Toward the fair anonymous signatures: Deniable ring signatures Y Komano, K Ohta, A Shimbo, S Kawamura Cryptographers’ Track at the RSA Conference, 174-191, 2006 | 78* | 2006 |
Multisignature method, apparatus, program, and system Y Komano, K Ohta, S Kawamura, A Shimbo US Patent 7,496,759, 2009 | 41 | 2009 |
Secure authenticated key exchange with revocation for smart grid F Zhao, Y Hanatani, Y Komano, B Smyth, S Ito, T Kambayashi 2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 1-8, 2012 | 36 | 2012 |
BS-CPA: Built-in determined sub-key correlation power analysis Y Komano, H Shimizu, S Kawamura IEICE transactions on fundamentals of electronics, communications and …, 2010 | 34 | 2010 |
Efficient universal padding techniques for multiplicative trapdoor one-way permutation Y Komano, K Ohta Annual International Cryptology Conference, 366-382, 2003 | 34 | 2003 |
Provably secure electronic cash based on blind multisignature schemes Y Hanatani, Y Komano, K Ohta, N Kunihiro Financial Cryptography and Data Security: 10th International Conference, FC …, 2006 | 32 | 2006 |
Encryption apparatus and encryption method Y Komano, H Shimizu, A Shimbo US Patent App. 11/523,609, 2007 | 29 | 2007 |
RNS montgomery reduction algorithms using quadratic residuosity S Kawamura, Y Komano, H Shimizu, T Yonemura Journal of Cryptographic Engineering 9, 313-331, 2019 | 27 | 2019 |
Encryption key generating apparatus and computer program product Y Komano, K Ohta, K Sakiyama US Patent 9,537,653, 2017 | 25 | 2017 |
Update control device, terminal, and method of controlling XIA Zhengfan, Y Komano, T Kawabata US Patent App. 15/894,161, 2019 | 24 | 2019 |
Encryption/signature method, apparatus, and program Y Komano, S Kawamura, A Shimbo US Patent App. 10/902,815, 2005 | 21 | 2005 |
Analysis of information leakage due to operative errors in card-based protocols T Mizuki, Y Komano Combinatorial Algorithms: 29th International Workshop, IWOCA 2018, Singapore …, 2018 | 20 | 2018 |
The security problems of Rivest and Shamir's PayWord scheme N Adachi, S Aoki, Y Komano, K Ohta IEEE International Conference on E-Commerce, 2003. CEC 2003., 20-23, 2003 | 20 | 2003 |
Molecular Devices: An Introduction to Technomimetics and Its Biological Applications AA Gakh John Wiley & Sons, 2018 | 18 | 2018 |
Apparatus and method for testing normality of shared data Y Komano, T Kawabata US Patent 10,255,428, 2019 | 17 | 2019 |
An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density K Matsuda, S Tada, M Nagata, Y Komano, Y Li, T Sugawara, M Iwamoto, ... Japanese Journal of Applied Physics 59 (SG), SGGL02, 2020 | 16 | 2020 |
Formal security model of multisignatures Y Komano, K Ohta, A Shimbo, S Kawamura Information Security: 9th International Conference, ISC 2006, Samos Island …, 2006 | 16 | 2006 |
Symmetric encryption apparatus and storage medium, and symmetric decryption apparatus and storage medium Y Komano, K Akiyama, Y Goto US Patent 9,413,729, 2016 | 15 | 2016 |
Non-linear data converter, encoder and decoder Y Komano, H Shimizu, K Fujisaki, H Miyake, A Shimbo US Patent 8,401,180, 2013 | 15 | 2013 |
Update control apparatus, software update system, and update control method Y Komano, XIA Zhengfan, T Kawabata US Patent 10,360,018, 2019 | 14 | 2019 |