default search action
Yuta Kodera
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Le Hoang Anh, Yuta Kawada, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami:
ELiPS-based Ciphertext-Policy Attribute-Based Encryption. Int. J. Netw. Comput. 14(2): 186-205 (2024) - [j14]Md. Biplob Hossain, Maya Rahayu, Md. Arshad Ali, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
A Blockchain-based Approach with zk-SNARKs for Secure Email Applications. Int. J. Netw. Comput. 14(2): 225-247 (2024) - [j13]Muhammad Bisri Musthafa, Samsul Huda, Yuta Kodera, Md. Arshad Ali, Shunsuke Araki, Jedidah Mwaura, Yasuyuki Nogami:
Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques. Sensors 24(13): 4293 (2024) - [c45]Muhammad Bisri Musthafa, Samsul Huda, S. M. Shamim, Yuta Kodera, Jedidah Mwaura, Shunsuke Araki, Yasuyuki Nogami:
A Deployment of Ensemble-Based IDS on Raspberry Pi. GCCE 2024: 184-185 - [c44]Maya Rahayu, Md. Biplob Hossain, Samsul Huda, Md. Arshad Ali, Yuta Kodera, Yasuyuki Nogami:
An In-depth Analysis of Kerberos and Blockchain Integration on VANETs' Security and Performance. ICCE-Taiwan 2024: 391-392 - [c43]Shunri Kudo, Yasuyuki Nogami, Samsul Huda, Yuta Kodera:
Optimizing CRYSTALS-Dilithium in Rust: Radix-4 NTT and Assembly-level Comparison with Official C Implementation. ICCE-Taiwan 2024: 395-396 - [c42]Taichi Saito, Yixuan He, Samsul Huda, Junting Xiao, Yuta Kodera, Yasuyuki Nogami:
A Study to Improve Calculation Efficiency of CKKS Encoding with Parallelization. ICCE-Taiwan 2024: 397-398 - [c41]Sou Kumagai, Shota Kanzawa, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys. ICCE-Taiwan 2024: 585-586 - [c40]Muhammad Bisri Musthafa, Samsul Huda, Ali Md. Arshad, Yuta Kodera, Yasuyuki Nogami:
Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM. ICCE 2024: 1-5 - 2023
- [j12]Yuta Kodera:
Period and Some Distribution Properties of a Nonlinear Filter Generator with Dynamic Mapping. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(12): 1511-1515 (2023) - [j11]Kazuma Ikesaka, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Improvement of Miller Loop for a Pairing on FK12 Curve and Evaluation with other STNFS Curves. Int. J. Netw. Comput. 13(2): 242-257 (2023) - [c39]Md. Biplob Hossain, Maya Rahayu, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application. CANDARW 2023: 195-201 - [c38]Le Hoang Anh, Yuta Kawada, Samsul Huda, Ali Md. Arshad, Yuta Kodera, Yasuyuki Nogami:
An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption. CANDARW 2023: 220-226 - [c37]Tetsuro Ishida, Kazuma Ikesaka, Ali Md. Arshad, Yasuyuki Nogami, Yuta Kodera:
A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive Operation. CANDARW 2023: 227-231 - [c36]Maya Rahayu, Md. Biplob Hossain, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Yasuyuki Nogami:
An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology. CANDARW 2023: 260-266 - [c35]Muhammad Bisri Musthafa, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System. ICCE-Taiwan 2023: 285-286 - [c34]Yuki Takeuchi, Itsuki Maebayashi, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera:
A Consideration of Parameters for a Nonlinear Filter Generator and its Linear Complexity Profile. ICCE-Taiwan 2023: 345-346 - [c33]Itsuki Maebayashi, Yuki Takeuchi, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera:
A modified M-sequence with dynamic mapping and its autocorrelation. ICCE-Taiwan 2023: 347-348 - [c32]Akane Miyoshi, Kazuma Ikesaka, Ali Md. Arshad, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Consideration of Averaging the Calculation Cost of CVMA for A Secure Session based Data Transmission. ICCE-Taiwan 2023: 493-494 - [c31]Takuro Manabe, Ken Ikuta, Sho Joichi, Hiromasa Miura, Shota Kanzawa, Yasuyuki Nogami, Yuta Kodera, Takuya Kusaka:
An Attack for a 116bit ECDLP for a Barreto-Naehrig Curve. ICCE-Taiwan 2023: 527-528 - [c30]Masakazu Awakiahra, Jun Miura, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera:
A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime. ICCE-Taiwan 2023: 541-542 - [c29]Itsuki Maebayashi, Yuki Takeuchi, Md. Arshad Ali, Yasuyuki Nogami, Yuta Kodera:
Existence of Equivalent Keys in a Random Number Generator with Field Trace and a Dynamic Mapping. MobiSec 2023: 109-120 - 2022
- [j10]Yuta Kodera, Ryoichi Sato, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami:
Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs. Entropy 24(6): 780 (2022) - [j9]Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Efficient Final Exponentiation for Cyclotomic Families of Pairing-Friendly Elliptic Curves with Any Prime Embedding Degrees. Int. J. Netw. Comput. 12(2): 317-338 (2022) - [j8]Hiroaki Nasu, Yuta Kodera, Yasuyuki Nogami:
A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain. Sensors 22(13): 4909 (2022) - [c28]Kazuma Ikesaka, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation. CANDAR 2022: 104-109 - [c27]Shota Kanzawa, Hiromasa Miura, Yasuyuki Nogami, Yuta Kodera, Takuya Kusaka:
A Method to Eliminate Fruitless Cycles for Pollard's Rho Method by Splitting a Seed-point Table for a Random Walk. CANDAR 2022: 110-116 - [c26]Tomohiro Iida, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates. CANDARW 2022: 309-315 - 2021
- [j7]Ryoichi Sato, Yuta Kodera, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Robert H. Morelos-Zaragoza:
Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators. Entropy 23(9): 1168 (2021) - [j6]Hiromasa Miura, Syota Kanzawa, Rikuya Matsumura, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Sophisticated analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve. Int. J. Netw. Comput. 11(2): 231-250 (2021) - [c25]Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS. CANDAR 2021: 48-55 - [c24]Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees. CANDAR 2021: 148-154 - [c23]Masaki Nakanose, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Consideration of the side-channel attack to SPECK implemented on Arduino Uno. CANDAR (Workshops) 2021: 339-345 - [c22]Harunobu Enami, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Consideration of the side-channel attack to SIMON implemented on Arduino Uno. CANDAR (Workshops) 2021: 412-415 - [c21]Taiki Miyamoto, Ryo Fukushima, Kazuaki Harada, Keiji Yoshimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Property Management System Using Image Recognition by YOLO. ICCE-TW 2021: 1-2 - [c20]Hiroaki Nasu, Yuta Kodera, Yasuyuki Nogami:
Secure Comparison Protocol for Promoting Business to Business Collaboration on the Blockchain. ICCE-TW 2021: 1-2 - [c19]Ryoichi Sato, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Proposal for Testing Physical Random Numbers Using Stochastic Process. ICCE-TW 2021: 1-2 - [c18]Keiji Yoshimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Consideration of Generating Suitable Parameters for Constructing type (h, m) Gauss Period Normal Basis. ICCE-TW 2021: 1-2 - 2020
- [j5]Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist. Int. J. Netw. Comput. 10(2): 144-158 (2020) - [c17]Yuta Kodera, Tomoya Tatara, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara:
A Parallel Blum-Micali Generator Based on the Gauss Periods. ISITA 2020: 447-450 - [c16]Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara:
Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol. IWSEC 2020: 23-36 - [c15]Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator. SVCC 2020: 38-48
2010 – 2019
- 2019
- [j4]Yuta Kodera, Ali Md. Arshad, Takeru Miyazaki, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza:
Algebraic Group Structure of the Random Number Generator: Theoretical Analysis of NTU Sequence(s). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 1659-1667 (2019) - [j3]Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami:
Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages. Int. J. Netw. Comput. 9(2): 171-187 (2019) - [c14]Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami:
Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-Box. CANDAR 2019: 157-163 - [c13]Yoshinori Uetake, Keiji Yoshimoto, Yuta Kodera, Leo Weissbart, Takuya Kusaka, Yasuyuki Nogami:
A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller. CANDAR 2019: 225-231 - [c12]Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library. CANDAR 2019: 245-250 - [c11]Yuki Taketa, Yuta Kodera, Shogo Tanida, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi, Satoshi Uehara:
Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence. CANDAR Workshops 2019: 394-400 - [c10]Shinichi Kageyama, Ken Ikuta, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code. CANDAR Workshops 2019: 425-429 - [c9]Fatema Akhter, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka:
NIST Statistical Test for Random Sequence Generated by Möbius Function. ICCE-TW 2019: 1-2 - [c8]Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Boundary for the Linear Complexity of Well Balanced NTU. ICCE-TW 2019: 1-2 - [c7]Tomoya Tatara, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Consideration on Generating Uniform Binary Sequence with High Linear Complexity. ICCE-TW 2019: 1-2 - 2018
- [j2]Yuta Kodera, Takeru Miyazaki, Md. Al-Amin Khandaker, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara:
Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1525-1536 (2018) - [j1]Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami:
An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno. Int. J. Netw. Comput. 8(2): 341-350 (2018) - [c6]Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami:
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage. CANDAR Workshops 2018: 292-297 - [c5]Ali Md. Arshad, Yuta Kodera, Shoji Heguri, Takuya Kusaka, Satoshi Uehara, Robert H. Morelos-Zaragoza:
Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field. ICIT 2018: 92-96 - [c4]Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami:
A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher. WISA 2018: 241-252 - 2017
- [c3]Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami:
An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller. CANDAR 2017: 445-450 - [c2]Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara:
An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom Sequence. CANDAR 2017: 451-455 - [c1]Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera:
Efficient Optimal Ate Pairing at 128-Bit Security Level. INDOCRYPT 2017: 186-205 - [i1]Md. Al-Amin Khandaker, Yuki Nanjo, Loubna Ghammam, Sylvain Duquesne, Yasuyuki Nogami, Yuta Kodera:
Efficient Optimal Ate Pairing at 128-bit Security Level. IACR Cryptol. ePrint Arch. 2017: 1174 (2017)
Coauthor Index
aka: Ali Md. Arshad
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 19:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint