Follow
Kenji Yasunaga
Kenji Yasunaga
Verified email at ist.osaka-u.ac.jp
Title
Cited by
Cited by
Year
Preventing abuse of cookies stolen by XSS
H Takahashi, K Yasunaga, M Mambo, K Kim, HY Youm
2013 Eighth Asia joint conference on information security, 85-89, 2013
262013
On the list decodability of insertions and deletions
T Hayashi, K Yasunaga
IEEE Transactions on Information Theory 66 (9), 5335-5343, 2020
252020
Practical card-based protocol for three-input majority
K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020
192020
General constructions of rational secret sharing with expected constant-round reconstruction
A Kawachi, Y Okamoto, K Tanaka, K Yasunaga
The Computer Journal 60 (5), 711-728, 2017
172017
Rational proofs against rational verifiers
K Inasawa, K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
142017
Congenital malignant mesothelioma: A case report and electron-microscopic study
H Nishioka, K Furusho, T Yasunaga, K Tanaka, A Yamanouchi, T Yokota, ...
European journal of pediatrics 147, 428-430, 1988
141988
Replacing probability distributions in security games via Hellinger distance
K Yasunaga
2nd Conference on Information-Theoretic Cryptography (ITC 2021), 2021
112021
A game-theoretic perspective on oblivious transfer
H Higo, K Tanaka, A Yamada, K Yasunaga
Australasian Conference on Information Security and Privacy, 29-42, 2012
112012
Bit security as computational cost for winning games with high probability
S Watanabe, K Yasunaga
International Conference on the Theory and Application of Cryptology and …, 2021
102021
Leakage-resilience of stateless/stateful public-key encryption from hash proofs
MH Nguyen, K Yasunaga, K Tanaka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
92013
On the limitations of computational fuzzy extractors
K Yasunaga, K Yuzawa
Cryptology ePrint Archive, 2014
82014
Game-theoretic security for bit commitment
H Higo, K Tanaka, K Yasunaga
International workshop on security, 303-318, 2013
82013
Unified view for notions of bit security
S Watanabe, K Yasunaga
International Conference on the Theory and Application of Cryptology and …, 2023
62023
Public-key encryption with lazy parties
K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
62016
Randomness leakage in the kem/dem framework
H Namiki, K Tanaka, K Yasunaga
Provable Security: 5th International Conference, ProvSec 2011, Xi’an, China …, 2011
62011
Determination of the local weight distribution of binary linear block codes
K Yasunaga, T Fujiwara
IEEE transactions on information theory 52 (10), 4444-4454, 2006
52006
An algorithm for computing the local distance profile of binary linear codes closed under a group of permutations
K YASUNAGA
IEICE Technical Report, IT2003-47, 2003
52003
Improved bounds for codes correcting insertions and deletions
K Yasunaga
Designs, Codes and Cryptography 92 (5), 1267-1278, 2024
42024
Repeated games for generating randomness in encryption
K Yasunaga, K Yuzawa
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
42018
Post-challenge leakage resilient public-key cryptosystem in split state model
E Fujisaki, A Kawachi, R Nishimaki, K Tanaka, K Yasunaga
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015
42015
The system can't perform the operation now. Try again later.
Articles 1–20