Search Results - "Kodera, Yuta"

Refine Results
  1. 1

    A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain by Nasu, Hiroaki, Kodera, Yuta, Nogami, Yasuyuki

    Published in Sensors (Basel, Switzerland) (29-06-2022)
    “…Ensuring the reliability of data gathering from every connected device is an essential issue for promoting the advancement of the next paradigm shift, i.e.,…”
    Get full text
    Journal Article
  2. 2

    Optimizing IoT Intrusion Detection Using Balanced Class Distribution, Feature Selection, and Ensemble Machine Learning Techniques by Musthafa, Muhammad Bisri, Huda, Samsul, Kodera, Yuta, Ali, Md Arshad, Araki, Shunsuke, Mwaura, Jedidah, Nogami, Yasuyuki

    Published in Sensors (Basel, Switzerland) (01-07-2024)
    “…Internet of Things (IoT) devices are leading to advancements in innovation, efficiency, and sustainability across various industries. However, as the number of…”
    Get full text
    Journal Article
  3. 3

    Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs by Kodera, Yuta, Sato, Ryoichi, Ali, Md Arshad, Kusaka, Takuya, Nogami, Yasuyuki

    Published in Entropy (Basel, Switzerland) (31-05-2022)
    “…A ring oscillator is a well-known circuit used for generating random numbers, and interested readers can find many research results concerning the evaluation…”
    Get full text
    Journal Article
  4. 4

    Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators by Sato, Ryoichi, Kodera, Yuta, Ali, Md. Arshad, Kusaka, Takuya, Nogami, Yasuyuki, Morelos-Zaragoza, Robert H.

    Published in Entropy (Basel, Switzerland) (05-09-2021)
    “…A cloud service to offer entropy has been paid much attention to. As one of the entropy sources, a physical random number generator is used as a true random…”
    Get full text
    Journal Article
  5. 5

    Improvement of Final Exponentiation for a Pairing on FK12 Curve and its Implementation by Ikesaka, Kazuma, Nanjo, Yuki, Kodera, Yuta, Kusaka, Takuya, Nogami, Yasuyuki

    “…Pairings on elliptic curves are used for innovative protocols such as ID-based encryption and zk-SNARKs. To make the pairings secure, it is important to…”
    Get full text
    Conference Proceeding
  6. 6

    An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption by Anh, Le Hoang, Kawada, Yuta, Huda, Samsul, Ali, Md. Arshad, Kodera, Yuta, Nogami, Yasuyuki

    “…Pairing-based cryptography serves as a fundamental building block for a wide range of advanced cryptographic protocols, including Ciphertext-Policy…”
    Get full text
    Conference Proceeding
  7. 7

    Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS by Nanjo, Yuki, Shirase, Masaaki, Kodera, Yuta, Kusaka, Takuya, Nogami, Yasuyuki

    “…Pairings on elliptic curves are exploited for pairing-based cryptography, e.g., ID-based encryption and group signature authentication. For secure…”
    Get full text
    Conference Proceeding
  8. 8

    A Comparison of Relic-toolkit and ELiPS Libraries for a Pairing-based Homomorphic Encryption by Kanenari, Tadaki, Takahashi, Yuto, Hashimoto, Yuta, Kodera, Yuta, Kusaka, Takuya, Nogami, Yasuyuki, Nakanishi, Toru

    “…In recent years, the number of companies are adopting cloud computing service for outsourcing is increasing. On the other hand, there are threats that are like…”
    Get full text
    Conference Proceeding
  9. 9

    Distribution of bit patterns on multi-value sequence over odd characteristics field by Kodera, Yuta, Miyazaki, Takeru, Khandaker, Md Al-Amin, Arshad, Ali Md, Nogami, Yasuyuki, Uehara, Satoshi

    “…The Internet of Things (IoT) provides much convenient life for us, at the same time it has brought threats for our privacy. In this context, secure and…”
    Get full text
    Conference Proceeding
  10. 10

    Evaluation of IDS model by improving accuracy and reducing overfitting using stacking LSTM by Musthafa, Muhammad Bisri, Huda, Samsul, Ali, Md. Arshad, Kodera, Yuta, Nogami, Yasuyuki

    “…Utilizing Machine Learning (ML) techniques to construct models for Intrusion Detection Systems (IDS) has emerged as a leading strategy to enhance security…”
    Get full text
    Conference Proceeding
  11. 11

    Optimizing CRYSTALS-Dilithium in Rust: Radix-4 NTT and Assembly-level Comparison with Official C Implementation by Kudo, Shunri, Nogami, Yasuyuki, Huda, Samsul, Kodera, Yuta

    “…Post-Quantum Cryptography (PQC) is becoming popular since it offers protection against quantum attacks. CRYSTALS-Dilithium is being considered as a promising…”
    Get full text
    Conference Proceeding
  12. 12

    Investigating Vulnerabilities in RSA-like Cryptosystems Through Lattice-based Attacks on Small Exponent Keys by Kumagai, Sou, Kanzawa, Shota, Huda, Samsul, Kodera, Yuta, Nogami, Yasuyuki

    “…RSA-like cryptosystems, based on the original RSA algorithm, are gaining attention as potential alternatives to traditional techniques. They offer better…”
    Get full text
    Conference Proceeding
  13. 13

    Method to Eliminate Fruitless Cycles for Pollard's Rho Method with Splitting Table by Kanzawa, Shota, Manabe, Takuro, Kodera, Yuta, Nogami, Yasuyuki, Kusaka, Takuya

    “…This research focuses on attacks against a type of curve suitable for pairing, called Barreto-Naehring curves. The accelerated attack will evaluate the level…”
    Get full text
    Conference Proceeding
  14. 14

    Secure Comparison Protocol for Promoting Business to Business Collaboration on the Blockchain by Nasu, Hiroaki, Kodera, Yuta, Nogami, Yasuyuki

    “…To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain technology is…”
    Get full text
    Conference Proceeding
  15. 15

    Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates by Iida, Tomohiro, Ikesaka, Kazuma, Kodera, Yuta, Kusaka, Takuya, Nogami, Yasuyuki

    “…In recent years, several advanced cryptographic protocols that provides practical security and privacy features have been proposed. Pairing-based cryptography…”
    Get full text
    Conference Proceeding
  16. 16

    Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation by Ikesaka, Kazuma, Nanjo, Yuki, Kodera, Yuta, Kusaka, Takuya, Nogami, Yasuyuki

    “…Pairing is carried out by two steps, Miller loop and final exponentiation. In this manuscript, the authors propose an efficient Miller loop for a pairing on…”
    Get full text
    Conference Proceeding
  17. 17

    A Method to Eliminate Fruitless Cycles for Pollard's Rho Method by Splitting a Seed-point Table for a Random Walk by Kanzawa, Shota, Miura, Hiromasa, Nogami, Yasuyuki, Kodera, Yuta, Kusaka, Takuya

    “…The most efficient method for solving ECDLP is the Pollard-Rho method, which is known to be more efficient in solving ECDLP by using skew Frobenius mapping and…”
    Get full text
    Conference Proceeding
  18. 18

    An In-depth Analysis of Kerberos and Blockchain Integration on VANETs' Security and Performance by Rahayu, Maya, Hossain, Md. Biplob, Huda, Samsul, Ali, Md. Arshad, Kodera, Yuta, Nogami, Yasuyuki

    “…Vehicular Ad-Hoc Networks (VANETs) are essential for modern transportation systems, but their openness exposes them to cyber threats. Authentication in VANETs…”
    Get full text
    Conference Proceeding
  19. 19

    A Study to Improve Calculation Efficiency of CKKS Encoding with Parallelization by Saito, Taichi, Yixuan, He, Huda, Samsul, Xiao, Junting, Kodera, Yuta, Nogami, Yasuyuki

    “…CKKS homomorphic encryption is frequently utilized in cloud-based applications due to its ability to handle both real and complex numbers, ensuring the…”
    Get full text
    Conference Proceeding
  20. 20

    SnapSafe: Enabling Selective Image Privacy Through YOLO and AES-Protected Facial Encryption with QR Code by Santoso, Andri, Huda, Samsul, Nguyen, Tuy Tan, Kodera, Yuta, Nogami, Yasuyuki

    “…In the digital age, organizations commonly use photos to share their activities for brand visibility. However, it is crucial to safeguard the facial…”
    Get full text
    Conference Proceeding