {Haruki Ota and
                  Kazuki Yoneyama and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka and
                  Kazuo Ohta},
  title        = {Universally Composable Hierarchical Hybrid Authenticated Key Exchange},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {139--151},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.139},
  doi          = {10.1093/IETFEC/E90-A.1.139},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OtaYKTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishideO07,
  author       = {Takashi Nishide and
                  Kazuo Ohta},
  title        = {Constant-Round Multiparty Computation for Interval Test, Equality
                  Test, and Comparison},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {5},
  pages        = {960--968},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.5.960},
  doi          = {10.1093/IETFEC/E90-A.5.960},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishideO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanataniKOK07,
  author       = {Yoshikazu Hanatani and
                  Yuichi Komano and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Provably Secure Untraceable Electronic Cash against Insider Attacks},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {5},
  pages        = {980--991},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.5.980},
  doi          = {10.1093/IETFEC/E90-A.5.980},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanataniKOK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/TakahashiKO07,
  author       = {Yasuhiro Takahashi and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {The quantum fourier transform on a linear nearest neighbor architecture},
  journal      = {Quantum Inf. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {383--391},
  year         = {2007},
  url          = {https://doi.org/10.26421/QIC7.4-7},
  doi          = {10.26421/QIC7.4-7},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/TakahashiKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/YoneyamaOO07,
  author       = {Kazuki Yoneyama and
                  Haruki Ota and
                  Kazuo Ohta},
  editor       = {Serdar Boztas and
                  Hsiao{-}feng Lu},
  title        = {Secure Cross-Realm Client-to-Client Password-Based Authenticated Key
                  Exchange Against Undetectable On-Line Dictionary Attacks},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  17th International Symposium, AAECC-17, Bangalore, India, December
                  16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4851},
  pages        = {257--266},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77224-8\_30},
  doi          = {10.1007/978-3-540-77224-8\_30},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/YoneyamaOO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07,
  author       = {Jun Yajima and
                  Yu Sasaki and
                  Yusuke Naito and
                  Terutoshi Iwasaki and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {A New Strategy for Finding a Differential Path of {SHA-1}},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {45--58},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_4},
  doi          = {10.1007/978-3-540-73458-1\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YajimaSNISKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YoneyamaO07,
  author       = {Kazuki Yoneyama and
                  Kazuo Ohta},
  editor       = {Feng Bao and
                  Steven Miller},
  title        = {Ring signatures: universally composable definitions and constructions},
  booktitle    = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages        = {374--376},
  publisher    = {{ACM}},
  year         = {2007},
  url          = {https://doi.org/10.1145/1229285.1229332},
  doi          = {10.1145/1229285.1229332},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YoneyamaO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SasakiWOK07,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Alex Biryukov},
  title        = {New Message Difference for {MD4}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {329--348},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_21},
  doi          = {10.1007/978-3-540-74619-5\_21},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/SasakiWOK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TeradaYHO07,
  author       = {Masayuki Terada and
                  Kazuki Yoneyama and
                  Sadayuki Hongo and
                  Kazuo Ohta},
  editor       = {Sihan Qing and
                  Hideki Imai and
                  Guilin Wang},
  title        = {Modeling Agreement Problems in the Universal Composability Framework},
  booktitle    = {Information and Communications Security, 9th International Conference,
                  {ICICS} 2007, Zhengzhou, China, December 12-15, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4861},
  pages        = {350--361},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77048-0\_27},
  doi          = {10.1007/978-3-540-77048-0\_27},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/TeradaYHO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/IzuKOTY07,
  author       = {Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta and
                  Masahiko Takenaka and
                  Takashi Yoshioka},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {A Sanitizable Signature Scheme with Aggregation},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_6},
  doi          = {10.1007/978-3-540-72163-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/IzuKOTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NishideO07,
  author       = {Takashi Nishide and
                  Kazuo Ohta},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Multiparty Computation for Interval, Equality, and Comparison Without
                  Bit-Decomposition Protocol},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {343--360},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_23},
  doi          = {10.1007/978-3-540-71677-8\_23},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NishideO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KomanoO06,
  author       = {Yuichi Komano and
                  Kazuo Ohta},
  title        = {Taxonomical Security Consideration of {OAEP} Variants},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {5},
  pages        = {1233--1245},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.5.1233},
  doi          = {10.1093/IETFEC/E89-A.5.1233},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KomanoO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IwamotoWYKO06,
  author       = {Mitsugu Iwamoto and
                  Lei Wang and
                  Kazuki Yoneyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Visual Secret Sharing Schemes for Multiple Secret Images Allowing
                  the Rotation of Shares},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {5},
  pages        = {1382--1395},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.5.1382},
  doi          = {10.1093/IETFEC/E89-A.5.1382},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IwamotoWYKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KunihiroAO06,
  author       = {Noboru Kunihiro and
                  Wataru Abe and
                  Kazuo Ohta},
  title        = {Maurer-Yacobi ID-Based Key Distribution Revisited},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {5},
  pages        = {1421--1424},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.5.1421},
  doi          = {10.1093/IETFEC/E89-A.5.1421},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KunihiroAO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgrs/WatanabeSRTMROFNM06,
  author       = {Manabu Watanabe and
                  Masanobu Shimada and
                  Ake Rosenqvist and
                  Takeo Tadono and
                  Masayuki Matsuoka and
                  Shakil Ahmad Romshoo and
                  Kazuo Ohta and
                  Ryoichi Furuta and
                  Kazuki Nakamura and
                  Toshifumi Moriyama},
  title        = {Forest Structure Dependency of the Relation Between L-Band Sigma \({}^{\mbox{0}}\)
                  and Biophysical Parameters},
  journal      = {{IEEE} Trans. Geosci. Remote. Sens.},
  volume       = {44},
  number       = {11-1},
  pages        = {3154--3165},
  year         = {2006},
  url          = {https://doi.org/10.1109/TGRS.2006.880632},
  doi          = {10.1109/TGRS.2006.880632},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgrs/WatanabeSRTMROFNM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaitoSSYKO06,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Jun Yajima and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {Improved Collision Search for {SHA-0}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_2},
  doi          = {10.1007/11935230\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NaitoSSYKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MamboSOK06,
  author       = {Masahiro Mambo and
                  Mois{\'{e}}s Salinas{-}Rosales and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Problems on the {MR} micropayment schemes},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {363},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128879},
  doi          = {10.1145/1128817.1128879},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MamboSOK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KomanoOSK06,
  author       = {Yuichi Komano and
                  Kazuo Ohta and
                  Atsushi Shimbo and
                  Shin{-}ichi Kawamura},
  editor       = {David Pointcheval},
  title        = {Toward the Fair Anonymous Signatures: Deniable Ring Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_12},
  doi          = {10.1007/11605805\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KomanoOSK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HanataniKOK06,
  author       = {Yoshikazu Hanatani and
                  Yuichi Komano and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Provably Secure Electronic Cash Based on Blind Multisignature Schemes},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {236--250},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_20},
  doi          = {10.1007/11889663\_20},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HanataniKOK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KomanoOSK06,
  author       = {Yuichi Komano and
                  Kazuo Ohta and
                  Atsushi Shimbo and
                  Shin{-}ichi Kawamura},
  editor       = {Sokratis K. Katsikas and
                  Javier L{\'{o}}pez and
                  Michael Backes and
                  Stefanos Gritzalis and
                  Bart Preneel},
  title        = {Formal Security Model of Multisignatures},
  booktitle    = {Information Security, 9th International Conference, {ISC} 2006, Samos
                  Island, Greece, August 30 - September 2, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4176},
  pages        = {146--160},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11836810\_11},
  doi          = {10.1007/11836810\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KomanoOSK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/SantosoKKO06,
  author       = {Bagus Santoso and
                  Noboru Kunihiro and
                  Naoki Kanayama and
                  Kazuo Ohta},
  editor       = {Phong Q. Nguyen},
  title        = {Factorization of Square-Free Integers with High Bits Known},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {115--130},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_8},
  doi          = {10.1007/11958239\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/SantosoKKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/SasakiNYSKO06,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Jun Yajima and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Phong Q. Nguyen},
  title        = {How to Construct Sufficient Conditions for Hash Functions},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {243--259},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_16},
  doi          = {10.1007/11958239\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/SasakiNYSKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoSSYKO06,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Jun Yajima and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Message Modification for Step 21-23 on {SHA-0}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoSSYKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasakiNYSKO06,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Jun Yajima and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {How to Construct Sufficient Condition in Searching Collisions of {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasakiNYSKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AdachiAKO05,
  author       = {Norio Adachi and
                  Satoshi Aoki and
                  Yuichi Komano and
                  Kazuo Ohta},
  title        = {Solutions to Security Problems of Rivest and Shamir's PayWord Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {195--202},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_195\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AdachiAKO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NaitoSKO05,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Improved Collision Attack on {MD4} with Probability Almost 1},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_12},
  doi          = {10.1007/11734727\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/NaitoSKO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/KomanoOSK05,
  author       = {Yuichi Komano and
                  Kazuo Ohta and
                  Atsushi Shimbo and
                  Shin{-}ichi Kawamura},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {On the Security of Probabilistic Multisignature Schemes and Their
                  Optimality},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {132--150},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_10},
  doi          = {10.1007/11554868\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/KomanoOSK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IzuKOS05,
  author       = {Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta and
                  Takeshi Shimoyama},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Analysis on the Clockwise Transposition Routing for Dedicated Factoring
                  Devices},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {232--242},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_18},
  doi          = {10.1007/11604938\_18},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IzuKOS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoSKO05,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Improved Collision Attack on {MD4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoSKO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasakiNKO05,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Improved Collision Attack on {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasakiNKO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KomanoO04,
  author       = {Yuichi Komano and
                  Kazuo Ohta},
  title        = {{OAEP-ES} - Methodology of Universal Padding Technique},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {110--119},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_110\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KomanoO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KomanoO04,
  author       = {Yuichi Komano and
                  Kazuo Ohta},
  editor       = {Javier L{\'{o}}pez and
                  Sihan Qing and
                  Eiji Okamoto},
  title        = {Taxonomic Consideration to {OAEP} Variants and Their Security},
  booktitle    = {Information and Communications Security, 6th International Conference,
                  {ICICS} 2004, Malaga, Spain, October 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3269},
  pages        = {105--117},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30191-2\_9},
  doi          = {10.1007/978-3-540-30191-2\_9},
  timestamp    = {Thu, 29 Aug 2019 08:10:01 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KomanoO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/igarss/WatanabeSRROTMF04,
  author       = {Manabu Watanabe and
                  Masanobu Shimada and
                  Ake Rosenqvist and
                  Shakil Ahmad Romshoo and
                  Kazuo Ohta and
                  Takeo Tadono and
                  Masayuki Matsuoka and
                  Ryoichi Furuta},
  title        = {Tight correlations between forest parameters and backscattering coefficient
                  derived by the L-band airborne {SAR} (PiSAR)},
  booktitle    = {2004 {IEEE} International Geoscience and Remote Sensing Symposium,
                  {IGARSS} 2004, Anchorage, Alaska, USA, 20-24 September 2004},
  pages        = {2340--2343},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/IGARSS.2004.1369755},
  doi          = {10.1109/IGARSS.2004.1369755},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/igarss/WatanabeSRROTMF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KomanoO04,
  author       = {Yuichi Komano and
                  Kazuo Ohta},
  title        = {Efficient Universal Padding Schemes for Multiplicative Trapdoor One-way
                  Permutation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {2},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/002},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KomanoO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/OhtaNOK03,
  author       = {Kazuo Ohta and
                  Tetsuo Nishino and
                  Seiya Okubo and
                  Noboru Kunihiro},
  title        = {A Quantum Algorithm Using {NMR} Computers to Break Secret-Key Cryptosystems},
  journal      = {New Gener. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {347--361},
  year         = {2003},
  url          = {https://doi.org/10.1007/BF03037309},
  doi          = {10.1007/BF03037309},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/OhtaNOK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KomanoO03,
  author       = {Yuichi Komano and
                  Kazuo Ohta},
  editor       = {Dan Boneh},
  title        = {Efficient Universal Padding Techniques for Multiplicative Trapdoor
                  One-Way Permutation},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
                  Cryptology Conference, Santa Barbara, California, USA, August 17-21,
                  2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2729},
  pages        = {366--382},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45146-4\_22},
  doi          = {10.1007/978-3-540-45146-4\_22},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KomanoO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wecwis/AdachiKAO03,
  author       = {Norio Adachi and
                  Yuichi Komano and
                  Satoshi Aoki and
                  Kazuo Ohta},
  title        = {The Security Problems of Rivest and Shamir's PayWord Scheme},
  booktitle    = {2003 {IEEE} International Conference on Electronic Commerce {(CEC}
                  2003), 24-27 June 2003, Newport Beach, CA, {USA}},
  pages        = {20--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2003},
  url          = {https://doi.org/10.1109/COEC.2003.1210226},
  doi          = {10.1109/COEC.2003.1210226},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wecwis/AdachiKAO03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MicaliOR01,
  author       = {Silvio Micali and
                  Kazuo Ohta and
                  Leonid Reyzin},
  editor       = {Michael K. Reiter and
                  Pierangela Samarati},
  title        = {Accountable-subgroup multisignatures: extended abstract},
  booktitle    = {{CCS} 2001, Proceedings of the 8th {ACM} Conference on Computer and
                  Communications Security, Philadelphia, Pennsylvania, USA, November
                  6-8, 2001},
  pages        = {245--254},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/501983.502017},
  doi          = {10.1145/501983.502017},
  timestamp    = {Tue, 10 Nov 2020 20:00:35 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MicaliOR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OhtaO98,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto},
  editor       = {Hugo Krawczyk},
  title        = {On Concrete Security Treatment of Signatures Derived from Identification},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {354--369},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055741},
  doi          = {10.1007/BFB0055741},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OhtaO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KandaTAO98,
  author       = {Masayuki Kanda and
                  Youichi Takashima and
                  Tsutomu Matsumoto and
                  Kazumaro Aoki and
                  Kazuo Ohta},
  editor       = {Stafford E. Tavares and
                  Henk Meijer},
  title        = {A Strategy for Constructing Fast Round Functions with Practical Security
                  Against Differential and Linear Cryptanalysis},
  booktitle    = {Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada,
                  August 17-18, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1556},
  pages        = {264--279},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-48892-8\_21},
  doi          = {10.1007/3-540-48892-8\_21},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KandaTAO98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/1998,
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1},
  doi          = {10.1007/3-540-49649-1},
  isbn         = {3-540-65109-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/KanekoMO97,
  author       = {Yasuyoshi Kaneko and
                  Shiho Moriai and
                  Kazuo Ohta},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {On strict estimation method of provable security against differential
                  and linear cryptanalysis},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {258--268},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028481},
  doi          = {10.1007/BFB0028481},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/KanekoMO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Ohta97,
  author       = {Kazuo Ohta},
  editor       = {Eiji Okamoto and
                  George I. Davida and
                  Masahiro Mambo},
  title        = {Remarks on Blind Decryption},
  booktitle    = {Information Security, First International Workshop, {ISW} '97, Tatsunokuchi,
                  Japan, September 17-19, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1396},
  pages        = {109--115},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0030413},
  doi          = {10.1007/BFB0030413},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Ohta97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OhtaMA95,
  author       = {Kazuo Ohta and
                  Shiho Moriai and
                  Kazumaro Aoki},
  editor       = {Don Coppersmith},
  title        = {Improving the Search Algorithm for the Best Linear Expression},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {157--170},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_13},
  doi          = {10.1007/3-540-44750-4\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OhtaMA95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/OkamotoO94,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Dorothy E. Denning and
                  Raymond Pyle and
                  Ravi Ganesan and
                  Ravi S. Sandhu},
  title        = {How to Simultaneously Exchange Secrets by General Assumptions},
  booktitle    = {{CCS} '94, Proceedings of the 2nd {ACM} Conference on Computer and
                  Communications Security, Fairfax, Virginia, USA, November 2-4, 1994},
  pages        = {184--192},
  publisher    = {{ACM}},
  year         = {1994},
  url          = {https://doi.org/10.1145/191177.191221},
  doi          = {10.1145/191177.191221},
  timestamp    = {Tue, 10 Nov 2020 20:00:24 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/OkamotoO94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OhtaA94,
  author       = {Kazuo Ohta and
                  Kazumaro Aoki},
  editor       = {Yvo Desmedt},
  title        = {Linear Cryptanalysis of the Fast Data Encipherment Algorithm},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {12--16},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_2},
  doi          = {10.1007/3-540-48658-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OhtaA94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OhtaM93,
  author       = {Kazuo Ohta and
                  Mitsuru Matsui},
  editor       = {Douglas R. Stinson},
  title        = {Differential Attack on Message Authentication Codes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '93, 13th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {773},
  pages        = {200--211},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48329-2\_18},
  doi          = {10.1007/3-540-48329-2\_18},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OhtaM93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FujiokaOO92,
  author       = {Atsushi Fujioka and
                  Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {A Practical Secret Voting Scheme for Large Scale Elections},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {244--251},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_66},
  doi          = {10.1007/3-540-57220-1\_66},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FujiokaOO92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OhtaOF92,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto and
                  Atsushi Fujioka},
  editor       = {Rainer A. Rueppel},
  title        = {Secure Bit Commitment Function against Divertibility},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '92, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Balatonf{\"{u}}red,
                  Hungary, May 24-28, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {658},
  pages        = {324--340},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-47555-9\_27},
  doi          = {10.1007/3-540-47555-9\_27},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OhtaOF92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OhtaO91,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {139--148},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_11},
  doi          = {10.1007/3-540-57332-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OhtaO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MoritaOM91,
  author       = {Hikaru Morita and
                  Kazuo Ohta and
                  Shoji Miyaguchi},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {Results of Switching-Closure-Test on {FEAL} (Extended Abstract)},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {247--252},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_20},
  doi          = {10.1007/3-540-57332-1\_20},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MoritaOM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/MoritaOM91,
  author       = {Hikaru Morita and
                  Kazuo Ohta and
                  Shoji Miyaguchi},
  editor       = {Joan Feigenbaum},
  title        = {A Switching Closure Test to Analyze Cryptosystems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {183--193},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_13},
  doi          = {10.1007/3-540-46766-1\_13},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/MoritaOM91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoO91,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Joan Feigenbaum},
  title        = {Universal Electronic Cash},
  booktitle    = {Advances in Cryptology - {CRYPTO} '91, 11th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {576},
  pages        = {324--337},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46766-1\_27},
  doi          = {10.1007/3-540-46766-1\_27},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OkamotoCO91,
  author       = {Tatsuaki Okamoto and
                  David Chaum and
                  Kazuo Ohta},
  editor       = {Donald W. Davies},
  title        = {Direct Zero Knowledge Proofs of Computational Power in Five Rounds},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {96--105},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_8},
  doi          = {10.1007/3-540-46416-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OkamotoCO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FujiokaOO91,
  author       = {Atsushi Fujioka and
                  Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Donald W. Davies},
  title        = {Interactive Bi-Proof Systems and Undeniable Signature Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '91, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Brighton, UK, April 8-11,
                  1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {547},
  pages        = {243--256},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-46416-6\_21},
  doi          = {10.1007/3-540-46416-6\_21},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FujiokaOO91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/KoyamaO90,
  author       = {Kenji Koyama and
                  Kazuo Ohta},
  title        = {Identity-based conference key distribution systems},
  journal      = {Syst. Comput. Jpn.},
  volume       = {21},
  number       = {1},
  pages        = {60--67},
  year         = {1990},
  url          = {https://doi.org/10.1002/scj.4690210106},
  doi          = {10.1002/SCJ.4690210106},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/KoyamaO90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OhtaK90,
  author       = {Kazuo Ohta and
                  Kenji Koyama},
  editor       = {Jennifer Seberry and
                  Josef Pieprzyk},
  title        = {Meet-in-the-Middle Attack on Digital Signature Schemes},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '90, International Conference
                  on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {453},
  pages        = {140--154},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/BFb0030357},
  doi          = {10.1007/BFB0030357},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OhtaK90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoO90,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {How to Utilize the Randomness of Zero-Knowledge Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {456--475},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_33},
  doi          = {10.1007/3-540-38424-3\_33},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoO90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MiyaguchiOI90,
  author       = {Shoji Miyaguchi and
                  Kazuo Ohta and
                  Masahiko Iwata},
  editor       = {Ivan Damg{\aa}rd},
  title        = {Confirmation that Some Hash Functions Are Not Collision Free},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {326--343},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_30},
  doi          = {10.1007/3-540-46877-3\_30},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MiyaguchiOI90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OhtaOK90,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto and
                  Kenji Koyama},
  editor       = {Ivan Damg{\aa}rd},
  title        = {Membership Authentication for Hierarchical Multigroups Using the Extended
                  Fiat-Shamir Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {446--457},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_40},
  doi          = {10.1007/3-540-46877-3\_40},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OhtaOK90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkamotoO89,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Gilles Brassard},
  title        = {Disposable Zero-Knowledge Authentications and Their Applications to
                  Untraceable Electronic Cash},
  booktitle    = {Advances in Cryptology - {CRYPTO} '89, 9th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {435},
  pages        = {481--496},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/0-387-34805-0\_43},
  doi          = {10.1007/0-387-34805-0\_43},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkamotoO89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OkamotoO89,
  author       = {Tatsuaki Okamoto and
                  Kazuo Ohta},
  editor       = {Jean{-}Jacques Quisquater and
                  Joos Vandewalle},
  title        = {Divertible Zero Knowledge Interactive Proofs and Commutative Random
                  Self-Reducibility},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '89, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Houthalen, Belgium, April
                  10-13, 1989, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {434},
  pages        = {134--148},
  publisher    = {Springer},
  year         = {1989},
  url          = {https://doi.org/10.1007/3-540-46885-4\_16},
  doi          = {10.1007/3-540-46885-4\_16},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OkamotoO89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OhtaO88,
  author       = {Kazuo Ohta and
                  Tatsuaki Okamoto},
  editor       = {Shafi Goldwasser},
  title        = {A Modification of the Fiat-Shamir Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} '88, 8th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {403},
  pages        = {232--243},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/0-387-34799-2\_17},
  doi          = {10.1007/0-387-34799-2\_17},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OhtaO88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KoyamaO88,
  author       = {Kenji Koyama and
                  Kazuo Ohta},
  editor       = {Christoph G. G{\"{u}}nther},
  title        = {Security of Improved Identity-Based Conference Key Distribution Systems},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '88, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Davos, Switzerland, May
                  25-27, 1988, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {330},
  pages        = {11--19},
  publisher    = {Springer},
  year         = {1988},
  url          = {https://doi.org/10.1007/3-540-45961-8\_2},
  doi          = {10.1007/3-540-45961-8\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KoyamaO88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KoyamaO87,
  author       = {Kenji Koyama and
                  Kazuo Ohta},
  editor       = {Carl Pomerance},
  title        = {Identity-based Conference Key Distribution Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '87, {A} Conference on the Theory
                  and Applications of Cryptographic Techniques, Santa Barbara, California,
                  USA, August 16-20, 1987, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {293},
  pages        = {175--184},
  publisher    = {Springer},
  year         = {1987},
  url          = {https://doi.org/10.1007/3-540-48184-2\_13},
  doi          = {10.1007/3-540-48184-2\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KoyamaO87.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics