scispace - formally typeset
K

Kazukuni Kobara

Researcher at National Institute of Advanced Industrial Science and Technology

Publications -  111
Citations -  1092

Kazukuni Kobara is an academic researcher from National Institute of Advanced Industrial Science and Technology. The author has contributed to research in topics: Password & Authenticated Key Exchange. The author has an hindex of 18, co-authored 111 publications receiving 1031 citations. Previous affiliations of Kazukuni Kobara include University of Tokyo & Chuo University.

Papers
More filters
Journal ArticleDOI

Semantic security for the McEliece cryptosystem without random oracles

TL;DR: It is formally proved that padding the plaintext with a random bit-string provides the semantic security against chosen plaintext attack (IND-CPA) for the McEliece (and its dual, the Niederreiter) cryptosystems under the standard assumptions.
Book ChapterDOI

Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis

TL;DR: A nontrivial 9-round byte characteristic is shown, which may lead to a possible attack of reduced-round version of Camellia without input/output whitening, FL or FL-1 in a chosen plain text scenario.
Proceedings ArticleDOI

A security framework for MQTT

TL;DR: This paper proposes a simple security framework for MQTT (for short, AugMQTT) by incorporating the AugPAKE protocol, which does not require any certificate validation checks and certificate revocation checks on both publishers/subscribers and broker sides.
Journal ArticleDOI

Cyber Physical Security for Industrial Control Systems and IoT

TL;DR: In this paper, cybersecurity in ICS (Industrial Control Systems) is reviewed as a leading example of cyber physical security for critical infrastructures and as a future aspect of it, IoT security for consumers is explained.
Patent

Authentication system, and remotely distributed storage system

TL;DR: In this article, a master key generator is used to generate, based on an input password and a predetermined calculation, a value MK and further uses an authentication result judging part to calculate, from the value MK, values V1 and V2.