Sign in
Yuta Kodera
ORCID
Publication Activity (10 Years)
Years Active: 2017-2023
Publications (10 Years): 51
Top Topics
Security Level
Random Number
Linear Complexity
Lightweight
Top Venues
CANDAR
ICCE-TW
ICCE-Taiwan
Int. J. Netw. Comput.
</>
Publications
</>
Itsuki Maebayashi
,
Yuki Takeuchi
,
Ali Md. Arshad
,
Takuya Kusaka
,
Yasuyuki Nogami
,
Yuta Kodera
A modified M-sequence with dynamic mapping and its autocorrelation.
ICCE-Taiwan
(2023)
Yuta Kodera
Period and Some Distribution Properties of a Nonlinear Filter Generator with Dynamic Mapping.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
106 (12) (2023)
Maya Rahayu
,
Md. Biplob Hossain
,
Ali Md. Arshad
,
Samsul Huda
,
Yuta Kodera
,
Yasuyuki Nogami
An integrated secured vehicular ad-hoc network leveraging Kerberos authentication and Blockchain technology.
CANDARW
(2023)
Muhammad Bisri Musthafa
,
Ali Md. Arshad
,
Samsul Huda
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System.
ICCE-Taiwan
(2023)
Takuro Manabe
,
Ken Ikuta
,
Sho Joichi
,
Hiromasa Miura
,
Shota Kanzawa
,
Yasuyuki Nogami
,
Yuta Kodera
,
Takuya Kusaka
An Attack for a 116bit ECDLP for a Barreto-Naehrig Curve.
ICCE-Taiwan
(2023)
Le Hoang Anh
,
Yuta Kawada
,
Samsul Huda
,
Ali Md. Arshad
,
Yuta Kodera
,
Yasuyuki Nogami
An implementation of ELiPS-based Ciphertext-Policy Attribute-Based Encryption.
CANDARW
(2023)
Tetsuro Ishida
,
Kazuma Ikesamka
,
Ali Md. Arshad
,
Yasuyuki Nogami
,
Yuta Kodera
A Proposal of Solving NTRU Equation Using Matrix Representation Instead of Recursive Operation.
CANDARW
(2023)
Akane Miyoshi
,
Kazuma Ikesaka
,
Ali Md. Arshad
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
A Consideration of Averaging the Calculation Cost of CVMA for A Secure Session based Data Transmission.
ICCE-Taiwan
(2023)
Yuki Takeuchi
,
Itsuki Maebayashi
,
Ali Md. Arshad
,
Takuya Kusaka
,
Yasuyuki Nogami
,
Yuta Kodera
A Consideration of Parameters for a Nonlinear Filter Generator and its Linear Complexity Profile.
ICCE-Taiwan
(2023)
Masakazu Awakiahra
,
Jun Miura
,
Ali Md. Arshad
,
Takuya Kusaka
,
Yasuyuki Nogami
,
Yuta Kodera
A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime.
ICCE-Taiwan
(2023)
Md. Biplob Hossain
,
Maya Rahayu
,
Ali Md. Arshad
,
Samsul Huda
,
Yuta Kodera
,
Yasuyuki Nogami
A Smart Contract Based Blockchain Approach Integrated with Elliptic Curve Cryptography for Secure Email Application.
CANDARW
(2023)
Kazuma Ikesaka
,
Yuki Nanjo
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Improvement of Miller Loop for a Pairing on FK12 Curve and Evaluation with other STNFS Curves.
Int. J. Netw. Comput.
13 (2) (2023)
Yuta Kodera
,
Ryoichi Sato
,
Ali Md. Arshad
,
Takuya Kusaka
,
Yasuyuki Nogami
Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs.
Entropy
24 (6) (2022)
Shota Kanzawa
,
Hiromasa Miura
,
Yasuyuki Nogami
,
Yuta Kodera
,
Takuya Kusaka
A Method to Eliminate Fruitless Cycles for Pollard's Rho Method by Splitting a Seed-point Table for a Random Walk.
CANDAR
(2022)
Kazuma Ikesaka
,
Yuki Nanjo
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation.
CANDAR
(2022)
Yuki Nanjo
,
Masaaki Shirase
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Efficient Final Exponentiation for Cyclotomic Families of Pairing-Friendly Elliptic Curves with Any Prime Embedding Degrees.
Int. J. Netw. Comput.
12 (2) (2022)
Hiroaki Nasu
,
Yuta Kodera
,
Yasuyuki Nogami
A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain.
Sensors
22 (13) (2022)
Tomohiro Iida
,
Kazuma Ikesaka
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates.
CANDARW
(2022)
Ryoichi Sato
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
A Proposal for Testing Physical Random Numbers Using Stochastic Process.
ICCE-TW
(2021)
Yuki Nanjo
,
Masaaki Shirase
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS.
CANDAR
(2021)
Keiji Yoshimoto
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Consideration of Generating Suitable Parameters for Constructing type (h, m) Gauss Period Normal Basis.
ICCE-TW
(2021)
Hiroaki Nasu
,
Yuta Kodera
,
Yasuyuki Nogami
Secure Comparison Protocol for Promoting Business to Business Collaboration on the Blockchain.
ICCE-TW
(2021)
Harunobu Enami
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Consideration of the side-channel attack to SIMON implemented on Arduino Uno.
CANDAR (Workshops)
(2021)
Hiromasa Miura
,
Syota Kanzawa
,
Rikuya Matsumura
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Sophisticated analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve.
Int. J. Netw. Comput.
11 (2) (2021)
Yuki Nanjo
,
Masaaki Shirase
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees.
CANDAR
(2021)
Masaki Nakanose
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Consideration of the side-channel attack to SPECK implemented on Arduino Uno.
CANDAR (Workshops)
(2021)
Ryoichi Sato
,
Yuta Kodera
,
Ali Md. Arshad
,
Takuya Kusaka
,
Yasuyuki Nogami
,
Robert H. Morelos-Zaragoza
Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators.
Entropy
23 (9) (2021)
Taiki Miyamoto
,
Ryo Fukushima
,
Kazuaki Harada
,
Keiji Yoshimoto
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
A Property Management System Using Image Recognition by YOLO.
ICCE-TW
(2021)
Keiji Yoshimoto
,
Yoshinori Uetake
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist.
Int. J. Netw. Comput.
10 (2) (2020)
Yuki Taketa
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator.
SVCC
(2020)
Yuta Kodera
,
Tomoya Tatara
,
Takuya Kusaka
,
Yasuyuki Nogami
,
Satoshi Uehara
A Parallel Blum-Micali Generator Based on the Gauss Periods.
ISITA
(2020)
Yuta Kodera
,
Yuki Taketa
,
Takuya Kusaka
,
Yasuyuki Nogami
,
Satoshi Uehara
Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol.
IWSEC
(2020)
Yuta Kodera
,
Ali Md. Arshad
,
Takeru Miyazaki
,
Takuya Kusaka
,
Yasuyuki Nogami
,
Satoshi Uehara
,
Robert H. Morelos-Zaragoza
Algebraic Group Structure of the Random Number Generator: Theoretical Analysis of NTU Sequence(s).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(12) (2019)
Yuta Kodera
,
Yuki Taketa
,
Takuya Kusaka
,
Yasuyuki Nogami
Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-Box.
CANDAR
(2019)
Fatema Akhter
,
Yuta Kodera
,
Yasuyuki Nogami
,
Takuya Kusaka
NIST Statistical Test for Random Sequence Generated by Möbius Function.
ICCE-TW
(2019)
Yuta Kodera
,
Minoru Kuribayashi
,
Takuya Kusaka
,
Yasuyuki Nogami
Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages.
Int. J. Netw. Comput.
9 (2) (2019)
Yoshinori Uetake
,
Keiji Yoshimoto
,
Yuta Kodera
,
Leo Weissbart
,
Takuya Kusaka
,
Yasuyuki Nogami
A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller.
CANDAR
(2019)
Yuki Taketa
,
Yuta Kodera
,
Shogo Tanida
,
Takuya Kusaka
,
Yasuyuki Nogami
,
Norikazu Takahashi
,
Satoshi Uehara
Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence.
CANDAR Workshops
(2019)
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Boundary for the Linear Complexity of Well Balanced NTU.
ICCE-TW
(2019)
Tomoya Tatara
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
A Consideration on Generating Uniform Binary Sequence with High Linear Complexity.
ICCE-TW
(2019)
Shinichi Kageyama
,
Ken Ikuta
,
Yuki Nanjo
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code.
CANDAR Workshops
(2019)
Keiji Yoshimoto
,
Yoshinori Uetake
,
Yuta Kodera
,
Takuya Kusaka
,
Yasuyuki Nogami
Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library.
CANDAR
(2019)
Yuta Kodera
,
Minoru Kuribayashi
,
Takuya Kusaka
,
Yasuyuki Nogami
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage.
CANDAR Workshops
(2018)
Ali Md. Arshad
,
Yuta Kodera
,
Shoji Heguri
,
Takuya Kusaka
,
Satoshi Uehara
,
Robert H. Morelos-Zaragoza
Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field.
ICIT
(2018)
Yuta Kodera
,
Takeru Miyazaki
,
Md. Al-Amin Khandaker
,
Ali Md. Arshad
,
Takuya Kusaka
,
Yasuyuki Nogami
,
Satoshi Uehara
Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(9) (2018)
Yuta Hashimoto
,
Md. Al-Amin Khandaker
,
Yuta Kodera
,
Taehwan Park
,
Takuya Kusaka
,
Howon Kim
,
Yasuyuki Nogami
An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno.
Int. J. Netw. Comput.
8 (2) (2018)
Yuta Kodera
,
Minoru Kuribayashi
,
Takuya Kusaka
,
Yasuyuki Nogami
A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher.
WISA
(2018)
Yuta Hashimoto
,
Md. Al-Amin Khandaker
,
Yuta Kodera
,
Taehwan Park
,
Takuya Kusaka
,
Howon Kim
,
Yasuyuki Nogami
An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller.
CANDAR
(2017)
Yuta Kodera
,
Takuya Kusaka
,
Takeru Miyazaki
,
Md. Al-Amin Khandaker
,
Yasuyuki Nogami
,
Satoshi Uehara
An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom Sequence.
CANDAR
(2017)
Md. Al-Amin Khandaker
,
Yuki Nanjo
,
Loubna Ghammam
,
Sylvain Duquesne
,
Yasuyuki Nogami
,
Yuta Kodera
Efficient Optimal Ate Pairing at 128-Bit Security Level.
INDOCRYPT
(2017)
Md. Al-Amin Khandaker
,
Yuki Nanjo
,
Loubna Ghammam
,
Sylvain Duquesne
,
Yasuyuki Nogami
,
Yuta Kodera
Efficient Optimal Ate Pairing at 128-bit Security Level.
IACR Cryptol. ePrint Arch.
2017 (2017)