Follow
Kenji Yasunaga
Kenji Yasunaga
Verified email at ist.osaka-u.ac.jp
Title
Cited by
Cited by
Year
On the list decodability of insertions and deletions
T Hayashi, K Yasunaga
IEEE Transactions on Information Theory 66 (9), 5335-5343, 2020
232020
Preventing abuse of cookies stolen by XSS
H Takahashi, K Yasunaga, M Mambo, K Kim, HY Youm
2013 Eighth Asia Joint Conference on Information Security, 85-89, 2013
212013
General constructions of rational secret sharing with expected constant-round reconstruction
A Kawachi, Y Okamoto, K Tanaka, K Yasunaga
The Computer Journal 60 (5), 711-728, 2017
172017
Practical card-based protocol for three-input majority
K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020
162020
Rational proofs against rational verifiers
K Inasawa, K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
132017
A game-theoretic perspective on oblivious transfer
H Higo, K Tanaka, A Yamada, K Yasunaga
Australasian Conference on Information Security and Privacy, 29-42, 2012
112012
Leakage-resilience of stateless/stateful public-key encryption from hash proofs
MH Nguyen, K Yasunaga, K Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
92013
On the limitations of computational fuzzy extractors
K Yasunaga, K Yuzawa
Cryptology ePrint Archive, 2014
82014
Game-theoretic security for bit commitment
H Higo, K Tanaka, K Yasunaga
International workshop on security, 303-318, 2013
82013
Replacing probability distributions in security games via Hellinger distance
K Yasunaga
2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021
72021
Public-key encryption with lazy parties
K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
62016
Randomness leakage in the kem/dem framework
H Namiki, K Tanaka, K Yasunaga
Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011
62011
Bit security as computational cost for winning games with high probability
S Watanabe, K Yasunaga
International Conference on the Theory and Application of Cryptology and …, 2021
52021
Determination of the local weight distribution of binary linear block codes
K Yasunaga, T Fujiwara
IEEE transactions on information theory 52 (10), 4444-4454, 2006
52006
An algorithm for computing the local distance profile of binary linear codes closed under a group of permutations
K YASUNAGA
IEICE Technical Report, IT2003-47, 2003
52003
Post-challenge leakage resilient public-key cryptosystem in split state model
E Fujisaki, A Kawachi, R Nishimaki, K Tanaka, K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015
42015
The local weight distributions of the (128, 50) extended binary primitive BCH code and (128, 64) Reed-Muller code
K Yasunaga
IEICE Technical Report, 2004
42004
Repeated games for generating randomness in encryption
K Yasunaga, K Yuzawa
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
32018
Perfectly secure message transmission against independent rational adversaries
K Yasunaga, T Koshiba
Decision and Game Theory for Security: 10th International Conference …, 2019
22019
Perfectly secure message transmission against rational timid adversaries
M Fujita, K Yasunaga, T Koshiba
Decision and Game Theory for Security: 9th International Conference, GameSec …, 2018
22018
The system can't perform the operation now. Try again later.
Articles 1–20