default search action
Daisuke Moriyama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j5]Daisuke Moriyama:
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 130-138 (2016) - [j4]Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont:
Compact and low-power ASIP design for lightweight PUF-based authentication protocols. IET Inf. Secur. 10(5): 232-241 (2016) - [c12]Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung:
Towards a Unified Security Model for Physically Unclonable Functions. CT-RSA 2016: 271-287 - [i3]Frederik Armknecht, Daisuke Moriyama, Ahmad-Reza Sadeghi, Moti Yung:
Towards a Unified Security Model for Physically Unclonable Functions. IACR Cryptol. ePrint Arch. 2016: 33 (2016) - 2015
- [c11]Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung:
End-To-End Design of a PUF-Based Privacy Preserving Authentication Protocol. CHES 2015: 556-576 - [c10]Daisuke Moriyama, Moti Yung:
The bright side arguments for the coming smartphones crypto war: The added value of device encryption. CNS 2015: 65-73 - [i2]Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont, Moti Yung:
End-to-end Design of a PUF-based Privacy Preserving Authentication Protocol. IACR Cryptol. ePrint Arch. 2015: 937 (2015) - 2014
- [j3]Daisuke Moriyama, Shin'ichiro Matsuo, Miyako Ohkubo:
Relations among Notions of Privacy for RFID Authentication Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 225-235 (2014) - [c9]Daisuke Moriyama:
A Provably Secure Offline RFID Yoking-Proof Protocol with Anonymity. LightSec 2014: 155-167 - [c8]Daisuke Moriyama:
Provably secure two-round RFID grouping proof protocols. RFID-TA 2014: 272-276 - 2013
- [c7]Daisuke Moriyama:
Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol. LightSec 2013: 114-129 - [c6]Daisuke Moriyama:
An RFID authentication protocol with flexible path authentication. RFID-TA 2013: 1-6 - [c5]Daisuke Moriyama, Miyako Ohkubo, Shin'ichiro Matsuo:
A Forward Privacy Model for RFID Authentication Protocols. WISTP 2013: 98-111 - [i1]Daisuke Moriyama, Shin'ichiro Matsuo, Moti Yung:
PUF-Based RFID Authentication Secure and Private under Complete Memory Leakage. IACR Cryptol. ePrint Arch. 2013: 712 (2013) - 2012
- [c4]Daisuke Moriyama, Shin'ichiro Matsuo, Miyako Ohkubo:
Relations among Notions of Privacy for RFID Authentication Protocols. ESORICS 2012: 661-678 - 2011
- [j2]Daisuke Moriyama, Hiroshi Doi:
A Fully Secure Spatial Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 28-35 (2011) - [j1]Daisuke Moriyama, Tatsuaki Okamoto:
An eCK-secure Authenticated Key Exchange Protocol without Random Oracles. KSII Trans. Internet Inf. Syst. 5(3): 607-625 (2011) - [c3]Daisuke Moriyama, Tatsuaki Okamoto:
Leakage resilient eCK-secure key exchange protocol without random oracles. AsiaCCS 2011: 441-447 - [c2]Shin'ichiro Matsuo, Daisuke Moriyama, Moti Yung:
Multifactor Authenticated Key Renewal. INTRUST 2011: 204-220
2000 – 2009
- 2009
- [c1]Daisuke Moriyama, Tatsuaki Okamoto:
An eCK-Secure Authenticated Key Exchange Protocol without Random Oracles. ProvSec 2009: 154-167
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint