Cryptographers' World
 

Kazuo Ohta


Author's Web Page Link

37 papers in database with 1770 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 16

Conference Proceedings

 
1. Kazuo OhtaDingyi Pei, editors, Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings. Springer, 1998. ISBN 3-540-65109-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Yusuke Naito,  Kazuki Yoneyama,  Lei Wang,  Kazuo Ohta,  How to Confirm Cryptosystems Security: The Original Merkle-Damg√•rd Is Still Alive!, pp. 382 - 398, ASIACRYPT 2009.

[Electronic Edition][Cited 3 times ]

2. Yuichi Komano,  Kazuo Ohta,  Hideyuki Miyake,  Atsushi Shimbo,  Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN, pp. 306 - 323, ACNS 2009.

[Electronic Edition][Cited 1 times ]

3. Takashi Nishide,  Kazuki Yoneyama,  Kazuo Ohta,  Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures, pp. 111 - 129, ACNS 2008.

[Electronic Edition][Cited 16 times ]

4. Yu Sasaki,  Lei Wang,  Kazuo Ohta,  Noboru Kunihiro,  Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function, pp. 290 - 307, AFRICACRYPT 2008.

[Electronic Edition][Cited 2 times ]

5. Lei Wang,  Kazuo Ohta,  Noboru Kunihiro,  New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5, pp. 237 - 253, EUROCRYPT 2008.

[Electronic Edition][Cited 15 times ]

6. Yu Sasaki,  Lei Wang,  Kazuo Ohta,  Noboru Kunihiro,  Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack, pp. 1 - 18, CT-RSA 2008.

[Electronic Edition][Cited 9 times ]

7. Yu Sasaki,  Lei Wang,  Kazuo Ohta,  Noboru Kunihiro,  New Message Difference for MD4, pp. 329 - 348, FSE 2007.

[Electronic Edition][Cited 17 times ]

8. Takashi Nishide,  Kazuo Ohta,  Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol, pp. 343 - 360, PKC 2007.

[Electronic Edition][Cited 27 times ]

9. Bagus Santoso,  Noboru Kunihiro,  Naoki Kanayama,  Kazuo Ohta,  Factorization of Square-Free Integers with High Bits Known, pp. 115 - 130, VIETCRYPT 2006.

[Electronic Edition][Cited 5 times ]

10. Yu Sasaki,  Yusuke Naito,  Jun Yajima,  Takeshi Shimoyama,  Noboru Kunihiro,  Kazuo Ohta,  How to Construct Sufficient Conditions for Hash Functions, pp. 243 - 259, VIETCRYPT 2006.

[Electronic Edition][Cited 1 times ]

11. Yuichi Komano,  Kazuo Ohta,  Atsushi Shimbo,  Shin-ichi Kawamura,  Toward the Fair Anonymous Signatures: Deniable Ring Signatures, pp. 174 - 191, CT-RSA 2006.

[Electronic Edition][Cited 19 times ]

12. Yoshikazu Hanatani,  Yuichi Komano,  Kazuo Ohta,  Noboru Kunihiro,  Provably Secure Electronic Cash Based on Blind Multisignature Schemes, pp. 236 - 250, FC 2006.

[Electronic Edition][Cited 8 times ]

13. Yusuke Naito,  Yu Sasaki,  Takeshi Shimoyama,  Jun Yajima,  Noboru Kunihiro,  Kazuo Ohta,  Improved Collision Search for SHA-0, pp. 21 - 36, ASIACRYPT 2006.

[Electronic Edition][Cited 12 times ]

14. Yuichi Komano,  Kazuo Ohta,  Atsushi Shimbo,  Shin-ichi Kawamura,  On the Security of Probabilistic Multisignature Schemes and Their Optimality, pp. 132 - 150, MYCRYPT 2005.

[Electronic Edition][Cited 3 times ]

15. Yuichi Komano,  Kazuo Ohta,  Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation, pp. 366 - 382, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 15 times ]

16. Kazuo Ohta,  Tatsuaki Okamoto,  On Concrete Security Treatment of Signatures Derived from Identification, pp. 354 - 369, CRYPTO 1998.

[Electronic Edition][Cited 107 times Red StarRed Star]

17. Masayuki Kanda,  Youichi Takashima,  Tsutomu Matsumoto,  Kazumaro Aoki,  Kazuo Ohta,  A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis, pp. 264 - 279, SAC 1998.

[Electronic Edition][Cited 34 times ]

18. Kazuo Ohta,  Shiho Moriai,  Kazumaro Aoki,  Improving the Search Algorithm for the Best Linear Expression, pp. 157 - 170, CRYPTO 1995.

[Electronic Edition][Cited 10 times ]

19. Kazuo Ohta,  Kazumaro Aoki,  Linear Cryptanalysis of the Fast Data Encipherment Algorithm, pp. 12 - 16, CRYPTO 1994.

[Electronic Edition][Cited 15 times ]

20. Kazuo Ohta,  Mitsuru Matsui,  Differential Attack on Message Authentication Codes, pp. 200 - 211, CRYPTO 1993.

[Electronic Edition][Cited 11 times ]

21. Atsushi Fujioka,  Tatsuaki Okamoto,  Kazuo Ohta,  A Practical Secret Voting Scheme for Large Scale Elections, pp. 244 - 251, ASIACRYPT 1992.

[Electronic Edition][Cited 571 times Red StarRed StarRed StarRed Star]

22. Kazuo Ohta,  Tatsuaki Okamoto,  Atsushi Fujioka,  Secure Bit Commitment Function against Divertibility, pp. 324 - 340, EUROCRYPT 1992.

[Electronic Edition][Cited 4 times ]

23. Kazuo Ohta,  Tatsuaki Okamoto,  A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme, pp. 139 - 148, ASIACRYPT 1991.

[Electronic Edition][Cited 104 times Red StarRed Star]

24. Hikaru Morita,  Kazuo Ohta,  Shoji Miyaguchi,  Results of Switching-Closure-Test on FEAL (Extended Abstract), pp. 247 - 252, ASIACRYPT 1991.

[Electronic Edition][No citation]

25. Tatsuaki Okamoto,  Kazuo Ohta,  Universal Electronic Cash, pp. 324 - 337, CRYPTO 1991.

[Electronic Edition][Cited 303 times Red StarRed StarRed Star]

26. Hikaru Morita,  Kazuo Ohta,  Shoji Miyaguchi,  A Switching Closure Test to Analyze Cryptosystems, pp. 183 - 193, CRYPTO 1991.

[Electronic Edition][Cited 10 times ]

27. Atsushi Fujioka,  Tatsuaki Okamoto,  Kazuo Ohta,  Interactive Bi-Proof Systems and Undeniable Signature Schemes, pp. 243 - 256, EUROCRYPT 1991.

[Electronic Edition][Cited 37 times ]

28. Tatsuaki Okamoto,  David Chaum,  Kazuo Ohta,  Direct Zero Knowledge Proofs of Computational Power in Five Rounds, pp. 96 - 105, EUROCRYPT 1991.

[Electronic Edition][Cited 3 times ]

29. Kazuo Ohta,  Tatsuaki Okamoto,  Kenji Koyama,  Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme, pp. 446 - 457, EUROCRYPT 1990.

[Electronic Edition][Cited 19 times ]

30. Shoji Miyaguchi,  Kazuo Ohta,  Masahiko Iwata,  Confirmation that Some Hash Functions Are Not Collision Free, pp. 326 - 343, EUROCRYPT 1990.

[Electronic Edition][Cited 25 times ]

31. Tatsuaki Okamoto,  Kazuo Ohta,  How to Utilize the Randomness of Zero-Knowledge Proofs, pp. 456 - 475, CRYPTO 1990.

[Electronic Edition][Cited 25 times ]

32. Kazuo Ohta,  Kenji Koyama,  Meet-in-the-Middle Attack on Digital Signature Schemes, pp. 140 - 154, ASIACRYPT 1990.

[Electronic Edition][Cited 9 times ]

33. Tatsuaki Okamoto,  Kazuo Ohta,  Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash, pp. 481 - 496, CRYPTO 1989.

[Electronic Edition][Cited 106 times Red StarRed Star]

34. Tatsuaki Okamoto,  Kazuo Ohta,  Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility, pp. 134 - 148, EUROCRYPT 1989.

[Electronic Edition][Cited 75 times Red Star]

35. Kazuo Ohta,  Tatsuaki Okamoto,  A Modification of the Fiat-Shamir Scheme, pp. 232 - 243, CRYPTO 1988.

[Electronic Edition][Cited 111 times Red StarRed Star]

36. Kenji Koyama,  Kazuo Ohta,  Security of Improved Identity-Based Conference Key Distribution Systems, pp. 11 - 19, EUROCRYPT 1988.

[Electronic Edition][Cited 32 times ]

37. Kenji Koyama,  Kazuo Ohta,  Identity-based Conference Key Distribution Systems, pp. 175 - 184, CRYPTO 1987.

[Electronic Edition][Cited 6 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...