An algorithm for solving the LPN problem and its application to security evaluation of the HB protocols for RFID authentication MPC Fossorier, MJ Mihaljević, H Imai, Y Cui, K Matsuura Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006 | 102 | 2006 |
Efficient hybrid encryption from ID-based encryption M Abe, Y Cui, H Imai, E Kiltz Designs, Codes and Cryptography 54, 205-240, 2010 | 45 | 2010 |
Lightweight asymmetric privacy-preserving authentication protocols secure against active attack Y Cui, K Kobara, K Matsuura, H Imai Fifth Annual IEEE International Conference on Pervasive Computing and …, 2007 | 39 | 2007 |
Relations among notions of security for identity based encryption schemes N Attrapadung, Y Cui, D Galindo, G Hanaoka, I Hasuo, H Imai, ... Latin American Symposium on Theoretical Informatics, 130-141, 2006 | 33 | 2006 |
Field trial on millimeter wave integrated access and backhaul T Tian, Y Dou, G Ren, L Gu, J Chen, Y Cui, T Takada, M Iwabuchi, ... 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), 1-5, 2019 | 20 | 2019 |
Formal security treatments for IBE-to-signature transformation: Relations among security notions Y Cui, E Fujisaki, G Hanaoka, H Imai, R Zhang IEICE transactions on fundamentals of electronics, communications and …, 2009 | 20 | 2009 |
Formal security treatments for signatures from identity-based encryption Y Cui, E Fujisaki, G Hanaoka, H Imai, R Zhang Provable Security: First International Conference, ProvSec 2007, Wollongong …, 2007 | 20 | 2007 |
Large scale field experimental trial of downlink TDD Massive MIMO at the 4.5 GHz band Y Saito, A Benjebbour, Y Kishiyama, X Wang, X Hou, H Jiang, L Lu, ... 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 1-5, 2017 | 19 | 2017 |
Lightweight broadcast authentication protocols reconsidered S Yamakawa, Y Cui, K Kobara, H Imai 2009 IEEE Wireless Communications and Networking Conference, 1-6, 2009 | 18 | 2009 |
5G field experimental trial on frequency domain multiplexing of mixed numerology M Iwabuchi, A Benjebbour, Y Kishiyama, D Wu, T Tian, L Gu, Y Cui, ... 2017 IEEE 85th Vehicular Technology Conference (VTC Spring), 1-5, 2017 | 17 | 2017 |
Evaluation of coverage and mobility for URLLC via outdoor experimental trials M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ... 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018 | 15 | 2018 |
Privacy enhanced RFID using Quasi-Dyadic fix domain shrinking T Sekino, Y Cui, K Kobara, H Imai 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 11 | 2010 |
Practical searching over encrypted data by private information retrieval R Yoshida, Y Cui, T Sekino, R Shigetomi, A Otsuka, H Imai 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 11 | 2010 |
The practicality of the keyword search using pir R Yoshida, Y Cui, R Shigetomi, H Imai 2008 International Symposium on Information Theory and Its Applications, 1-6, 2008 | 11 | 2008 |
Outdoor experimental trials of long range mobile communications using 39 GHz A Benjebbour, M Iwabuchi, Y Kishiyama, W Guangjian, L Gu, Y Cui, ... 2018 IEEE 87th Vehicular Technology Conference (VTC Spring), 1-5, 2018 | 10 | 2018 |
5G experimental trials for ultra-reliable and low latency communications using new frame structure M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ... IEICE Transactions on Communications 102 (2), 381-390, 2019 | 9 | 2019 |
A generic conversion with optimal redundancy Y Cui, K Kobara, H Imai Topics in Cryptology–CT-RSA 2005: The Cryptographers’ Track at the RSA …, 2005 | 7 | 2005 |
Outdoor experiments on long-range and mobile communications using 39-GHz band for 5G and beyond M Iwabuchi, A Benjebbour, Y Kishiyama, G Ren, C Tang, T Tian, L Gu, ... IEICE Transactions on Communications 102 (8), 1437-1446, 2019 | 6 | 2019 |
Tag-KEM from set partial domain one-way permutations M Abe, Y Cui, H Imai, K Kurosawa IEICE transactions on fundamentals of electronics, communications and …, 2009 | 6 | 2009 |
Lightweight privacy-preserving authentication protocols secure against active attack in an asymmetric way Y Cui, K Kobara, K Matsuura, H Imai IEICE TRANSACTIONS on Information and Systems 91 (5), 1457-1465, 2008 | 6 | 2008 |