Kazuo Ohta |
|
---|---|
Author's Web Page ![]() | |
37 papers in database with 1770 citations ![]() ![]() ![]() Editor of 1 conference proceedings book H-number: 16 | |
Conference Proceedings |
|
![]() | 1. Kazuo Ohta, Dingyi Pei, editors, Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings. Springer, 1998. ISBN 3-540-65109-8. [Papers] Find this book on amazon.com |
Conference Papers |
|
1. Yusuke Naito, Kazuki Yoneyama, Lei Wang, Kazuo Ohta, How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!, pp. 382 - 398, ASIACRYPT 2009. [ ![]() ![]() | |
2. Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo, Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN, pp. 306 - 323, ACNS 2009. [ ![]() ![]() | |
3. Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro, Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function, pp. 290 - 307, AFRICACRYPT 2008. [ ![]() ![]() | |
4. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures, pp. 111 - 129, ACNS 2008. [ ![]() ![]() | |
5. Lei Wang, Kazuo Ohta, Noboru Kunihiro, New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5, pp. 237 - 253, EUROCRYPT 2008. [ ![]() ![]() | |
6. Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro, Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack, pp. 1 - 18, CT-RSA 2008. [ ![]() ![]() | |
7. Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro, New Message Difference for MD4, pp. 329 - 348, FSE 2007. [ ![]() ![]() | |
8. Takashi Nishide, Kazuo Ohta, Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol, pp. 343 - 360, PKC 2007. [ ![]() ![]() | |
9. Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta, How to Construct Sufficient Conditions for Hash Functions, pp. 243 - 259, VIETCRYPT 2006. [ ![]() ![]() | |
10. Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta, Factorization of Square-Free Integers with High Bits Known, pp. 115 - 130, VIETCRYPT 2006. [ ![]() ![]() | |
11. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura, Toward the Fair Anonymous Signatures: Deniable Ring Signatures, pp. 174 - 191, CT-RSA 2006. [ ![]() ![]() | |
12. Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro, Provably Secure Electronic Cash Based on Blind Multisignature Schemes, pp. 236 - 250, FC 2006. [ ![]() ![]() | |
13. Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta, Improved Collision Search for SHA-0, pp. 21 - 36, ASIACRYPT 2006. [ ![]() ![]() | |
14. Yuichi Komano, Kazuo Ohta, Atsushi Shimbo, Shin-ichi Kawamura, On the Security of Probabilistic Multisignature Schemes and Their Optimality, pp. 132 - 150, MYCRYPT 2005. [ ![]() ![]() | |
15. Yuichi Komano, Kazuo Ohta, Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation, pp. 366 - 382, CRYPTO 2003. [ ![]() ![]() ![]() ![]() | |
16. Kazuo Ohta, Tatsuaki Okamoto, On Concrete Security Treatment of Signatures Derived from Identification, pp. 354 - 369, CRYPTO 1998. [ ![]() ![]() ![]() ![]() | |
17. Masayuki Kanda, Youichi Takashima, Tsutomu Matsumoto, Kazumaro Aoki, Kazuo Ohta, A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis, pp. 264 - 279, SAC 1998. [ ![]() ![]() | |
18. Kazuo Ohta, Shiho Moriai, Kazumaro Aoki, Improving the Search Algorithm for the Best Linear Expression, pp. 157 - 170, CRYPTO 1995. [ ![]() ![]() | |
19. Kazuo Ohta, Kazumaro Aoki, Linear Cryptanalysis of the Fast Data Encipherment Algorithm, pp. 12 - 16, CRYPTO 1994. [ ![]() ![]() | |
20. Kazuo Ohta, Mitsuru Matsui, Differential Attack on Message Authentication Codes, pp. 200 - 211, CRYPTO 1993. [ ![]() ![]() | |
21. Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta, A Practical Secret Voting Scheme for Large Scale Elections, pp. 244 - 251, ASIACRYPT 1992. [ ![]() ![]() ![]() ![]() ![]() ![]() | |
22. Kazuo Ohta, Tatsuaki Okamoto, Atsushi Fujioka, Secure Bit Commitment Function against Divertibility, pp. 324 - 340, EUROCRYPT 1992. [ ![]() ![]() | |
23. Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi, Results of Switching-Closure-Test on FEAL (Extended Abstract), pp. 247 - 252, ASIACRYPT 1991. [ ![]() ![]() | |
24. Kazuo Ohta, Tatsuaki Okamoto, A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme, pp. 139 - 148, ASIACRYPT 1991. [ ![]() ![]() ![]() ![]() | |
25. Tatsuaki Okamoto, Kazuo Ohta, Universal Electronic Cash, pp. 324 - 337, CRYPTO 1991. [ ![]() ![]() ![]() ![]() ![]() | |
26. Hikaru Morita, Kazuo Ohta, Shoji Miyaguchi, A Switching Closure Test to Analyze Cryptosystems, pp. 183 - 193, CRYPTO 1991. [ ![]() ![]() | |
27. Tatsuaki Okamoto, David Chaum, Kazuo Ohta, Direct Zero Knowledge Proofs of Computational Power in Five Rounds, pp. 96 - 105, EUROCRYPT 1991. [ ![]() ![]() | |
28. Atsushi Fujioka, Tatsuaki Okamoto, Kazuo Ohta, Interactive Bi-Proof Systems and Undeniable Signature Schemes, pp. 243 - 256, EUROCRYPT 1991. [ ![]() ![]() | |
29. Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama, Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme, pp. 446 - 457, EUROCRYPT 1990. [ ![]() ![]() | |
30. Shoji Miyaguchi, Kazuo Ohta, Masahiko Iwata, Confirmation that Some Hash Functions Are Not Collision Free, pp. 326 - 343, EUROCRYPT 1990. [ ![]() ![]() | |
31. Tatsuaki Okamoto, Kazuo Ohta, How to Utilize the Randomness of Zero-Knowledge Proofs, pp. 456 - 475, CRYPTO 1990. [ ![]() ![]() | |
32. Kazuo Ohta, Kenji Koyama, Meet-in-the-Middle Attack on Digital Signature Schemes, pp. 140 - 154, ASIACRYPT 1990. [ ![]() ![]() | |
33. Tatsuaki Okamoto, Kazuo Ohta, Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash, pp. 481 - 496, CRYPTO 1989. [ ![]() ![]() ![]() ![]() | |
34. Tatsuaki Okamoto, Kazuo Ohta, Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility, pp. 134 - 148, EUROCRYPT 1989. [ ![]() ![]() ![]() | |
35. Kazuo Ohta, Tatsuaki Okamoto, A Modification of the Fiat-Shamir Scheme, pp. 232 - 243, CRYPTO 1988. [ ![]() ![]() ![]() ![]() | |
36. Kenji Koyama, Kazuo Ohta, Security of Improved Identity-Based Conference Key Distribution Systems, pp. 11 - 19, EUROCRYPT 1988. [ ![]() ![]() | |
37. Kenji Koyama, Kazuo Ohta, Identity-based Conference Key Distribution Systems, pp. 175 - 184, CRYPTO 1987. [ ![]() ![]() |
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals