論文
公開件数:234件
No. 種別 査読の有無 標題 単著・共著区分 著者 誌名 巻号頁 出版日 ISSN DOI URL
1 一般論文

Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography.

Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata:
IEEE Trans. Information Theory
64/ 1, 654-685
2018



2 一般論文

Constructions of Dynamic and Non-dynamic Threshold Public-key Encryption Schemes with Decryption Consistency

Yusuke Sakai, Keita Emura, Jacob Schuldt, Goichiro Hanaoka, Kazuo Ohta
Theoretical Computer Science
630/ 5, 95-116
2016
0304-3975


3 一般論文

A Limitation on Security Evaluation of Cryptographic Primitives with Fixed Keys
共著
Yutaka Kawai(Mitsubishi Electric),
Goichiro Hanaoka(National Institute of Advanced Industrial Science and Technology,
Kazuo Ohta(The University of Electro-Communications)
Noboru Kunihiro(The University of Tokyo)
Security and Communication Networks
9/ 12, 1663-1675
2016
1939-0122


4 一般論文

A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs
共著
D. Yamamoto, K. Sakiyama, M. Iwamoto , K. Ohta, M. Takenaka, K. Itoh, and N. Torii,
J. Cryptographic Engineering
5/ 3, 187-199
2015



5 一般論文

“A Silicon-level Countermeasure against Fault Sensitivity
Analysis and Its Evaluation,”

Sho Endo, Yang Li, Naofumi Homma, Kazuo Sakiyama, Kazuo Ohta, Daisuke
Fujimoto, Makoto Nagata, Toshihiro Katashita, Jean-Luc Danger, and
Takafumi Aoki,
IEEE Trans. Very Large Scale Integr.
(VLSI) Syst.,
23/ 8, 1429-1438
2015



6 一般論文

“クロック間衝突を漏洩モデルとする新たなサイドチャネル解析と並列実装AES暗号ハードウェアにおける弱い鍵,”
共著
中曽根俊貴, 李陽, 岩本貢, 太田和夫, 﨑山一男,
電子情報通信学会論文誌(A),
J97-A/ 11, 695-703
2014



7 一般論文

“Practical
improvements of side-channel attacks on AES: feedback from the 2nd DPA
contest, ”

Christophe Clavier, Jean-Luc Danger, Guillaume Duc, M. Abdelaziz
Elaabid, Benoît Gérard, Sylvain Guilley, Annelie Heuser, Michael Kasper,
Yang Li, Victor Lomné, Daisuke Nakatsu, Kazuo Ohta, Kazuo Sakiyama,
Laurent Sauvage, Werner Schindler, Marc Stöttinger, Nicolas
Veyrat-Charvillon, Matthieu Walle, Antoine Wurcker,
J. Cryptographic Engineering,
4/ 1, 1-16
2014/04



8 一般論文

“Practical DFA Strategy for AES Under Limited-Access Conditions,”

Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu
Iwamoto, Naofumi Homma, Takafumi Aoki, and Kazuo Ohta,
Journal of Information Processing,
22/ 2, 142-151
2014/02



9 一般論文

“Variety Enhancement of PUF Responses Using
the Locations of Random Outputting RS Latches,”

Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko
Takenaka, and Kouichi Itoh,
J. Cryptographic Engineering,
3/ 4, 197-211
2013/11



10 一般論文

A New Type of Fault-Based Attack: Fault Behavior Analysis,

Yang Li, Kazuo Ohta, and Kazuo Sakiyama
IEICE Trans. Fundam. Electron. Commun Comput. Sci.
A96-A/ 1, 177-184
2013/01



11 一般論文

Ciphertext-Policy Delegatable Hidden
Vector Encryption and Its Application

Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi
Mori, Yusuke Sakai, Kazuo Ohta
IEICE Transactions on
Fundamentals of Electronics, Communications and Computer Sciences
E96-A(1), 53-67
2013/01



12 一般論文

複数の要因に対する新たな故障感度解析

小池彩歌, 李陽, 中津大介, 太田和夫, 崎山一男
電子情報通信学会論文誌(A)
J95-A,/ 10, 751-755
2012/10



13 一般論文

Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates

Miroslav Knežević, Kazuyuki Kobayashi, Jun Ikegami, Shin'ichiro Matsuo, Akashi Satoh, Ünal Kocabaş, Junfeng Fan, Toshihiro Katashita, Takeshi Sugawara, Kazuo Sakiyama, Ingrid Verbauwhede, Kazuo Ohta, Naofumi Homma, and Takafumi Aoki
IEEE Transactions
20/ 5, 827-840
2012/05



14 一般論文

New Fault-based Side-Channel Attack using Fault Sensitivity

Yang Li, Kazuo Ohta, and Kazuo Sakiyama
IEEE Transactions on Information Forensics and Security
7/ 1, 88-97
2012/02



15 一般論文

Information-Theoretic Approach to Optimal Differential Fault Analysis

Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, and Kazuo Ohta
IEEE Transactions on Information Forensics and Security
7/ 1, 109-120
2012/02



16 一般論文

Toward Effective Countermeasures Against An Improved Fault Sensitivity Analysis

Yang Li, Kazuo Ohta, and Kazuo Sakiyama
IEICE Transactions on Fundamentals of Electronics,Communications and Computer Science
A95-A/ 1, 234-241
2012/01



17 一般論文

Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128

Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Sakiyama, Kazuo Ohta
IEICE Transactions on Fundamentals of Electoronics
A95-A/ 1, 100-110
2012/01



18 一般論文

Proxiable Designated Verifier Signature
共著
Mebae Ushida, Yutaka Kawai, Kazuki Yoneyama, Kazuo Ohta
Journal of Information Processing
19, 430-440
2011



19 一般論文

How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model

Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E94-A/ 6, 1293-1305
2011/06



20 一般論文

Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments

Kazuki Yoneyama,Masayuki Terada,Sadayuki Hongo,and Kazuo Ohta
IEICE Trans. Fandmentals
E94-A/ 6, 1263-1273
2011/01



21 一般論文

Security of Cryptosystems Using Merkle-Damgard in the Random in the Random Oracle Model

Yusuke Naito,kazuki Yoneyama,Lei Wang, and Kazuo Ohta
IEICE Trans. Fundamentals of Electronics,Communications and Computer Sciences
E94-A/ 1, 57-70
2011/01



22 一般論文

An Efficient Authentication for Lightweight Devices by Perfectiong Zero-Knwoledgeness

Bagus Santoso,Kazuo Ohta,Kazuo Sakiyama, and Goichiro Hanaoka
IEICE Trans. Fundamentals
E94-A/ 1, 92-103
2011/01



23 一般論文

Power Analysis against a DPA-resistant S-box Implementation Based on the Fourier Transform

Yang Li,Kazuo Sakiyama,Shinichi Kawamura,and Kazuo Ohta
IEICE Trans. Fundamentals
E94-A/ 1, 191-199
2011/01



24 一般論文

Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition

Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta
IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences
E93-A/ 6, 1122-1131
2010/06



25 一般論文

Cryptanalysis of Two MD5-Based Authentication Protocols:APOP and NMAC

Lei Wang,Kazuo Ohta,Yu Sasaki,Kazuo Sakiyama, and Noboru Kunihiro
IEICE Trans. Information and Systems
E93-D/ 5, 1087-1095
2010/05



26 一般論文

Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols

Yu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki, and Noboru Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E93-A/ 1, 84-92
2010/01



27 一般論文

On Clock-based Fault Analysis Attack for an AES Hardware Using RSL

Kazuo Sakiyama and Kazuo Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E-93-A/ 1, 172-179
2010/01



28 一般論文

Extended Password Recovery Attacks against APOP, SIP, and Digest Authenticaiton

Yu Sasaki, Lei Wang, Kazuo Ohta and Noboru Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E92-A/ 1, 96-104
2009



29 一般論文

Leaky Random Oracle

Kazuki Yoneyama,Satoshi Miyagawa and Kazuo Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and Vomputer Sciences
E92-A/ 8, 1795-1807
2009/08



30 一般論文

Near-Collision Attacks on MD4: Applied to MD4-Based Protocols

Lei Wang, Kazuo Ohta and Noboru Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E92-A/ 1, 76-86
2009/01



31 一般論文

A New 'On the Fly' Identification Scheme: A Trade-off of Asymptoticity between ZK and Correctness,

Bagus Santoso and Kazuo Ohta
IEICE TRANSACTIONS
E92-A/ 1, 122-136
2009/01



32 一般論文

Attribute-Based Encryption with Partially Hidden Ciphertext Policies

Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta
IEICE Trans. on Fundamentals
E92.A/ 1, 22-32
2009/01



33 一般論文

Task-Structured PIOAフレームワークを用いた適応的攻撃者に対するDiffie-Hellman鍵交換の安全性解析

米山 一樹, 國分 雄一, 太田 和夫,
情報通信学会論文誌D分冊
J91-D/ 4, 859-872
2008/04



34 一般論文

Factorization of Square-Free Integers with High Bits Known

Bagus Santoso,Noboru Kunihiro,Naoki Kanayama and Kazuo Ohta
IEICE Transactions
E91-A/ 1, 306-315
2008/01



35 一般論文

New Message Differences for Collision Attacks on MD4 and MD5

Yu Sasaki,Lei Wang,Noboru Kunihiro, and Kazuo Ohta
IEICE Transactions
E91-A/ 1, 55-63
2008/01



36 一般論文

Improved Collision Search for Hash Functions:New Advanced Message Modification

Yusuke Naito,Kazuo Ohta, and Noboru Kunihiro
IEICE Transactions
E91-A/ 1, 46-54
2008/01



37 一般論文

Provably Secure Multisignatures in Formal Security Model and Their Optimality

Yuichi Komano,Kazuo Ohta,Atsushi Shimbo,and Shinichi Kawamura
IEICE Transactions
E91-A/ 1, 107-118
2008/01



38 一般論文

Universally Composable Client-to-Client General Authenticated Key Exchange

Haruki Ota, Kazuki Yoneyama, Shinsaku Kiyomoto, Toshiaki Tanaka and Kazuo Ohta
情報処理学会論文誌
48/ 9, 3073-3088
2007



39 一般論文

Ring Signatures: Universally Composable Definitions and Constructions

Kazuki Yoneyama and Kazuo Ohta
情報処理学会論文誌
48/ 9, 2976-2989
2007



40 一般論文

The Quantum Fourier Transform on a Linear Nearest Neighbor Architechture

Yasuhiro Takahashi, Noboru Kunihiro, and Kazuo Ohta
Quantum Information and Computation
7/ 4, 383-391
2007



41 一般論文

Constant-Round Multipary Computation for Interva Test,Equality Test,and Comparison

Takashi Nishide and Kazuo Ohta
IEICE Transactions
E90-A/ 5, 960-968
2007/05



42 一般論文

Provably Secure Untraceable Electronic Cash against Insider Attacks

Yoshikazu Hanatani,Yuichi Komano,Kazuo Ohta and Noboru Kunihiro
IEICE Transactions
E90-A/ 5, 980-991
2007/05



43 一般論文

Unversally Composable Hierarchical Hybrid Authenticated Key Excange

Haruki Ota,Kazuki Yoneyama,Shinsaku Kiyomoto,Toshiaki Tanaka and Kazuo Ohta
IEICE Transactions
E90-A/1, 139-151
2007/01



44 一般論文

Toward the Fair Anonymous Signatures:Deniable Ring Signatures

Yuichi Komano,Kazuo Ohta,Atsushi Shimbo, and Shinichi Kawamura
IEICE Transactions
E90-A/1, 55-64
2007/01



45 一般論文

Improved Collision Attacks on MD4 and MD5

Yu Sasaki,Yusuke Naito, Noboru Kunihiro and Kazuo Ohta
IEICE Transactons
E90-A/1, 36-47
2007/01



46 一般論文

双線形写像を用いた墨塗り署名方式の安全性について

伊豆 哲也,國廣 昇,太田 和夫,武仲 正彦
情報処理学会論文誌
47/ 8, 2409-2415
2006/08



47 一般論文

Maurer-Yacobi ID-Based Key Distribution Revisited

Noboru Kunihiro,Wataru Abe and kazuo Ohta
IEICE Transactions
E89-A/ 5, 1421-1424
2006/05



48 一般論文

Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares

Mitsugu Iwamoto,Lei Wang,Kazuki Yoneyama,Noboru Kunihiro and Kazuo Ohta
IEICE Transactons
E89-A/ 5, 1382-1395
2006/05



49 一般論文

Taxonomical Security Consideration of OAEP Variants

Yuichi Komano and Kazuo Ohta
IEICE Transactions
E89-A/ 5, 1233-1245
2006/05



50 一般論文

Bulk量子計算モデル上におけるGroverのアルゴリズムの繰り返し回数について

大久保 誠也,西野 哲朗,太田 和夫,國廣 昇
情報処理学会論文誌:数理モデル化と応用
46/ SIG17(TOM13), 10-19
2005



51 一般論文

物理的実現可能性に優れたNMR量子探索アルゴリズム

大久保 誠也,西野 哲朗,太田 和夫,國廣 昇
情報処理学会論文誌
46/ 6, 1416-1425
2005/06



52 一般論文

Solutions to Security Problems of Rivest and Shamir's Pay Word Scheme

Norio Adachi,Satoshi Aoki, Yuichi Komano, Kazuo Ohta
IEICE Transactions
E88-A/ 1, 195-202
2005/01



53 一般論文

Probabilistic Multi-Signature Schemes using a One-Way Trapdoor Permutation

K. Kawauchi, Y. Komano, K. Ohta and M. Tada
IEICE Transactions on Fundamentals
E87-A/ 5
2004/05



54 一般論文

OAEP-ES ―Methodology of Universal Padding―

Yuichi Komano,Kazuo Ohta
IEICE TRANSACTIONS
87/ 1, 110-119
2004/01



55 一般論文

A Quantum Algorithm using NMR Computers to Break Secret-key Cryptosystems

Kazuo Ohta,Tetsuro Nishino, Seiya Okubo,Noboru Kunihiro
NEW GENERATION COMPUTING
21/ 4, 347-361
2003/08



56 一般論文

SPN構造における線形変換層の一設計法

Kanda, M., Moriai, S., Aoki, K., Ueda, H., Takashima, Y., underline{Ohta,K.}, and Matsumoto, T.
情報処理, 21世紀のコンピュータセキュリティ技術特集号,
42/ 8, 2087--2097-
2001/08



57 一般論文

Cryptographic Works of Dr.Kenji Koyama:In Memoria

Noboru KUNIHIRO, Kazuo OHTA, Tatsuaki OKAMOTO, Routo TERADA, Yukio TSURUOKA
IEICE TRABS.FUNDAMENTALS
Vol.E84-A
2001/01



58 一般論文

E2-A New 128-Bit Block Cipher

Kanda, M., Moriai, S., Aoki, K., Ueda, H., Takashima, Y., \underline{Ohta,K.}, and Matsumoto, T.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, Special Section on Theoretical Foundations of Computing
E83-A/ 1, 48-59
2000/01



59 一般論文

Multi-Signature Schemes Secure against Active Insider Attacks

Ohta,K., and Okamoto,T.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science,Special Section on Cryptography and Information Security
E82-A/ 1, 21-31
1999/01



60 一般論文

Remarks on Transformable Digital Signatures

Ohta,K.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science,Special Section on Discrete Mathematics and Its Applications
E81-A/ 5, 814-817
1998/05



61 一般論文

Collision Search of a Hash Function by Using Random Mapping

Morita,H., Odagi,H., and Ohta,K.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science,Special Section on Cryptography and Information Security
E81-A/ 1, 35-40
1998/01



62 一般論文

Linear Cryptanalysis of FEAL

Aoki,K., Ohta,K., Moriai,S., and Matsui,M.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science,Special Section on Cryptography and Information Security
E81-A/ 1, 88-97
1998/01



63 一般論文

One-time Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash

Okamoto,T., and Ohta,K.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science,Special Section on Cryptography and Information Security
E81-A/ 1, 2-10
1998/01



64 一般論文

Security of the Extended Fiat-Shamir Scheme

Ohta,K.,Okamoto,T
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science Special Section on Cryptography and Information Security
E81-A/ 1, 65-71
1998/01



65 一般論文

Key-Dependency of Linear Probability of RC5
共著
Moriai,S., Aoki,K., and Ohta,K.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E780-A/ No.1, 9-18
1997/01



66 一般論文

Strict Evaluation of the Maximum Average of Differential Probability and the Maximum Average of Linear Probability
共著
Aoki,K., and Ohta,K.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E780-A/ No.1, 2-8
1997/01



67 一般論文

Differential-Linear Cryptanalysis of FEAL-8
共著
Aoki,K., and Ohta,K.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E79-A/ No.1, 20-27
1996/01



68 一般論文

The Best Linear Expression Search of FEAL
共著
Moriai,S., Aoki,K., and Ohta,K.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E79-A/ No.1, 2-11
1996/01



69 一般論文

New Proposal and Comparison of Closure Tests ---
More EÆcient than the CRYPTO'92 Test for DES --
共著
Morita, H., and Ohta,K.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E77-A/ No.1, 15-19
1994/01



70 一般論文

Message Authentication Codes and Differential Attacks

Ohta,K., and Matsui,M
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
E77-A/ No,1, 8-14
1994/01



71 一般論文

理想的電子現金方式の一方法
共著
岡本 龍明,太田 和夫
電子情報通信学会論文誌D-1
J76-DI/ No.6, 315-323
1993/06



72 一般論文

A Switching Closure Test to Analyze Cryptosystems
共著
Morita, H., and Ohta,K.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E75-A/ No.4, 498-503
1992/04



73 一般論文

Interactive Bi-Proof Systems and Undeniable Signature Schemes
共著
Fujioka,A., Okamoto,T., and Ohta,K.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E75-D/ No.1, 102-109
1992/01



74 一般論文

Abuses of Undeniable Signatures and Their Countermeasures
共著
Ohta,K., Okamoto,T. Fujioka,A.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E74/ No.8, 2109-2113
1991/08



75 一般論文

The Construction of Collision Messages for Hash Functions
共著
Iwata,M., Ohta,K., Miyaguchi,S.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E73/ No.7, 1100-1106
1990/07



76 一般論文

Membership Authentication for Hierarchical Multi groups Using a Master Secret Key

Ohta,K.,Okamoto,T
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
E73/ No.7, 1107-1110
1990/07



77 一般論文

RSA暗号系を利用した個人識別情報に基づく認証方式
単著
太田 和夫
電子情報通信学会論文誌D-1
J72-D-1/ No.8, 612-620
1989/08



78 一般論文

個人識別情報に基づき2者以上で共通鍵を生成する方式
共著
小山 謙二,太田 和夫
電子情報通信学会論文誌D-1
J72-D-1/ No.1, 50-56
1989/01



79 一般論文

Practical Extension of Fiat-Shamir Scheme

Kazuo Ohta, Tatsuaki Okamoto
Electronics Letters
24/ 15, 955-956
1988/07/21



80 一般論文

Efficient Identification and Signature Scheme

Kazuo Ohta
Electronics Letters
24/ 2, 115-116
1988/01/24



81 一般論文

暗号通信における3階層複合形鍵配送方式
共著
小林 哲二,太田 和夫
電子情報通信学会論文誌D
J70-D/ No.12, 2722-2729
1987/12



82 一般論文

公開マスタ鍵を用いた安全かつ効率のよい同報暗号方式

太田 和夫
電子情報通信学会論文誌D
J70-D/ No.8, 1616-1624
1987/08



83 一般論文

混合型ディジタル署名に対する中間一致攻撃
共著
太田 和夫,小山 謙二
電子情報通信学会論文誌D
J70-D/ No.2, 415-422
1987/02



84 国際会議プロシーディングス等

Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations
共著
Takeshi Nakai, Satoshi Shirouchi, Mitsugu Iwamoto, Kazuo Ohta
Information Theoretic Security - 10th International Conference, ICITS 2017
LNCS 10681/ Springer-Verlag, 153-165
2017/11/29



85 国際会議プロシーディングス等

Efficient Card-based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations
共著
Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta
Cryptology and Network Security - 15th International Conference, CANS 2016
LNCS 10052/ Springer-Verlag, 500-517
2016/11/14



86 国際会議プロシーディングス等

Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption
共著
Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto:
Cryptology and Network Security - 15th International Conference, CANS 2016
LNCS 10052/ Springer-Verlag, 350-364
2016/11/14



87 国際会議プロシーディングス等

Application of Joux-Lucks Search Algorithm for
Multi-Collisions to MicroMint
共著
Y. Kamoshida, M. Iwamoto, and K. Ohta
Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016
poster session
2016/09/12



88 国際会議プロシーディングス等

Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes
共著
Takato Hirano, Mitsuhiro Hattori, Yutaka Kawai, Nori Matsuda, Mitsugu Iwamoto, Kazuo Ohta, Yusuke Sakai, Tatsuji Munaka
Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016
LNCS 9836/ Springer-Verlag, 91-110
2016/09/12



89 国際会議プロシーディングス等

Yet Another Fault-Based Leakage in Non-uniform Faulty Ciphertexts

Yang Li, Yu-ichi Hayashi, Arisa Matsubara, Naofumi Homma, Takafumi Aoki, Kazuo Ohta, Kazuo Sakiyama
Foundations and Practice of Security - 6th International Symposium, FPS 2013
LNCS 8352, 272-287
2014



90 国際会議プロシーディングス等

“A New Model of Client–Server Communications
under Information Theoretic Security,”

M. Iwamoto, T. Omino, Y. Komano, and K. Ohta,
IEEE Information Theory Workshop (ITW2014)
512-516
2014/11/05



91 国際会議プロシーディングス等

“Cheating on a Visual Secret Sharing Scheme under a Realistic
Scenario,”

P. Lumyong, M. Iwamoto, and K. Ohta,
International Symposium on Information Theory and Its Applications (ISITA2014)
546-550
2014/10/29



92 国際会議プロシーディングス等

Improved Indifferentiable Security Analysis of PHOTON

Yusuke Naito, Kazuo Ohta
Security and Cryptography for Networks - 9th International Conference (SCN 2014),
LNCS Springer-Verlag/ 8642, 340-357
2014/09/03



93 国際会議プロシーディングス等

Privacy-preserving smart metering with verifiability for both billing and energy management.
共著
Kazuma Ohara, Yusuke Sakai, Fumiaki Yoshida, Mitsugu Iwamoto, Kazuo Ohta:
ASIAPKC'14, Proceedings of the 2nd ACM Wookshop on ASIA Public-Key Cryptography, June 3, 2014, Kyoto, Japan.
23-32
2014/06
978-1-4503-2801-2


94 国際会議プロシーディングス等

Reset Indifferentiability from Weakened Random Oracle Salvages One-pass Hash Functions

Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
International Conference on Applied Cryptography and Network Security (ACNS 2014),
LNCS Springer-Verlag/ 8479, 235-252
2014/06/10



95 国際会議プロシーディングス等

Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum

Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama
Annual International Conference on the Theory and Applications of Cryptology (Africacrypt 2014),
LNCS Springer-Verlag/ 8469, 285-299
2014/05/28



96 国際会議プロシーディングス等

An Automated Evaluation Tool for Improved Rebound Attack: New ShiftBytes Parameters for Grøstl

Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto and Kazuo Ohta

Yusuke Naito, Kazuki Yoneyama, Kazuo Ohta
Proc. of CT-RSA2014
LNCS Springer-Verlag/ 8366, 424-443
2014/02



97 国際会議プロシーディングス等

“Privacy-Mode
Switching: Toward Flexible Privacy Protection for RFID Tags in Internet of Things,”

Yang Li, Toshiki Nakasone, Kazuo Ohta, Kazuo Sakiyama,
In Proc. The 11th Annual IEEE Consumer Communications &
Networking Conference (CCNC’14),
xx-yy
2014/01



98 国際会議プロシーディングス等

“Exploration
of the CC-EMA Attack Towards Efficient Evaluation of EM Information
Leakage,”

Toshiki Nakasone, Kazuo Sakiyama, Yang Li, and Kazuo Ohta,
In Proc. International Symposium on Electromagnetic
Compatibility (EMC EUROPE) 2013,
411-414
2013/09



99 国際会議プロシーディングス等

Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL

Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama and Kazuo Ohta
SECRYPT2013, Proceedings of the 10th International Conference on Security and Cryptography,
111-122
2013/07



100 国際会議プロシーディングス等

“Exploring the Relations Between Fault Sensitivity and Power Consumption

Yang Li, Sho Endo, Nicolas Debande, Naofumi Homma, Takafumi Aoki,
Thanh-Ha Le, Jean-Luc Danger, Kazuo Ohta, Kazuo Sakiyama
COSADE’13
LNCS7864/ Springer-Verlag, 137-153
2013/03



101 国際会議プロシーディングス等

An Extension of Fault Sensitivity Analysis Based on Clockwise Collision

Yang Li, Kazuo Ohta, and Kazuo Sakiyama
International Conferences on Information Security and Cryptology 2012 (Inscript’12),
Springer-Verlag, in press-
2012/11



102 国際会議プロシーディングス等

Key-Dependent Weakness of AES-Based Ciphers Under
Clockwise Collision Distinguisher

Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama
International Conference on Information Security and Cryptology 2012 (ICISC’12)
LNCS 7839/ Springer-Verlag, 395–409-
2012/11



103 国際会議プロシーディングス等

Boomerang Distinguishers for Full HAS-160 Compression Function

Yu Sasaki, Lei Wang, Yasuhiro Takasaki, Kazuo Sakiyama, and Kazuo Ohta
International Workshop on Security (IWSEC)
LNCS 7631/ Springer-Verlag, 156-169
2012/11



104 国際会議プロシーディングス等

Three-Subset Meet-in-the-Middle Attack on Reduced XTEA

Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama, Kazuo Ohta
International Conference on Cryptology In Africa (Africacrypt'12)
LNCS 7374/ Springer-Verlag, 138-154
2012/07



105 国際会議プロシーディングス等

On the Security of Dynamic Group Signatures: Preventing Signature Hijacking

Yusuke Sakai, Jacob C. N. Schuldt, Keita Emura, Goichiro Hanaoka, Kazuo
Ohta
PKC 2012
LNCS 7293/ Springer-Verlag, 715-732
2012/05



106 国際会議プロシーディングス等

New Truncated Differential Cryptanalysis on 3D Block Cipher

Takuma Koyama, Lei Wang, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta
International Conference on Information Security Practice and Experience (ISPEC'12)
LNCS 7232/ Springer-Verlag, 109-125
2012/04



107 国際会議プロシーディングス等

Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting

Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai, Kazuo Ohta
IMA International Conference (IMACC 2011)
LNCS 7089/ Springer, 190-209
2011/12



108 国際会議プロシーディングス等

Intentional Electromagnetic Interference for Fault Analysis on AES Block Cipher IC

Yu-ichi Hayashi, Shigeto Gomisawa, Yang Li, Naofumi Homma, Kazuo Sakiyama, Takafumi Aoki, and Kazuo Ohta
International Workshop on Electromagnetic Compatibility of Integrated Circuits (EMCCOMPO’11)
235-240
2011/11



109 国際会議プロシーディングス等

Experimental Verification of Super-Sbox Analysis ― Confirmation of Detailed Attack Complexity

Yu Sasaki, Naoyuki Takayanagi, Kazuo Sakiyama, and Kazuo Ohta
International Workshop on Security 2011 (IWSEC’11)
LNCS 7038/ Springer-Verlag, 178-192
2011/11



110 国際会議プロシーディングス等

Security of Practical Cryptosystems Using Merkle-Damng{/aa}rd Hash Function in the Ideal Cipher Model

Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta
ProvSec2011
281-296
2011/10



111 国際会議プロシーディングス等

Fault Sensitivity Analysis Against Elliptic Curve Cryptosystems

Hikaru Sakamoto, Yang Li, Kazuo Ohta, and Kazuo Sakiyama,
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC’11)
LNCS VVVV/ Springer-Verlag, 11-20
2011/09



112 国際会議プロシーディングス等

On the Power of Fault Sensitivity Analysis and Collision Side-Channel Attack in a Combined Setting

Amir Moradi, Oliver Mischke, Christof Paar, Yang Li, Kazuo Ohta, Kazuo Sakiyama,
Cryptographic Hardware and Embedded Systems (CHES’11),
LNCS 6917,/ Springer-Verlag, 292-311
2011/09



113 国際会議プロシーディングス等

First Experimental Results of Correlation-Enhanced EMA Collision Attack

Toshiki Nakasone, Daisuke Nakatsu, Yang Li, Kazuo Ohta, Kazuo Sakiyama
Poster Session, CHES2011
LNCS 6917/ Springer-Verlag, XXX-
2011/09



114 国際会議プロシーディングス等

Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches

Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, Kouichi Itoh
Cryptographic Hardware and Embedded Systems (CHES’11)
LNCS 6917,/ Springer-Verlag, 390-406
2011/09



115 国際会議プロシーディングス等

Security Notions for Information Theoretically Secure Encryptions

M. Iwamoto and K. Ohta
IEEE-ISIT
1743-1747
2011/08



116 国際会議プロシーディングス等

Variations of Information Theoretic Security Notions

M. Iwamoto and K. Ohta
7-th Asia-Europe Workshop on Information Theory
73-76
2011/07



117 国際会議プロシーディングス等

Revisit Fault Sensitivity Analysis on WDDL-AES

Yang Li, Kazuo Ohta, Kazuo Sakiyama
International Symposium on Hardware-Oriented Security and Trust (HOST’11)
148-153
2011/06



118 国際会議プロシーディングス等

Preimage Attacks on 5-Pass HAVAL Reduced to 158-Steps and One-Block 3-Pass HAVAL

Yasuhide Sakai, Yu Sasaki, Lei Wang, Kazuo Ohta, and Kazuo Sakiyama
Industrial Track Session, ACNS2011
14 pages-
2011/06



119 国際会議プロシーディングス等

Revisit Fault Sensitivity Analysis on WDDL-AES

Li Yang, Kazuo Ohta, and Kazuo Sakiyama
International Symposium on Hardware-Oriented Security and Trust (HOST'11)
6pages-
2011/06



120 国際会議プロシーディングス等

(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach

Lei Wang, Yu Sasaki, Wataru Komatsubara, Kazuo Ohta, and Kazuo Sakiyama
RSA Conference 2011, Cryptographer's Track (CT-RSA'11)
LNCS 6558/ Springer-Verlag, 197-212
2011/03



121 国際会議プロシーディングス等

A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication

Yoshikazu Hanatani, Miyako Ohkubo, Shin'ichiro Matsuo, Kazuo Sakiyama, Kazuo Ohta
Real-Life Cryptographic Protocols and Standarization (RLCPS'11)
LNCS/ Springer-Verlag, X-
2011/02



122 国際会議プロシーディングス等

New Approach of Super-Sbox Analysis on AES-Based Permutations: Applications to ECHO and Grøstl

Yu Sasaki, Li Yang, Lei Wang, Kazuo Sakiyama, and Kazuo Ohta
Advances in Cryptology -- ASIACRYPT'10
LNCS 6477/ Springer-Verlag, 38-55
2010/12



123 国際会議プロシーディングス等

Rigorous Security Requirements for Designated Verifier Signatures
共著
Kazuki Yoneyama, Mebae Ushida, Kazuo Ohta
Inscrypt 2010
LNCS 6584, 318-335
2010/10/20



124 国際会議プロシーディングス等

Fault Sensitive Analysis

Li Yang, Kazuo Sakiyama, Shigeto Gomisawa, Toshinori Fukunaga, Junko Takahashi, and Kazuo Ohta
Cryptographic Hardware and Embedded Systems (CHES'10)
LNCS 6225, 320-334
2010/08



125 国際会議プロシーディングス等

Combination of SW Countermeasure and CPU Modification on FPGA Against Power Analysis

Daisuke Nakatsu, Li Yang, Kazuo Sakiyama, and Kazuo Ohta
International Workshop on Information Security Applications (WISA'10)
LNCS/ 6513, 258-272
2010/08



126 国際会議プロシーディングス等

Proxiable Designated Verifier Signature. SECRYPT 2010: 344-353
共著
Mebae Ushida, Kazuo Ohta, Yutaka Kawai, Kazuki Yoneyama
SECRYPT 2010
344-353
2010/07/26
978-989-8425-18-8


127 国際会議プロシーディングス等

Prototyping Platform for Performance Evaluation of SHA-3 Candidates

Kazuyuki Kobayashi, Jun Ikegami, Miroslav Knežević, Eric Xu Guo, Shin'ichiro Matsuo, Sinan Huan, Leyla Nazhandali, Ünal Kocabaş, Junfeng Fan, Akashi Satoh, Patrick Schaumont, Ingrid Verbauwhede, Kazuo Sakiyama and Kazuo Ohta
International Symposium on Hardware-Oriented Security and Trust (HOST'10)
60-63
2010/06



128 国際会議プロシーディングス等

Power Variance Analysis Breaks a Masked ASIC Implementations of AES

Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta
Design, Automation and Test in Europe (DATE'10)
1059-1064
2010/03



129 国際会議プロシーディングス等

Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication

Masami Izumi, Jun Ikegami, Kazuo Sakiyama and Kazuo Ohta
Design, Automation and Test in Europe (DATE'10)
981-984
2010/03



130 国際会議プロシーディングス等

Improving Efficiency of An 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness

Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, and Goichiro Hanaoka
RSA Conference 2010
LNCS 5985, 284-301
2010/03



131 国際会議プロシーディングス等

Power Variance Analysis Breaks a Masked ASIC Implementation of AES

Yang Li, Kazuo Sakiyama, Lejla Batina, Daisuke Nakatsu, and Kazuo Ohta
ACM
1059-1064
2010/03



132 国際会議プロシーディングス等

Improved Countermeasure against Address-bit DPA for ECC Scalar Multiplication

Masami Izumi, Jun Ikegami, Kazuo Sakiyama and Kazuo Ohta
ACM
981-984
2010/03



133 国際会議プロシーディングス等

Improving Efficiency of An 'On the Fly' Identification Scheme by Perfecting Zero-Knowledgenes

Bagus Santoso, Kazuo Ohta, Kazuo Sakiyama, Goichiro Hanaoka
Proc. RSA Conference 2010
LNCS/ 5985, 284-301
2010/03



134 国際会議プロシーディングス等

Multiple Designated Verifiers Signatures Reconsidered

Mebae Ushida, Tetsuya Izu, Masahiko Takenaka, and Kazuo Ohta
Proc. ARES 2010
586-590
2010/02



135 国際会議プロシーディングス等

Security Evaluation of a DPA-resistant S-box Based on the Fourier Transform

Yang Li, Kazuo Sakiyama, Shinichi Kawamura, Yuichi Komano, and Kazuo Ohta
International Conference on Information and Communications Security (ICICS'09)
LNCS 5297, 3-16
2009/12



136 国際会議プロシーディングス等

Bit-free Collision: Application to APOP Attack

Lei Wang, Yu Sasaki, Kazuo Sakiyama, and Kazuo Ohta
International Workshop on Security 2009 (IWSEC'09)
LNCS 5824, 3-14
2009/10



137 国際会議プロシーディングス等

Fault Analysis Attack against an AES Prototype Chip using RSL

Kazuo Sakiyama, Tatsuya Yagi, and Kazuo Ohta
RSA Conference 2009, Cryptographer's Track (CT-RSA'09)
LNCS 5473, 429-443
2009/04



138 国際会議プロシーディングス等

Fault Analysis Attack against an AES Prototype Chip using RSL

Kazuo Sakiyama, Tatsuya Yagi and Kazuo Ohta
Proc.RSA Conference 2009
LNCS/ 5473, 429-443
2009/04



139 国際会議プロシーディングス等

Secret Handshake: Strong Anonymity Definition and Construction,

Yutaka Kawai, Kazuki Yoneyama and Kazuo Ohta
ISPEC 2009
?-
2009/04



140 国際会議プロシーディングス等

A New Approach for Implementing the MPL Method toward Higher SPA Resistance

Masami Izumi, Kazuo Sakiyama, Kazuo Ohta
International Conference on Availability, Reliability and Security (ARES'09)
181-186
2009/03



141 国際会議プロシーディングス等

Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures

Takashi Nishide, Kazuki Yoneyama, and Kazuo Ohta
ACNS2008
LNCS/ 5023, 290-307
2008



142 国際会議プロシーディングス等

Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack

Yu Sasaki, Lei Wang, Kazuo Ohta, and Noboru Kunihiro
CT-RSA2008
4964, 1-18
2008



143 国際会議プロシーディングス等

Does The Montgomery Powering Ladder Method Really Offer SPA Resistance?

Masami Izumi, Kazuo Ohta, and Kazuo Sakiyama
TriSAI 2008
328-333
2008



144 国際会議プロシーディングス等

Leaky Random Oracle

Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta
ProvSec2008
LNCS5324, 226-240
2008/10



145 国際会議プロシーディングス等

Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition under DDH Assumption

Shotaro Tanno, Kazuki Yoneyama, Yutaka Kawai, Noboru Kunihiro, and Kazuo Ohta
TriSAI 2008
181-186
2008/10



146 国際会議プロシーディングス等

Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition

Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, and Kazuo Ohta
WISA2008
?-
2008/09



147 国際会議プロシーディングス等

New Key Recovery Attack on HMAC/NMAC-MD4 and NMAC-MD5

Lei Wang, Kazuo Ohta, and Noboru Kunihiro
Eurocrypt2008
LNCS/ 4965, 27-253
2008/04



148 国際会議プロシーディングス等

A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search

Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
ASIACCS2008
?-
2008/03



149 国際会議プロシーディングス等

Password Recovery Attack on Authentication Protocol MD4(Password||Challenge)

Lei Wang and Kazuo Ohta and Noboru Kunihiro
ASIACCS2008
?-
2008/03



150 国際会議プロシーディングス等

A Sanitizable Signature Scheme with Aggregation

Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka and Takashi Yoshioka
Proc. of ISPEC2007
LNCS4464, 51-64
2007



151 国際会議プロシーディングス等

New Message Difference for MD4

Yu Sasaki,Lei Wang,Kazuo Ohta and Noboru Kunihiro
Proc.of FSE2007
340-359
2007



152 国際会議プロシーディングス等

Secure Cross-Realm Client-to-Client Password-based Key Exchange against Undetectable On-line Dictionary Attacks

Kazuki Yoneyama, Haruki Ota, Kazuo Ohta

LNCS4851, 257-266
2007/12



153 国際会議プロシーディングス等

Modeling Agreement Problems in the Universal Composability Framework

Masayuki Terada, Kazuki Yoneyama, Sadayuki Hongo, Kazuo Ohta
ICICS2007
LNCS 4861, 350-361
2007/12



154 国際会議プロシーディングス等

The Quantum Fourier Transform on a Linear Nearest Neighbor Architecture

Yasuhiro Takahashi, Noboru Kunihiro, and Kazuo Ohta
Proc. of AQIS2007
?-
2007/09



155 国際会議プロシーディングス等

Yet Another Sanitizable Signature from Bilinear Maps

Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka
Proc. of JWIS2007
457-468
2007/08



156 国際会議プロシーディングス等

A Security Analysis on Diffie-Hellman Key Exchange against Adaptive Adversaries using Task-Structured PIOA

Kazuki Yoneyama, Yuichi Kokubun, Kazuo Ohta
FCS-ARSPA2007
131-148
2007/07



157 国際会議プロシーディングス等

A New Strategy for Finding a Differential Path of SHA-1

Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
Proc. of ACISP 2007
LNCS4586, 45-58
2007/07



158 国際会議プロシーディングス等

Multiparty Computation for Interval, Equality, and Comparison without Bit-Decomposition Protocol

Takashi Nishide and Kazuo Ohta
Proc. of PKC2007
LNCS4450, 343-360
2007/04



159 国際会議プロシーディングス等

Ring Signatures : Universally Composable Definitions and Constructions

Kazuki Yoneyama, Kazuo Ohta
ACM Symposium on InformAtion, Computer and Communications Security ASIACCS2007
374-376
2007/03



160 国際会議プロシーディングス等

The quantum Fourier transform on a linear nearest neighbor architecture

Yasuhiro Takahashi, Noboru Kunihiro, Kazuo Ohta
QIP 2007
?-
2007/01



161 国際会議プロシーディングス等

Universally Composable Ring Signature

Kazuki Yoneyama, Yoshikazu Hanatani, Santoso Bagus and Kazuo Ohta
Proc. of IWSEC2006
99-110
2006



162 国際会議プロシーディングス等

Formal Security Model of Multisignatures

Yuichi komano,Kazuo Ohta,Atsushi Shimbo and Shinichi Kawamura
Proc.of ISC2006
LNCS/ 4176, 146-160
2006



163 国際会議プロシーディングス等

Toward the Fair Anonymous Signatures:Deniable Ring Signatures

Yuichi Komano,Kazuo Ohta,Atsushi Shimbo and Shinichi Kawamura
CT-RSA
LNCS/ 3860, 174-191
2006



164 国際会議プロシーディングス等

Problems on the MR Micropayment Schemes

Masahiro Mambo,Moises Rosales Salinas,Kazuo Ohta and Noboru Kunihiro
ASIACCS2006
363-363
2006



165 国際会議プロシーディングス等

Improved Collision Search for SHA-0

Yusuke Naito,Yu Sasaki,Takeshi Shimoyama,Jun Yajima,Noboru Kunihiro and Kazuo Ohta
Proc.of Asiacrypt2006
LNCS/ 4284, 21-36
2006/12



166 国際会議プロシーディングス等

A Practical Authentication Scheme Revisited

Bagus Santoso, Noboru Kunihiro, and Kazuo Ohta
IEEE Mexican Conference on Informatics Security MCIS2006
MCIS2006, 10-
2006/11



167 国際会議プロシーディングス等

Probabilistic Metering Scheme

Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta
IEEE Mexican Conference on Informatics Security MCIS2006
MCIS2006, 23-
2006/11



168 国際会議プロシーディングス等

An efficient quantum circuit for addition in GF(p) and Shor's algorithm

Yasuhiro Takahashi, Noboru Kunihiro, and Kazuo Ohta
Proc. of AQIS2006
109-110
2006/09



169 国際会議プロシーディングス等

An Evaluation of the Sieving Device YASD for 1024-bit Integers (Extended Abstract)

Naoyuki Hirota, Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta
JWIS 2006
535-548
2006/09



170 国際会議プロシーディングス等

Factoring Square-free Composite Integer by solving Multivariate Integer polynomial Equations

Bagus Santos,Noboru kunihiro,Naoki Kanayama and Kazuo Ohta
Proc.ov Vietcrypt2006
LNCS/ 4341, 243-259
2006/09



171 国際会議プロシーディングス等

How to Construct Sufficient Conditions for Hash Functions

Yu Sasaki,Yusuke Naito,Jun Yajima,Takeshi Shimoyama,Noboru Kunihiro and Kazuo Ohta
Proc.of Vietcrypt2006
LNCS/ 4341, 115-130
2006/09



172 国際会議プロシーディングス等

An Evaluation of the Sieving Device YASD for 1024-bit Integers

N. Hirota, T. Izu, N. Kunihiro, and K. Ohta
2nd Workshop for Special-purpose Hardware for Attacking Cryptographic Systems (SHARCS 2006)
145-158
2006/04



173 国際会議プロシーディングス等

Provably secure Electronic Cash based on Blind Multisignature Schemes

Yoshikazu Hanatani,Yuichi Komano,Kazuo Ohta and Noboru Kunihiro
Financial Cryptography 2006
LNCS/ 4107, 198-212
2006/02



174 国際会議プロシーディングス等

Analysis on the Clockwise Transposition Routing for Dedicatede Factoring Devices

Tetsuya Izu,Noboru Kunihiro,Kazuo Ohta and Takeshi Shimoyama
WISA2005
LNCS/ 3786, 232-242
2005



175 国際会議プロシーディングス等

Quantum Algorithms for Solving The Exact Shortest Vector Problem

Naoki Kanayama,Masanari Kida,Noboru Kunihiro,Tetsuro Nishino Kazuo Ohta and Seiya Okubo
EQIS
179-180
2005



176 国際会議プロシーディングス等

On the Security of Probabilistic Multisignature Schemes and Their Optimality

Yuichi Komano,Kazuo Ohta,Atsushi Shimbo and Shinichi Kawamura
Proceedings of MyCrypt2005
LNCS/ 3715, 132-150
2005



177 国際会議プロシーディングス等

Improved Collision Attack on MD4 with Probability Almost 1

Yusuke Naito,Yu Sasaki,Noboru Kunihiro and Kazuo Ohta
ICICS2005
LNCS/ 3935, 129-145
2005/07



178 国際会議プロシーディングス等

A Quantum Algorithm for Finding the Minimum on NMR Quantum Computers

Seiya Okubo, Tetsuro Nishino, Kazuo Ohta, Noboru Kunihiro
ERATO Workshop on Quantum Information Science 2004
?-
2004



179 国際会議プロシーディングス等

Non-linear Function Ramp Scheme

Kazuki Yoneyama, Noboru Kunihiro, Bagus Santoso, Kazuo Ohta
ISITA
ISITA, ?-
2004



180 国際会議プロシーディングス等

Taxonomic Consideration to OAEP Variants and Their Sicurity

Yuichi Komano,Kazuo Ohta
Proc.of ICICS2004
LNCS/ 3269, 105-117
2004



181 国際会議プロシーディングス等

Two Efficient Quantum Search Algorithms on NMR Quantum Computers

Seiya Okubo,Tetsuro Nishino,Kazuo Ohta,Noboru Kunihiro
ERATO Workshop on Quantum Information Science 2003
EQIS2003
2003



182 国際会議プロシーディングス等

Efficient Unversal Padding Techniques for Multiplicative Trapdoor One-way Permutation

Yuichi Komano, Kazuo Ohta
Crypto '03, Lecture Notes in Computer Science, Springer Verlag
LNCS/ 2729, 365-381
2003/08



183 国際会議プロシーディングス等

The Security Problems of Rivest and Shamir's PayWord Scheme

Norio Adachi,Satoshi Aoki,Yuichi Komano,Kazuo Ohta
IEEE International Conference on E-Commerce
20-23
2003/06



184 国際会議プロシーディングス等

Security of RSA Public Key Cryptosystems

Santos Bagus,Kazuo Ohta
Proc. of International Workshop on Modern Science and Technology 2002
1-8
2002/09



185 国際会議プロシーディングス等

The study on quantum algorithm using NMR computers for code breaking of secret key cryptosystems

Kazuo Ohta,Tetsuro Nishino,Seiya Okubo
ERATO Workshop on Quantum Information Science 2002
54-55
2002/09



186 国際会議プロシーディングス等

Accountable-Subgroup Multisignatures

Micali,S., Ohta,K., and Reyzin,L.
CCS'01 (Proceedings of the 8th ACM Conference on Computer and Communication Security)
(ISBN 1-58113-385-5)
245-254
2001/11/06



187 国際会議プロシーディングス等

Another Exhaustive Key Search of Common-Key Cryptosystems

Ohta,K., Nishino,T
ERATO Workshop on Quantum Information Science 2001
pp.35-
2001/08



188 国際会議プロシーディングス等

On strict estimation method of provable security against differential and linear cryptanalysis.

Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta
Information and Communication Security, First International Conference, ICICS'97, Lecture Notes in Computer Science, Springer (ISBN 3-540-63696-X)
1334, 258-268
1998



189 国際会議プロシーディングス等

Remarks on Blind Decryption.

Kazuo Ohta
Information Security, First International Workshop, ISW '97, . Lecture Notes in Computer Science, Springer (ISBN 3-540-64382-6)
1319, 109-115
1998



190 国際会議プロシーディングス等

A Strategy for Constructing Fast Round Functions with Practical Security against Differential and Linear Cryptanalysis

Kanda, M., Takashima, Y., Matsumoto, T., Aoki, K., and Ohta, K.
Selected Areas in Cryptography '98, SAC'98,Lecture Notes in Computer Science
(ISBN 3-540-65894-7)
1556, 264-279
1998



191 国際会議プロシーディングス等

On Concrete Security Treatment of Signatures Derived from Identification
共著
Ohta,K., and Okamoto,T.
Crypto'98, Lecture Notes in Computer Science,Springer Verlag
1462, 354-369
1998



192 国際会議プロシーディングス等

Improving the Search Algorithm for the Best Linear Expression.
共著
Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
CRYPTO '95 Lecture Notes in Computer Science
(ISBN 3-540-60221-6)
No.963, 157-170
1995



193 国際会議プロシーディングス等

Differential Attack on Message Authentication Codes.
共著
Kazuo Ohta, Mitsuru Matsui:
CRYPTO '93 Lecture Notes in Computer Science
(ISBN 3-540-57766-1)
No.773, 200-211
1994



194 国際会議プロシーディングス等

Linear Cryptoanalysis of the Fast Data Encipherment Algorithm

Ohta, K., and Aoki,K
Crypto'94 Lecture Notes in Computer Science
(ISBN 3-540-58333-5)
No.839, 12-16
1994



195 国際会議プロシーディングス等

A Practical Secret Voting Scheme for Large Scale Elections.
共著
Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta
AUSCRYPT '92, Lecture Notes in Computer Science
(ISBN 3-540-57220-1)
No.718, 244-251
1993



196 国際会議プロシーディングス等

Secure Bit Commitment Function against Divertibility.
共著
Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka
EUROCRYPT '92, Lecture Notes in Computer Science
(ISBN 3-540-56413-6)
No.658, 324-340
1993



197 国際会議プロシーディングス等

Results of Switching-Closure-Test on FEAL (Extended Abstract).
共著
Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi
ASIACRYPT '91, Lecture Notes in Computer Science
(ISBN 3-540-57332-1)
No.739, 247-252
1993



198 国際会議プロシーディングス等

A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme.
共著
Kazuo Ohta, Tatsuaki Okamoto
ASIACRYPT '91, Lecture Notes in Computer Science
(ISBN 3-540-57332-1)
No.739, 139-148
1993



199 国際会議プロシーディングス等

A Switching Closure Test to Analyze Cryptosystems.
共著
Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi
Crypt'91, Lecture Notes in Computer Science
(ISBN 3-540-55188-3)
No.576, 183-193
1992



200 国際会議プロシーディングス等

Universal Electronic Cash.
共著
Okamoto,T.,Ohta,K
Crypt'91, Lecture Notes in Computer Science
(ISBN 3-540-55188-3)
No.576, 324-337
1992



201 国際会議プロシーディングス等

Direct Zero Knowledge Proofs of Computational Power in Five Rounds.
共著
Tatsuaki Okamoto, David Chaum, Kazuo Ohta
EUROCRYPT '91, Lecture Notes in Computer Science
(ISBN 3-540-54620-0)
No.547, 96-105
1991



202 国際会議プロシーディングス等

Interactive Bi-Proof Systems and Undeniable Signature Schemes.
共著
Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta
EUROCRYPT '91, Lecture Notes in Computer Science
(ISBN 3-540-54620-0)
No.547, 243-256
1991



203 国際会議プロシーディングス等

How to Utilize the Randomness of Zero-Knowledge Proofs.
共著
Okamoto,T.,Ohta,K
Crypt'90, Lecture Notes in Computer Science
(ISBN 3-540-54508-5)
No.537, 456-475
1991



204 国際会議プロシーディングス等

Confirmation that Some Hash Functions Are Not Collision Free.
共著
Shoji Miyaguchi, Kazuo Ohta, Masahiko Iwata
Eurocrypt'90,Lecture Notes in Computer Science
(ISBN 3-540-53587-X)
No.473, 326-343
1991



205 国際会議プロシーディングス等

Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme.
共著
Ohta,K, Okamoto,T.
Eurocrypt'90,Lecture Notes in Computer Science
(ISBN 3-540-53587-X)
No.473, 446-457
1991



206 国際会議プロシーディングス等

Meet-in-the-Middle Attack on Digital Signature Schemes.
共著
Kazuo Ohta, Kenji Koyama
AUSCRYPT '90, Lecture Notes in Computer Science
(ISBN 3-540-53000-2)
No.453, 140-154
1990



207 国際会議プロシーディングス等

Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash
共著
Okamoto,T.,Ohta,K
Crypt'89,Lecture Notes in Computer Science
(ISBN 3-540-97317-6)
No.435, 481-496
1990



208 国際会議プロシーディングス等

A Modification of the Fiat-Shamir Scheme
共著
Kazuo Ohta, Tatsuaki Okamoto
CRYPTO '88, Lecture Notes in Computer Science
(ISBN 3-540-97196-3)
No.403, 232-243
1990



209 国際会議プロシーディングス等

Divertible Zero-Knowledge Interactive Proofs and Commutative Random Self-Reducible
共著
Okamoto,T.,Ohta,K
Eurocrypt'89,Lecture Notes in Computer Science
(ISBN 3-540-53433-4)
No.434, 134-149
1990



210 国際会議プロシーディングス等

Security of Improved Identity-Based Conference Key Distribution Systems.
共著
Kenji Koyama, Kazuo Ohta
EUROCRYPT '88, Lecture Notes in Computer Science
(ISBN 3-540-50251-3)
No.330, 11-19
1988



211 国際会議プロシーディングス等

Identity-based Conference Key Distribution Systems
共著
Kenji Koyama, Kazuo Ohta
CRYPTO '87, Lecture Notes in Computer Science
(ISBN 3-540-18796-0)
No.293, 175-184
1988



212 解説

共通鍵暗号による秘匿検索暗号のセキュリティ

太田 和夫
日本銀行金融研究所 ディスカッション・ペーパー・シリーズ
2017-J-5
2017/03



213 解説

安全性を証明可能なハッシュ関数の設計論
共著
太田 和夫,國廣 昇,王 磊
電子情報通信学会誌
91/ 3, 218-223
2008



214 解説

APOP が破られた

國廣 昇,太田 和夫
電子情報通信学会誌
91/ 9, 822-825
2008



215 解説

RSA暗号に対する格子理論に基づく攻撃(その2)

國廣昇,太田和夫
応用数理学会誌
18/ 3, 44-51
2008



216 解説

暗号における理論と実装のギャップ ---置き換えアプローチの二面性---,

太田 和夫,國廣 昇, Bagus Santoso
応用数理学会誌
18/ 4, 62-73
2008/12



217 解説

暗号への脅威「サイドチャネル攻撃」とその対策

﨑山 一男, 太田 和夫
岩波書店「科学」報告・解説
78/ 10, 1080-1083
2008/10



218 解説

暗号への脅威「サイドチャネル攻撃」とその対策

﨑山 一男,太田 和夫
「科学」報告・解説
?-
2008/10



219 解説

暗号学における双対性 ---ゴールとシナリオの間には---

太田 和夫,國廣 昇
応用数理学会誌
18/ 2, 71-78
2008/06



220 解説

RSA 暗号に対する格子理論に基づく攻撃

國廣 昇,太田 和夫
応用数理学会誌
18/ 1, 23-29
2008/03



221 解説

証明可能安全性理論に向けて
共著
太田 和夫
電子情報通信学会誌
90/ 6, 426-430
2007/06



222 解説

暗号の米政府標準方式が危機に

國廣 昇,太田 和夫
Sceince Journal 科学 別冊(岩波書店)
75/ 11, 1235-1237
2005/11



223 解説

電子オークションプロトコルの技術動向 -- 第一価格秘密入札方式について --
共著
太田 和夫, 今井 識, 森田 光
電子情報通信学会東京支部学生会学生会報
8, 7-13
2003



224 解説

Triple DES を巡る最近の標準化動向について
共著
谷口 文一,太田 和夫,大久保 美也子
日本銀行金融研究所 金融研究
18/ 別冊1, 29-49
1999/09



225 解説

セキュリティシステム技術

太田 和夫
セキュリティシステム技術調査専門委員会,電気学会技術報告,3.3 章を担当
738, 31-35
1999/08



226 解説

共通鍵暗号を取り巻く現状と課題 --- DES から AES へ ---
共著
宇根 正志,太田 和夫
日本銀行金融研究所 金融研究
18/ 2, 115-193
1999/04



227 解説

電子マネーを構成する情報セキュリティ技術と安全性評価
共著
中山 靖司,松本 勉,太田 和夫
日本銀行金融研究所 金融研究
18/ 2, 57-114
1999/04



228 解説

暗号解読法の進歩と次期米国標準暗号(AES)制定の動き

太田 和夫
Computer Today, ネットワークシステムと暗号
86, 10-17
1998/07



229 解説

電子マネーの技術的側面

太田 和夫
特許庁 庁内機関紙 特技懇
190, 19-30
1997/01



230 解説

暗号の攻撃・解読法:差分攻撃法
共著
太田 和夫,青木 和麻呂
情報処理
37/ 6, 521-525
1996/06



231 解説

セキュリティ応用--ディジタルキャッシュ--

太田 和夫
電子情報通信学会
79/ 2, 131-140
1996/02



232 解説

クラスNPの新しい特徴づけ--確率的検査可能証明と近似問題--
共著
太田 和夫,岡本 龍明
情報処理
35/ 1, 55-68
1994/01



233 解説

ゼロ知識証明の応用
共著
太田 和夫,藤岡 淳
情報処理
32/ 6, 654-662
1991/06



234 解説

情報セキュリティの標準化の動向について

太田 和夫
電子情報通信学会
72/ 3, 297-305
1980/03