Name
Affiliation
Papers
KOUTAROU SUZUKI
NTT Corporation NTT Information Sharing Platform Laboratories 3-9-11 Midori-cho, Musashino-shi Tokyo 180-8585 Japan
38
Collaborators
Citations 
PageRank 
34
518
29.57
Referers 
Referees 
References 
845
517
664
Search Limit
100845
Title
Citations
PageRank
Year
Strongly Secure Identity-Based Key Exchange With Single Pairing Operation00.342021
How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes.40.392017
Garbling Scheme for Formulas with Constant Size of Garbled Gates.20.362016
Secure Multi-Party Computation for Elliptic Curves.00.342014
Converting PKI-Based Authenticated Key Exchange to Identity-Based00.342014
Id-Eck Secure Id-Based Authenticated Key Exchange On Symmetric And Asymmetric Pairing30.382013
Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles.10.362013
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism110.552013
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange160.622013
Message Recovery Signature Schemes From Sigma-Protocols10.352013
Sufficient condition for ephemeral key-leakage resilient tripartite key exchange60.442012
Strongly Secure Predicate-Based Authenticated Key Exchange: Definition And Constructions30.402012
Strongly secure authenticated key exchange from factoring, codes, and lattices361.052012
Sufficient condition for identity-based authenticated key exchange resilient to leakage of secret keys30.392011
Anonymous Hierarchical Identity-Based Encryption With Short Ciphertexts70.482011
Designing efficient authenticated key exchange resilient to leakage of ephemeral secret keys140.582011
Ephemeral key leakage resilient and efficient ID-AKEs that can share identities, private and master keys40.402010
Anonymizable signature and its construction from pairings00.342010
Hierarchical ID-based authenticated key exchange resilient to ephemeral key leakage00.342010
Predicate-based authenticated key exchange resilient to ephemeral key leakage40.442010
Secure Keyword Auction: Preserving Privacy of Bidding Prices and CTRs10.392009
Utilizing postponed ephemeral and pseudo-static keys in tripartite and identity-based key agreement protocols.00.342009
Relinkable Ring Signature10.362009
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts581.452009
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications30.702007
Fully Resilient Traitor Tracing Scheme using Key Update.00.342007
Traceable Ring Signature130.592006
Secure Multi-attribute Procurement Auction20.392005
RFID privacy issues and technical challenges804.612005
Efficient, non-optimistic secure circuit evaluation based on the elgamal encryption10.362005
Generalized Vickrey Auction And Suppression Of Active Adversary Using Incentive-Compatible Implementation00.342005
Secure Generalized Vickrey Auction without Third-party Servers110.742004
Secure Generalized Vickrey Auction Using Homomorphic Encryption321.632003
Receipt-Free Sealed-Bid Auction261.082002
M+1-st Price Auction Using Homomorphic Encryption592.222002
Secure combinatorial auctions by dynamic programming with polynomial secret sharing341.682002
Secure multi-agent dynamic programming based on homomorphic encryption and its application to combinatorial auctions461.952002
Efficient Sealed-Bid Auction Using Hash Chain361.532000