What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Atsushi Fujioka
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/latincrypt
Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable.
Kohei Nakagawa
Atsushi Fujioka
Akira Nagai
Junichi Tomida
Keita Xagawa
Kan Yasuda
2021
conf/icisc
Revocable Hierarchical Identity-Based Authenticated Key Exchange.
Yuki Okano
Junichi Tomida
Akira Nagai
Kazuki Yoneyama
Atsushi Fujioka
Koutarou Suzuki
2019
conf/provsec
One-Round Authenticated Group Key Exchange from Isogenies.
Atsushi Fujioka
Katsuyuki Takashima
Kazuki Yoneyama
2019
conf/esorics
Strongly Secure Identity-Based Key Exchange with Single Pairing Operation.
Junichi Tomida
Atsushi Fujioka
Akira Nagai
Koutarou Suzuki
2018
conf/icisc
Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange.
Atsushi Fujioka
Katsuyuki Takashima
Shintaro Terada
Kazuki Yoneyama
2018
conf/provsec
Single Private-Key Generator Security Implies Multiple Private-Key Generators Security.
Atsushi Fujioka
Kazuki Yoneyama
2017
conf/iwsec
Adaptive Security in Identity-Based Authenticated Key Agreement with Multiple Private Key Generators.
Atsushi Fujioka
2013
conf/ccs
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
Atsushi Fujioka
Koutarou Suzuki
Keita Xagawa
Kazuki Yoneyama
2012
conf/acisp
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange.
Atsushi Fujioka
Mark Manulis
Koutarou Suzuki
Berkant Ustaoglu
2012
conf/acns
Security Enhancements by OR-Proof in Identity-Based Identification.
Atsushi Fujioka
Taiichi Saito
Keita Xagawa
2012
conf/pkc
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
Atsushi Fujioka
Koutarou Suzuki
Keita Xagawa
Kazuki Yoneyama
2012
conf/icics
Security Enhancement of Identity-Based Identification with Reversibility.
Atsushi Fujioka
Taiichi Saito
Keita Xagawa
2012
conf/cans
Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification.
Atsushi Fujioka
Taiichi Saito
Keita Xagawa
2011
conf/acisp
Generic Construction of Strongly Secure Timed-Release Public-Key Encryption.
Atsushi Fujioka
Yoshiaki Okamoto
Taiichi Saito
2011
conf/icisc
Strong Security Notions for Timed-Release Public-Key Encryption Revisited.
Ryo Kikuchi
Atsushi Fujioka
Yoshiaki Okamoto
Taiichi Saito
2011
conf/icisc
Sufficient Condition for Identity-Based Authenticated Key Exchange Resilient to Leakage of Secret Keys.
Atsushi Fujioka
Koutarou Suzuki
2011
conf/ctrsa
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret Keys.
Atsushi Fujioka
Koutarou Suzuki
2011
conf/iwsec
Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique.
Atsushi Fujioka
2010
conf/latincrypt
Security of Sequential Multiple Encryption.
Atsushi Fujioka
Yoshiaki Okamoto
Taiichi Saito
2010
conf/wisa
Predicate-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
Atsushi Fujioka
Koutarou Suzuki
Kazuki Yoneyama
2010
conf/iwsec
Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage.
Atsushi Fujioka
Koutarou Suzuki
Kazuki Yoneyama
2009
conf/iwsec
Strongly Secure Authenticated Key Exchange without NAXOS' Approach.
Minkyu Kim
Atsushi Fujioka
Berkant Ustaoglu
1992
conf/crypto
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Z<sub>n</sub>.
Tatsuaki Okamoto
Atsushi Fujioka
Eiichiro Fujisaki
1992
conf/eurocrypt
Secure Bit Commitment Function against Divertibility.
Kazuo Ohta
Tatsuaki Okamoto
Atsushi Fujioka
1992
conf/asiacrypt
A Practical Secret Voting Scheme for Large Scale Elections.
Atsushi Fujioka
Tatsuaki Okamoto
Kazuo Ohta
1991
conf/eurocrypt
Interactive Bi-Proof Systems and Undeniable Signature Schemes.
Atsushi Fujioka
Tatsuaki Okamoto
Kazuo Ohta
1991
conf/eurocrypt
ESIGN: An Efficient Digital Signature Implementation for Smard Cards.
Atsushi Fujioka
Tatsuaki Okamoto
Shoji Miyaguchi
1990
conf/eurocrypt
Provably Secure Key-Updating Schemes in Identity-Based Systems.
Shinji Shinozaki
Toshiya Itoh
Atsushi Fujioka
Shigeo Tsujii
Coauthors
Akira Nagai
(3)
Atsushi Fujioka
(28)
Berkant Ustaoglu
(2)
Eiichiro Fujisaki
(1)
Junichi Tomida
(3)
Kan Yasuda
(1)
Katsuyuki Takashima
(2)
Kazuki Yoneyama
(8)
Kazuo Ohta
(3)
Keita Xagawa
(6)
Kohei Nakagawa
(1)
Koutarou Suzuki
(9)
Mark Manulis
(1)
Minkyu Kim
(1)
Ryo Kikuchi
(1)
Shigeo Tsujii
(1)
Shinji Shinozaki
(1)
Shintaro Terada
(1)
Shoji Miyaguchi
(1)
Taiichi Saito
(6)
Tatsuaki Okamoto
(5)
Toshiya Itoh
(1)
Yoshiaki Okamoto
(3)
Yuki Okano
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to