Publications

(2021). Selfish Mining Attacks Exacerbated by Elastic Hash Supply. arXiv.org.

PDF Cite Project DOI

(2021). Fairness in ERC token markets: A Case Study of CryptoKitties. In Proc. of Financial Cryptography and Data Security 2021.

PDF Project

(2021). Short Paper: Selfish Mining Attacks Exacerbated by Elastic Hash Supply. In FC 2021.

PDF Project Video

(2021). Fairness in ERC token markets: A Case Study of CryptoKitties. arXiv.org.

PDF Cite Project DOI

(2021). Auction Type Resolution on Smart Derivatives. arXiv.org.

PDF Cite Project DOI

(2021). Smart Auto Insurance: High Resolution, Dynamic, Privacy-Driven, Telematic Insurance. arXiv.

PDF Cite Project DOI

(2020). Proof of No-Work: How to Incentivize Individuals to Stay at Home. In CBT 2020.

PDF Cite Project Video DOI

(2020). Call for Multi-Stakeholder Communication to Establish a Governance Mechanism for the Emerging Blockchain-Based Financial Ecosystem, Part 2 of 2. Stanford Journal of Blockchain Law and Policy.

PDF Cite Project

(2020). Consideration on better tokenization practices and regulations concerning investor protection. CAPCO Journal 51 WEALTH & ASSET MANAGEMENT.

PDF Cite Project

(2020). How to Dynamically Incentivize Sufficient Level of IoT Security. In Proc. of 4th Workshop on Trusted Smart Contracts, a workshop of Financial Cryptography and Data Security 2020..

PDF Cite Project DOI

(2020). Call for Multi-Stakeholder Communication to Establish a Governance Mechanism for the Emerging Blockchain-Based Financial Ecosystem, Part 1 of 2. Stanford Journal of Blockchain Law and Policy.

PDF Cite Project

(2014). A Non-repudiable Negotiation Protocol for Security Service Level Agreements. International Journal of Communication Systems.

PDF Cite DOI

(2014). A Secure Genetic Algorithm for the Subset Cover Problem and its Application to Privacy Protection. Workshop in Information Security Theory and Practice Series.

PDF Cite DOI

(2014). Tailored Security: Building Nonrepudiable Security Service-Level Agreements. arXiv.org.

PDF DOI

(2014). Expressing Security Requirements: Usability of Taxonomy-Based Requirement Identification Scheme. SERVICES 2014.

PDF Cite DOI

(2014). Relations among Notions of Privacy for RFID Authentication Protocols. IEICE Transactions of Fundamentals, E-97A (January 01, 2014).

PDF Cite DOI

(2013). Toward Practical Searchable Symmetric Encryption. IWSEC 2013: Lecture Notes in Computer Science 8231.

PDF Cite DOI

(2013). PUF-Based RFID Authentication Secure and Private under Memory Leakage. IACR Eprint archive.

PDF Cite

(2013). Tailored Security: Building Nonrepudiable Security Service-Level Agreements. In IEEE VT magazine, Vol 8. No. 3 (2013).

PDF Cite DOI

(2013). A Forward Privacy Model for RFID Authentication Protocols. WISTP 2013, Lecture Notes in Computer Science 7886.

PDF Cite DOI

(2013). Risk Visualization and Alerting System: Architecture and Proof-of-Concept Implementation. Proceedings of the first international workshop on Security in embedded systems and smartphones: SESP 2013.

PDF Cite DOI

(2013). Accountable Security Mechanism based on Security Service Level Agreement. In ISCC 2013.

PDF Cite DOI

(2012). Mobile Device Trust: How do we link social needs, technical requirements techniques and standards?. INTRUST 2012, Lecture Notes in Computer Science 7711.

PDF Cite DOI

(2012). Relations among Notions of Privacy for RFID Authentication Protocols. In ESORICS 2012.

PDF Cite DOI

(2012). Visualization of user's end-to-end security risks. Symposium On Usable Privacy and Security (SOUPS) 2012.

PDF Cite

(2012). Prototype System for Visualizing Security Risks on Mobile Device. Symposium On Usable Privacy and Security (SOUPS) 2012.

PDF Cite

(2012). An Accountable Security Mechanisms in Light of Security Service Level Agreement. WWRF 2012.

PDF Cite

(2012). Enabling secure multitenancy in cloud computing: Challenges and approaches. In BCFIC 2012.

PDF Cite

(2012). Solving a 676-Bit Discrete Logarithm Problem in $GF(3^{6n})$. IEICE Transactions of Fundamentals, 95A-1 (January 01, 2012): 204-212.

PDF Cite DOI

(2011). Relation among the Security Models for RFID Authentication Protocol. In Proceedings of ECRYPT Workshop on Lightweight Cryptography,2011.

Slides

(2011). Multifactor Authenticated Key Renewal. INTRUST 2011: Lecture Notes in Computer Science 7222, pp.204-220. Springer Verlag, 2011.

PDF Cite DOI

(2011). Security/Privacy Models for Internet of things: What should be studied from RFID-schemes?. NIST Workshop on Cryptography for Emerging Technologies and Applications, 2011.

(2011). A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication. Financial Cryptography Workshops 2011: Lecture Notes in Computer Science 7126, pp. 70-87. Springer Verlag, 2011.

PDF Cite DOI

(2010). Leakage Resilient Strong Key-Insulated Signatures in Public Channel. INTRUST 2010: Lecture Notes in Computer Science 6802, pp. 160-172. Springer Verlag, 2010.

PDF Cite DOI

(2010). How Can We Conduct Fair and Consistent Hardware Evaluation for SHA-3 Candidate?. NIST Second SHA-3 Candidate Workshop, 2010.

PDF Cite

(2010). Robust RFID Authentication Protocol with Formal Proof and Its Feasibility. IACR Eprint archive.

PDF Cite

(2010). Prototyping Platform for Performance Evaluation of SHA-3 Candidates. In HOST 2010.

PDF Cite DOI

(2010). Fair and Consistent Hardware Evaluation of Fourteen Round Two SHA-3 Candidates. In HOST 2010.

PDF Cite DOI

(2010). Leakage-Resilient RFID Authentication with Forward-Privacy. RFIDSec 2010: Lecture Notes in Computer Science 6370, pp. 176-188. Springer Verlag, 2010.

PDF Cite DOI

(2010). Solving a 676-Bit Discrete Logarithm Problem in GF(3^{6n}). Public Key Cryptography 2010: Lecture Notes in Computer Science 6056, pp. 351-367. Springer Verlag, 2010..

PDF Cite DOI

(2010). Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII. IACR Eprint archive.

PDF Cite

(2010). How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC. Financial Cryptography Workshops 2010: Lecture Notes in Computer Science 6054, pp. 182-194. Springer Verlag, 2010.

PDF Cite DOI

(2010). Evaluation of Hardware Performance for the SHA-3 Candidates Using SASEBO-GII. IACR Eprint archive.

PDF Cite

(2008). Classification of Hash Functions Suitable for Real-life Systems. IEICE Transaction of Fundamentals, Vol.E91-A No.1 (January 01, 2008).

PDF Cite DOI

(2006). Classification of Hash Functions Suitable for Real-life Systems. In Proceedings of NIST 2nd Cryptographic Hash Function Workshop, Santa Barbara, USA: , 2006..

PDF

(2005). On Universal Composable Security of Time-stamping Protocol. Applied Public Key Infrastructure - 4th International Workshop: IWAP 2005, pp.169-181. IOS Press, 2005.

PDF Cite

(2005). On Universal Composable Security of Time-Stamping Protocols. IACR Eprint archive.

PDF Cite

(2005). Efficient Divisible Voting Scheme. IEICE Transaction of Fundamentals, Vol.E88-A No.1 (January 01, 2005): pp.230-238.

PDF Cite DOI

(2004). User-side Forward-dating Attack on Time-stamping Protocols. In Proceedings of The Third International Workshop for Applied PKI, 2004, 2004..

Slides

(2003). Divisible Voting Scheme. In Proceedings of Information Security Conference (ISC) 2003, Lecture Notes in Computer Science 2851, pp.137-150. Bristol, UK: Springer Verlag, 2003.

PDF Cite DOI

(2003). Brief Announcement: A Method for Exchanging Valuable Data: How to Realize Matching Oblivious Transfer. In Proceedings of ACM Symposium on Principles of Distributed Computing (PODC) 2003, pp. 201. Boston USA: ACM, 2003.

PDF Cite DOI

(2003). Divisible Voting Scheme. IACR Eprint archive.

PDF Cite

(2003). Matching Oblivious Transfer: How to Exchange Valuable Data. IEICE Transaction of Fundamentals, Vol.E86-A No.1 (January 01, 2003): pp.189-193..

PDF Cite DOI

(2003). Electronic Ticket Scheme For ITS. IEICE Transaction of Fundamentals, Vol.E86-A No.1 (January 01, 2003): pp.142-150.

PDF DOI

(2001). Electronic Ticket for ITS. Proceedings of 8th ITS World Congress, 2001..

(2001). Electronic Ticket for ITS. In Proceedings of Wireless Personal Mobile Communication (WPMC) 2001, pp.717-722. Aalborg, Denmark: , 2001.

(2001). Secure Protocol to Construct Electronic Trading. IEICE Transaction of Fundamentals, Vol.E84-A No.1 (January 01, 2001): pp.281-288..

PDF Cite