An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication MPC Fossorier, MJ Mihaljević, H Imai, Y Cui, K Matsuura Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006 | 96 | 2006 |
Efficient hybrid encryption from ID-based encryption M Abe, Y Cui, H Imai, E Kiltz Designs, Codes and Cryptography 54, 205-240, 2010 | 43 | 2010 |
Lightweight asymmetric privacy-preserving authentication protocols secure against active attack Y Cui, K Kobara, K Matsuura, H Imai Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007 | 39 | 2007 |
Relations among notions of security for identity based encryption schemes N Attrapadung, Y Cui, D Galindo, G Hanaoka, I Hasuo, H Imai, ... Latin American Symposium on Theoretical Informatics, 130-141, 2006 | 30 | 2006 |
Formal security treatments for signatures from identity-based encryption Y Cui, E Fujisaki, G Hanaoka, H Imai, R Zhang Provable Security: First International Conference, ProvSec 2007, Wollongong …, 2007 | 21 | 2007 |
Large scale field experimental trial of downlink TDD Massive MIMO at the 4.5 GHz band Y Saito, A Benjebbour, Y Kishiyama, X Wang, X Hou, H Jiang, L Lu, ... 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 1-5, 2017 | 19 | 2017 |
Formal security treatments for IBE-to-signature transformation: Relations among security notions Y Cui, E Fujisaki, G Hanaoka, H Imai, R Zhang IEICE transactions on fundamentals of electronics, communications and …, 2009 | 19 | 2009 |
Field trial on millimeter wave integrated access and backhaul T Tian, Y Dou, G Ren, L Gu, J Chen, Y Cui, T Takada, M Iwabuchi, ... 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), 1-5, 2019 | 18 | 2019 |
Lightweight broadcast authentication protocols reconsidered S Yamakawa, Y Cui, K Kobara, H Imai 2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009 | 17 | 2009 |
Evaluation of coverage and mobility for URLLC via outdoor experimental trials M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ... 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018 | 14 | 2018 |
5G field experimental trial on frequency domain multiplexing of mixed numerology M Iwabuchi, A Benjebbour, Y Kishiyama, D Wu, T Tian, L Gu, Y Cui, ... 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 1-5, 2017 | 14 | 2017 |
Privacy enhanced RFID using Quasi-Dyadic fix domain shrinking T Sekino, Y Cui, K Kobara, H Imai 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 11 | 2010 |
The practicality of the keyword search using pir R Yoshida, Y Cui, R Shigetomi, H Imai 2008 International Symposium on Information Theory and Its Applications, 1-6, 2008 | 11 | 2008 |
Outdoor experimental trials of long range mobile communications using 39 GHz A Benjebbour, M Iwabuchi, Y Kishiyama, W Guangjian, L Gu, Y Cui, ... 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018 | 10 | 2018 |
Practical searching over encrypted data by private information retrieval R Yoshida, Y Cui, T Sekino, R Shigetomi, A Otsuka, H Imai 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 10 | 2010 |
5G experimental trials for ultra-reliable and low latency communications using new frame structure M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ... IEICE Transactions on Communications 102 (2), 381-390, 2019 | 9 | 2019 |
A generic conversion with optimal redundancy Y Cui, K Kobara, H Imai Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005 | 7 | 2005 |
On the key-privacy issue of McEliece public-key encryption S Yamakawa, Y Cui, K Kobara, M Hagiwara, H Imai Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 17th …, 2007 | 6 | 2007 |
Outdoor experiments on long-range and mobile communications using 39-ghz band for 5g and beyond M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ... IEICE Transactions on Communications 102 (8), 1437-1446, 2019 | 5 | 2019 |
On achieving chosen ciphertext security with decryption errors Y Cui, K Kobara, H Imai Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th …, 2006 | 5 | 2006 |