Name
Affiliation
Papers
KAZUKUNI KOBARA
Univ Tokyo, Inst Ind Sci, Minato Ku, Tokyo 1538505, Japan
91
Collaborators
Citations 
PageRank 
115
387
47.00
Referers 
Referees 
References 
629
785
893
Search Limit
100785
Title
Citations
PageRank
Year
DeviceVeil: Robust Authentication for Individual USB Devices Using Physical Unclonable Functions00.342019
How To Preserve User Anonymity In Password-Based Anonymous Authentication Scheme00.342018
Simple Anonymous Password-Based Authenticated Key Exchange (Sapake), Reconsidered20.372017
Security Analysis of Password-Authenticated Key Retrieval.10.352017
Cyber Physical Security For Industrial Control Systems And Iot70.522016
A security framework for MQTT.00.342016
A secure anonymous password-based authentication protocol with control of authentication numbers00.342016
On Finding Secure Domain Parameters Resistant To Cheon'S Algorithm00.342015
Hidden Credential Retrieval, Revisited00.342015
On Unlinkability Of Password-Based Anonymous Authentication00.342015
Evaluation of Physical Unclonable Functions for 28-nm Process Field-Programmable Gate Arrays.50.542014
About Validity Checks Of Augmented Pake In Ieee 1363.2 And Iso/Iec 11770-400.342014
Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE00.342014
Energy and area saving effect of Dynamic Partial Reconfiguration on a 28-nm process FPGA10.372013
Securing SSL-VPN with LR-AKE to access personal health record.00.342013
HB♭ protocol for lightweight authentication; Its information theoretic indistinguishability against MITM attack watching reader's response00.342012
Comparison of tools and simulators for control system security studies10.372012
Efficient Augmented Password-Only Authentication and Key Exchange for IKEv240.442012
A secure public cloud storage system.40.462011
Threshold Anonymous Password-Authenticated Key Exchange Secure Against Insider Attacks20.402011
On advanced cryptographic techniques for information security of smart grid AMI00.342011
Security Proof of AugPAKE.40.442010
Anonymous Password-Authenticated Key Exchange: New Construction And Its Extensions10.352010
How to strengthen the security of RSA-OAEP10.372010
Purpose-restricted Anonymous Mobile Communications Using Anonymous Signatures in Online Credential Systems20.402010
Privacy Enhanced RFID Using Quasi-Dyadic Fix Domain Shrinking50.442010
A note on a fatal error of optimized LFC private information retrieval scheme and its corrected results00.342010
Security Analysis Of Two Augmented Password-Authenticated Key Exchange Protocols10.352010
An Rsa-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure Against Replacement Attacks, And Its Extensions20.492010
How to distinguish on-line dictionary attacks and password mis-typing in two-factor authentication00.342010
Very-Efficient Anonymous Password-Authenticated Key Exchange and Its Extensions80.512009
Partnership in key exchange protocols70.502009
Flexible Quasi-Dyadic Code-Based Public-Key Encryption and Signature.20.412009
New security layer for overlay networks.00.342009
Lightweight broadcast authentication protocols reconsidered50.422009
Code-based public-key cryptosystems and their applications00.342009
Coding-Based Oblivious Transfer110.522008
Semantic security for the McEliece cryptosystem without random oracles471.632008
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way40.492008
A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange50.452008
Protocols for purpose-restricted anonymous communications in IP-based wireless networks10.362008
Ivs To Skip For Immunizing Wep Against Fms Attack20.522008
RSA-Based Password-Authenticated Key Exchange, Revisited10.362008
Special Section on Cryptography and Information Security00.342008
A Secure Authenticated Key Exchange Protocol for Credential Services20.532008
IVs to Skip for Immunizing WEP against FMS Attack.00.342008
A security framework for personal networks00.342008
A New Security Architecture For Personal Networks And Its Performance Evaluation00.342008
An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction*A preliminary version appeared in [33]. Some mistakes about security proof are corrected in this paper.00.342007
An Efficient And Leakage-Resilient Rsa-Based Authenticated Key Exchange Protocol With Tight Security Reduction20.372007
  • 1
  • 2