Nuida, Koji; Itakura, Naoto; Kurosawa, Kaoru A simple and improved algorithm for integer factorization with implicit hints. (English) Zbl 1382.11095 Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 258-269 (2015). MSC: 11Y05 94A60 PDFBibTeX XMLCite \textit{K. Nuida} et al., Lect. Notes Comput. Sci. 9048, 258--269 (2015; Zbl 1382.11095) Full Text: DOI
Kurosawa, Kaoru; Le Trieu Phong IBE under \(k\)-LIN with shorter ciphertexts and private keys. (English) Zbl 1356.94068 Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 145-159 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{Le Trieu Phong}, Lect. Notes Comput. Sci. 9144, 145--159 (2015; Zbl 1356.94068) Full Text: DOI
Nuida, Koji; Kurosawa, Kaoru (Batch) fully homomorphic encryption over integers for non-binary message spaces. (English) Zbl 1370.94534 Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 537-555 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Nuida} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 9056, 537--555 (2015; Zbl 1370.94534) Full Text: DOI
Imai, Shigeyoshi; Kurosawa, Kaoru Improved reconstruction of RSA private-keys from their fraction. (English) Zbl 1366.94503 Inf. Process. Lett. 115, No. 6-8, 630-632 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Imai} and \textit{K. Kurosawa}, Inf. Process. Lett. 115, No. 6--8, 630--632 (2015; Zbl 1366.94503) Full Text: DOI
Kurosawa, Kaoru; Ohta, Hiroyuki; Kakuta, Kenji How to construct strongly secure network coding scheme. (English) Zbl 1395.94295 Padró, Carles (ed.), Information theoretic security. 7th international conference, ICITS 2013, Singapore, November 28–30, 2013. Proceedings. Cham: Springer (ISBN 978-3-319-04267-1/pbk; 978-3-319-04268-8/ebook). Lecture Notes in Computer Science 8317, 1-17 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., Lect. Notes Comput. Sci. 8317, 1--17 (2014; Zbl 1395.94295) Full Text: DOI
Kurosawa, Kaoru; Le Trieu Phong Kurosawa-Desmedt key encapsulation mechanism, revisited. (English) Zbl 1288.94068 Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 51-68 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{Le Trieu Phong}, Lect. Notes Comput. Sci. 8469, 51--68 (2014; Zbl 1288.94068) Full Text: DOI
Kurosawa, Kaoru; Furukawa, Jun 2-pass key exchange protocols from CPA-secure KEM. (English) Zbl 1337.94046 Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 385-401 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{J. Furukawa}, Lect. Notes Comput. Sci. 8366, 385--401 (2014; Zbl 1337.94046) Full Text: DOI
Kurosawa, Kaoru; Ueda, Takuma How to factor \(N_1\) and \(N_2\) when \(p_1=p_2 \bmod 2^t\). (English) Zbl 1344.11079 Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41382-7/pbk). Lecture Notes in Computer Science 8231, 217-225 (2013). MSC: 11Y05 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{T. Ueda}, Lect. Notes Comput. Sci. 8231, 217--225 (2013; Zbl 1344.11079) Full Text: DOI
Kurosawa, Kaoru; Le Trieu Phong Leakage resilient IBE and IPE under the DLIN assumption. (English) Zbl 1356.94067 Jacobson, Michael (ed.) et al., Applied cryptography and network security. 11th international conference, ACNS 2013, Banff, AB, Canada, June 25–28, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38979-5/pbk). Lecture Notes in Computer Science 7954, 487-501 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{Le Trieu Phong}, Lect. Notes Comput. Sci. 7954, 487--501 (2013; Zbl 1356.94067) Full Text: DOI
Kurosawa, Kaoru; Nojima, Ryo; Le Trieu Phong New leakage-resilient CCA-secure public key encryption. (English) Zbl 1288.94072 J. Math. Cryptol. 7, No. 4, 297-312 (2013). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., J. Math. Cryptol. 7, No. 4, 297--312 (2013; Zbl 1288.94072) Full Text: DOI
Kurosawa, Kaoru (ed.); Hanaoka, Goichiro (ed.) Public-key cryptography – PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26–March 1, 2013. Proceedings. (English) Zbl 1258.94004 Lecture Notes in Computer Science 7778. Berlin: Springer (ISBN 978-3-642-36361-0/pbk). xiv, 518 p. (2013). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. Kurosawa} (ed.) and \textit{G. Hanaoka} (ed.), Public-key cryptography -- PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26--March 1, 2013. Proceedings. Berlin: Springer (2013; Zbl 1258.94004) Full Text: DOI
Kurosawa, Kaoru; Nojima, Ryo; Le Trieu Phong Relation between verifiable random functions and convertible undeniable signatures, and new constructions. (English) Zbl 1288.94071 Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 235-246 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., Lect. Notes Comput. Sci. 7372, 235--246 (2012; Zbl 1288.94071) Full Text: DOI
Kurosawa, Kaoru Round-efficient perfectly secure message transmission scheme against general adversary. (English) Zbl 1236.94058 Des. Codes Cryptography 63, No. 2, 199-207 (2012). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa}, Des. Codes Cryptography 63, No. 2, 199--207 (2012; Zbl 1236.94058) Full Text: DOI
Kurosawa, Kaoru General error decodable secret sharing scheme and its application. (English) Zbl 1365.94486 IEEE Trans. Inf. Theory 57, No. 9, 6304-6309 (2011). MSC: 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa}, IEEE Trans. Inf. Theory 57, No. 9, 6304--6309 (2011; Zbl 1365.94486) Full Text: DOI
Choudhury, Ashish; Kurosawa, Kaoru; Patra, Arpita Simple and efficient single round almost perfectly secure message transmission tolerating generalized adversary. (English) Zbl 1435.94126 Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 292-308 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Choudhury} et al., Lect. Notes Comput. Sci. 6715, 292--308 (2011; Zbl 1435.94126) Full Text: DOI
Kurosawa, Kaoru; Nojima, Ryo; Le Trieu Phong Generic fully simulatable adaptive oblivious transfer. (English) Zbl 1288.94070 Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 274-291 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., Lect. Notes Comput. Sci. 6715, 274--291 (2011; Zbl 1288.94070) Full Text: DOI
Choudhury, Ashish; Kurosawa, Kaoru; Patra, Arpita The round complexity of perfectly secure general VSS. (English) Zbl 1295.94174 Fehr, Serge (ed.), Information theoretic security. 5th international conference, ICITS 2011, Amsterdam, The Netherlands, May 21–24, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20727-3/pbk). Lecture Notes in Computer Science 6673, 143-162 (2011). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Choudhury} et al., Lect. Notes Comput. Sci. 6673, 143--162 (2011; Zbl 1295.94174) Full Text: DOI
Kurosawa, Kaoru Power of a public random permutation and its application to authenticated encryption. (English) Zbl 1366.94555 IEEE Trans. Inf. Theory 56, No. 10, 5366-5374 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa}, IEEE Trans. Inf. Theory 56, No. 10, 5366--5374 (2010; Zbl 1366.94555) Full Text: DOI
Kurosawa, Kaoru Cryptography for unconditionally secure message transmission in networks (invited talk) (Abstract). (English) Zbl 1294.94057 Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 43 (2010). MSC: 94A60 68M14 68P25 PDFBibTeX XMLCite \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 6467, 43 (2010; Zbl 1294.94057) Full Text: DOI
Heng, Swee-Huay (ed.); Kurosawa, Kaoru (ed.) Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. (English) Zbl 1197.94005 Lecture Notes in Computer Science 6402. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). x, 279 p. (2010). MSC: 94-06 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{S.-H. Heng} (ed.) and \textit{K. Kurosawa} (ed.), Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13--15, 2010. Proceedings. Berlin: Springer (2010; Zbl 1197.94005) Full Text: DOI
Kurosawa, Kaoru (ed.) Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3–6, 2009. Revised selected papers. (English) Zbl 1196.94011 Lecture Notes in Computer Science 5973. Berlin: Springer (ISBN 978-3-642-14495-0/pbk). x, 249 p. (2010). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. Kurosawa} (ed.), Information theoretic security. 4th international conference, ICITS 2009, Shizuoka, Japan, December 3--6, 2009. Revised selected papers. Berlin: Springer (2010; Zbl 1196.94011) Full Text: DOI
Le Trieu Phong; Kurosawa, Kaoru; Ogata, Wakaha Provably secure convertible undeniable signatures with unambiguity. (English) Zbl 1288.94088 Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 291-308 (2010). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Le Trieu Phong} et al., Lect. Notes Comput. Sci. 6280, 291--308 (2010; Zbl 1288.94088) Full Text: DOI
Kurosawa, Kaoru; Nojima, Ryo; Le Trieu Phong Efficiency-improved fully simulatable adaptive OT under the DDH assumption. (English) Zbl 1288.94069 Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 172-181 (2010). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., Lect. Notes Comput. Sci. 6280, 172--181 (2010; Zbl 1288.94069) Full Text: DOI
Desmedt, Yvo; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack. (English) Zbl 1191.94087 J. Cryptology 23, No. 1, 91-120 (2010). Reviewer: Jerzy Żurawiecki (Lublin) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Desmedt} et al., J. Cryptology 23, No. 1, 91--120 (2010; Zbl 1191.94087) Full Text: DOI
Kurosawa, Kaoru; Suzuki, Kazuhiro Truly efficient 2-round perfectly secure message transmission scheme. (English) Zbl 1367.94320 IEEE Trans. Inf. Theory 55, No. 11, 5223-5232 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{K. Suzuki}, IEEE Trans. Inf. Theory 55, No. 11, 5223--5232 (2009; Zbl 1367.94320) Full Text: DOI
Kurosawa, Kaoru; Takagi, Tsuyoshi One-wayness equivalent to general factoring. (English) Zbl 1367.94321 IEEE Trans. Inf. Theory 55, No. 9, 4249-4262 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{T. Takagi}, IEEE Trans. Inf. Theory 55, No. 9, 4249--4262 (2009; Zbl 1367.94321) Full Text: DOI
Kurosawa, Kaoru; Nojima, Ryo Simple adaptive oblivious transfer without random oracle. (English) Zbl 1267.94078 Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 334-346 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{R. Nojima}, Lect. Notes Comput. Sci. 5912, 334--346 (2009; Zbl 1267.94078) Full Text: DOI
Kurosawa, Kaoru; Suzuki, Kazuhiro Almost secure (1-round, \(n\)-channel) message transmission scheme. (English) Zbl 1263.94030 Desmedt, Yvo (ed.), Information theoretic security. Second international conference, ICITS 2007, Madrid, Spain, May 25–29, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-642-10229-5/pbk). Lecture Notes in Computer Science 4883, 99-112 (2009). MSC: 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{K. Suzuki}, Lect. Notes Comput. Sci. 4883, 99--112 (2009; Zbl 1263.94030) Full Text: DOI
Le Trieu Phong; Kurosawa, Kaoru; Ogata, Wakaha New RSA-based (selectively) convertible undeniable signature schemes. (English) Zbl 1246.94047 Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 116-134 (2009). MSC: 94A62 PDFBibTeX XMLCite \textit{Le Trieu Phong} et al., Lect. Notes Comput. Sci. 5580, 116--134 (2009; Zbl 1246.94047) Full Text: DOI
Kurosawa, Kaoru; Kishimoto, Wataru; Koshiba, Takeshi A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions. (English) Zbl 1328.94077 IEEE Trans. Inf. Theory 54, No. 6, 2566-2571 (2008). MSC: 94A62 05B15 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., IEEE Trans. Inf. Theory 54, No. 6, 2566--2571 (2008; Zbl 1328.94077) Full Text: DOI
Hanaoka, Goichiro; Kurosawa, Kaoru Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. (English) Zbl 1206.94070 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 308-325 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Hanaoka} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 5350, 308--325 (2008; Zbl 1206.94070) Full Text: DOI
Kurosawa, Kaoru; Heng, Swee-Huay The power of identification schemes. (English) Zbl 1178.94213 Int. J. Appl. Cryptogr. 1, No. 1, 60-69 (2008). MSC: 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{S.-H. Heng}, Int. J. Appl. Cryptogr. 1, No. 1, 60--69 (2008; Zbl 1178.94213) Full Text: DOI
Kurosawa, Kaoru; Koshiba, Takeshi Simple direct reduction of string (1,2)-OT to Rabin’s OT without privacy amplification. (English) Zbl 1162.94379 Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 199-209 (2008). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{T. Koshiba}, Lect. Notes Comput. Sci. 5155, 199--209 (2008; Zbl 1162.94379) Full Text: DOI
Furukawa, Jun; Armknecht, Frederik; Kurosawa, Kaoru A universally composable group key exchange protocol with minimum communication effort. (English) Zbl 1180.94052 Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 392-408 (2008). MSC: 94A60 68M12 PDFBibTeX XMLCite \textit{J. Furukawa} et al., Lect. Notes Comput. Sci. 5229, 392--408 (2008; Zbl 1180.94052) Full Text: DOI
Kurosawa, Kaoru; Furukawa, Jun Universally composable undeniable signature. (English) Zbl 1155.94398 Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 524-535 (2008). MSC: 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{J. Furukawa}, Lect. Notes Comput. Sci. 5126, 524--535 (2008; Zbl 1155.94398) Full Text: DOI
Itoh, Kouichi; Kunihiro, Noboru; Kurosawa, Kaoru Small secret key attack on a variant of RSA (due to Takagi). (English) Zbl 1161.94408 Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 387-406 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Itoh} et al., Lect. Notes Comput. Sci. 4964, 387--406 (2008; Zbl 1161.94408) Full Text: DOI
Kurosawa, Kaoru; Suzuki, Kazuhiro Truly efficient 2-round perfectly secure message transmission scheme. (English) Zbl 1149.94324 Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 324-340 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{K. Suzuki}, Lect. Notes Comput. Sci. 4965, 324--340 (2008; Zbl 1149.94324) Full Text: DOI
Bellare, Mihir; Boldyreva, Alexandra; Kurosawa, K.; Staddon, Jessica Multirecipient encryption schemes: how to save on bandwidth and computation without sacrificing security. (English) Zbl 1326.94073 IEEE Trans. Inf. Theory 53, No. 11, 3927-3943 (2007). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Bellare} et al., IEEE Trans. Inf. Theory 53, No. 11, 3927--3943 (2007; Zbl 1326.94073) Full Text: DOI
Desmedt, Yvo; Kurosawa, Kaoru A generalization and a variant of two threshold cryptosystems based on factoring. (English) Zbl 1138.94362 Garay, Juan A. (ed.) et al., Information security. 10th international conference, ISC 2007, Valparaíso, Chile, October 9–12, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75495-4/pbk). Lecture Notes in Computer Science 4779, 351-361 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Desmedt} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 4779, 351--361 (2007; Zbl 1138.94362) Full Text: DOI
Kurosawa, Kaoru (ed.) Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. (English) Zbl 1135.94001 Lecture Notes in Computer Science 4833. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). xiv, 583 p. (2007). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{K. Kurosawa} (ed.), Advances in cryptology -- ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (2007; Zbl 1135.94001) Full Text: DOI
Hirota, Osamu; Kurosawa, Kaoru Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol. (English) Zbl 1119.81028 Quantum Inf. Process. 6, No. 2, 81-91 (2007). MSC: 81P68 94A60 68P30 PDFBibTeX XMLCite \textit{O. Hirota} and \textit{K. Kurosawa}, Quantum Inf. Process. 6, No. 2, 81--91 (2007; Zbl 1119.81028) Full Text: DOI arXiv
Kunihiro, Noboru; Kurosawa, Kaoru Deterministic polynomial time equivalence between factoring and key-recovery attack on Takagi’s RSA. (English) Zbl 1161.94412 Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 412-425 (2007). MSC: 94A60 11Y11 PDFBibTeX XMLCite \textit{N. Kunihiro} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 4450, 412--425 (2007; Zbl 1161.94412) Full Text: DOI
Matsumoto, Ryutaroh; Kurosawa, Kaoru; Itoh, Toshiya; Konno, Toshimitsu; Uyematsu, Tomohiko Primal-dual distance bounds of linear codes with application to cryptography. (English) Zbl 1320.94093 IEEE Trans. Inf. Theory 52, No. 9, 4251-4256 (2006). MSC: 94B05 94A60 PDFBibTeX XMLCite \textit{R. Matsumoto} et al., IEEE Trans. Inf. Theory 52, No. 9, 4251--4256 (2006; Zbl 1320.94093) Full Text: DOI arXiv
Ogata, Wakaha; Kurosawa, Kaoru; Heng, Swee-Huay The security of the FDH variant of Chaum’s undeniable signature scheme. (English) Zbl 1318.94074 IEEE Trans. Inf. Theory 52, No. 5, 2006-2017 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Ogata} et al., IEEE Trans. Inf. Theory 52, No. 5, 2006--2017 (2006; Zbl 1318.94074) Full Text: DOI
Kurosawa, Kaoru; Heng, Swee-Huay Relations among security notions for undeniable signature schemes. (English) Zbl 1152.94431 De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 34-48 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{S.-H. Heng}, Lect. Notes Comput. Sci. 4116, 34--48 (2006; Zbl 1152.94431) Full Text: DOI
Suzuki, Kazuhiro; Tonien, Dongvu; Kurosawa, Kaoru; Toyota, Koji Birthday paradox for multi-collisions. (English) Zbl 1272.94064 Rhee, Min Surp (ed.) et al., Information security and cryptology – ICISC 2006. 9th international conference, Busan, Korea, November 30–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49112-5/pbk). Lecture Notes in Computer Science 4296, 29-40 (2006). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Suzuki} et al., Lect. Notes Comput. Sci. 4296, 29--40 (2006; Zbl 1272.94064) Full Text: DOI
Kurosawa, Kaoru; Takagi, Tsuyoshi New approach for selectively convertible undeniable signature schemes. (English) Zbl 1172.94619 Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 428-443 (2006). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{T. Takagi}, Lect. Notes Comput. Sci. 4284, 428--443 (2006; Zbl 1172.94619) Full Text: DOI
Furukawa, Jun; Kurosawa, Kaoru; Imai, Hideki An efficient compiler from \(\Sigma\)-protocol to 2-move deniable zero-knowledge. (English) Zbl 1133.94343 Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 46-57 (2006). MSC: 94A62 68Q15 PDFBibTeX XMLCite \textit{J. Furukawa} et al., Lect. Notes Comput. Sci. 4052, 46--57 (2006; Zbl 1133.94343) Full Text: DOI
Abe, Masayuki; Cui, Yang; Imai, Hideki; Kurosawa, Kaoru Tag-kem from set partial domain one-way permutations. (English) Zbl 1176.94026 Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 360-370 (2006). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{M. Abe} et al., Lect. Notes Comput. Sci. 4058, 360--370 (2006; Zbl 1176.94026) Full Text: DOI
Kurosawa, Kaoru; Heng, Swee-Huay The power of identification schemes. (English) Zbl 1151.94530 Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 364-377 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{S.-H. Heng}, Lect. Notes Comput. Sci. 3958, 364--377 (2006; Zbl 1151.94530) Full Text: DOI
Kurosawa, Kaoru; Schmidt-Samoa, Katja New online/offline signature schemes without random oracles. (English) Zbl 1151.94531 Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 330-346 (2006). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{K. Schmidt-Samoa}, Lect. Notes Comput. Sci. 3958, 330--346 (2006; Zbl 1151.94531) Full Text: DOI
Nguyen, Lan; Safavi-Naini, Rei; Kurosawa, Kaoru Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. (English) Zbl 1209.94046 Int. J. Inf. Secur. 5, No. 4, 241-255 (2006). MSC: 94A60 PDFBibTeX XML Full Text: DOI
Ogata, Wakaha; Kurosawa, Kaoru; Stinson, Douglas R. Optimum secret sharing scheme secure against cheating. (English) Zbl 1119.94011 SIAM J. Discrete Math. 20, No. 1, 79-95 (2006). MSC: 94A62 94A60 05B10 11T71 PDFBibTeX XMLCite \textit{W. Ogata} et al., SIAM J. Discrete Math. 20, No. 1, 79--95 (2006; Zbl 1119.94011) Full Text: DOI
Kurosawa, Kaoru; Heng, Swee-Huay 3-move undeniable signature scheme. (English) Zbl 1137.94375 Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 181-197 (2005). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{S.-H. Heng}, Lect. Notes Comput. Sci. 3494, 181--197 (2005; Zbl 1137.94375) Full Text: DOI
Abe, Masayuki; Gennaro, Rosario; Kurosawa, Kaoru; Shoup, Victor Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. (English) Zbl 1137.94336 Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 128-146 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Abe} et al., Lect. Notes Comput. Sci. 3494, 128--146 (2005; Zbl 1137.94336) Full Text: DOI
Iwata, Tetsu; Kurosawa, Kaoru How to enhance the security of the 3GPP confidentiality and integrity algorithms. (English) Zbl 1140.94348 Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 268-283 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Iwata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 3557, 268--283 (2005; Zbl 1140.94348) Full Text: DOI
Ogata, Wakaha; Kurosawa, Kaoru; Heng, Swee-Huay The security of the FDH variant of Chaum’s undeniable signature scheme. (English) Zbl 1081.94552 Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 328-345 (2005). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{W. Ogata} et al., Lect. Notes Comput. Sci. 3386, 328--345 (2005; Zbl 1081.94552) Full Text: DOI
Kurosawa, Kaoru; Heng, Swee-Huay From digital signature to ID-based identification/signature. (English) Zbl 1198.94155 Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 248-261 (2004). MSC: 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{S.-H. Heng}, Lect. Notes Comput. Sci. 2947, 248--261 (2004; Zbl 1198.94155) Full Text: DOI
Koshiba, Takeshi; Kurosawa, Kaoru Short exponent Diffie-Hellman problems. (English) Zbl 1198.94105 Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 173-186 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Koshiba} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2947, 173--186 (2004; Zbl 1198.94105) Full Text: DOI
Viet, Duong Quang; Kurosawa, Kaoru Almost ideal contrast visual cryptography with reversing. (English) Zbl 1196.94067 Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 353-365 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Q. Viet} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2964, 353--365 (2004; Zbl 1196.94067) Full Text: DOI
Heng, Swee-Huay; Kurosawa, Kaoru \(k\)-resilient identity-based encryption in the standard model. (English) Zbl 1196.94056 Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 67-80 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{S.-H. Heng} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2964, 67--80 (2004; Zbl 1196.94056) Full Text: DOI
Kurosawa, Kaoru; Matsumoto, Ryutaroh Almost security of cryptographic Boolean functions. (English) Zbl 1297.94084 IEEE Trans. Inf. Theory 50, No. 11, 2752-2761 (2004). MSC: 94A60 06E30 94C10 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{R. Matsumoto}, IEEE Trans. Inf. Theory 50, No. 11, 2752--2761 (2004; Zbl 1297.94084) Full Text: DOI
Kurosawa, Kaoru; Iwata, Tetsu; Yoshiwara, Takayuki New covering radius of Reed-Muller codes for \(t\)-resilient functions. (English) Zbl 1288.94067 IEEE Trans. Inf. Theory 50, No. 3, 468-475 (2004). Reviewer: Olaf Ninnemann (Berlin) MSC: 94A60 94B05 94B75 94D10 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., IEEE Trans. Inf. Theory 50, No. 3, 468--475 (2004; Zbl 1288.94067) Full Text: DOI
Iwata, Tetsu; Kurosawa, Kaoru On the security of a new variant of OMAC. (English) Zbl 1092.68597 Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 67-78 (2004). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{T. Iwata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2971, 67--78 (2004; Zbl 1092.68597) Full Text: DOI
Kurosawa, Kaoru; Matsuo, Toshihiko How to remove MAC from DHIES. (English) Zbl 1098.94621 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 236-247 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{T. Matsuo}, Lect. Notes Comput. Sci. 3108, 236--247 (2004; Zbl 1098.94621) Full Text: DOI
Iwata, Tetsu; Kurosawa, Kaoru How to re-use round function in super-pseudorandom permutation. (English) Zbl 1098.94616 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 224-235 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Iwata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 3108, 224--235 (2004; Zbl 1098.94616) Full Text: DOI
Kurosawa, Kaoru; Desmedt, Yvo A new paradigm of hybrid encryption scheme. (English) Zbl 1104.94028 Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 426-442 (2004). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{Y. Desmedt}, Lect. Notes Comput. Sci. 3152, 426--442 (2004; Zbl 1104.94028) Full Text: DOI
Nguyen, Lan; Safavi-Naini, Rei; Kurosawa, Kaoru Verifiable shuffles: a formal model and a Paillier-based efficient construction with provable security. (English) Zbl 1103.68533 Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 61-75 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{L. Nguyen} et al., Lect. Notes Comput. Sci. 3089, 61--75 (2004; Zbl 1103.68533) Full Text: DOI
Ogata, Wakaha; Kurosawa, Kaoru Oblivious keyword search. (English) Zbl 1059.68050 J. Complexity 20, No. 2-3, 356-371 (2004). Reviewer: Jörg Desel (Eichstätt) MSC: 68Q25 68P25 94A62 PDFBibTeX XMLCite \textit{W. Ogata} and \textit{K. Kurosawa}, J. Complexity 20, No. 2--3, 356--371 (2004; Zbl 1059.68050) Full Text: DOI
Ogata, Wakaha; Kurosawa, Kaoru; Stinson, Douglas R.; Saido, Hajime New combinatorial designs and their applications to authentication codes and secret sharing schemes. (English) Zbl 1044.94013 Discrete Math. 279, No. 1-3, 383-405 (2004). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A62 05B10 05B05 PDFBibTeX XMLCite \textit{W. Ogata} et al., Discrete Math. 279, No. 1--3, 383--405 (2004; Zbl 1044.94013) Full Text: DOI
Desmedt, Yvo; Kurosawa, Kaoru; Le, Tri Van Error correcting and complexity aspects of linear secret sharing schemes. (English) Zbl 1255.94074 Boyd, Colin (ed.) et al., Information security. 6th international conference, ISC 2003, Bristol, UK, October 1–3, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20176-9/pbk). Lect. Notes Comput. Sci. 2851, 396-407 (2003). MSC: 94A62 68Q17 94A60 PDFBibTeX XMLCite \textit{Y. Desmedt} et al., Lect. Notes Comput. Sci. 2851, 396--407 (2003; Zbl 1255.94074) Full Text: DOI
Iwata, Tetsu; Kurosawa, Kaoru OMAC: one-key CBC MAC. (English) Zbl 1254.94033 Johansson, Thomas (ed.), Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Berlin: Springer (ISBN 3-540-20449-0/pbk). Lect. Notes Comput. Sci. 2887, 129-153 (2003). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T. Iwata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2887, 129--153 (2003; Zbl 1254.94033) Full Text: DOI
Kurosawa, Kaoru; Schmidt-Samoa, Katja; Takagi, Tsuyoshi A complete and explicit security reduction algorithm for RSA-based cryptosystems. (English) Zbl 1205.94086 Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 474-491 (2003). MSC: 94A60 11T71 68Q15 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., Lect. Notes Comput. Sci. 2894, 474--491 (2003; Zbl 1205.94086) Full Text: DOI
Kurosawa, Kaoru; Takagi, Tsuyoshi Some RSA-based encryption schemes with tight security reduction. (English) Zbl 1205.94087 Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 19-36 (2003). MSC: 94A60 11T71 20K01 68Q15 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{T. Takagi}, Lect. Notes Comput. Sci. 2894, 19--36 (2003; Zbl 1205.94087) Full Text: DOI
Iwata, Tetsu; Kurosawa, Kaoru Stronger security bounds for OMAC, TMAC, and XCBC. (English) Zbl 1123.94348 Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 402-415 (2003). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Iwata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2904, 402--415 (2003; Zbl 1123.94348) Full Text: DOI
Iwata, Tetsu; Kurosawa, Kaoru On the correctness of security proofs for the 3GPP confidentiality and integrity algorithms. (English) Zbl 1123.94347 Paterson, Kenneth G. (ed.), Cryptography and coding. 9th IMA international conference, Cirencester, UK, December 16–18, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20663-9/pbk). Lect. Notes Comput. Sci. 2898, 306-318 (2003). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Iwata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2898, 306--318 (2003; Zbl 1123.94347) Full Text: DOI
Heng, Swee-Huay; Kurosawa, Kaoru Square hash with a small key size. (English) Zbl 1042.68571 Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 522-531 (2003). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{S.-H. Heng} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2727, 522--531 (2003; Zbl 1042.68571) Full Text: Link
Iwata, Tetsu; Yagi, Tohru; Kurosawa, Kaoru On the pseudorandomness of KASUMI type permutations. (English) Zbl 1044.94531 Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 130-141 (2003). MSC: 94A60 68Q25 65C10 PDFBibTeX XMLCite \textit{T. Iwata} et al., Lect. Notes Comput. Sci. 2727, 130--141 (2003; Zbl 1044.94531) Full Text: Link
Kurosawa, Kaoru; Iwata, Tetsu TMAC: Two-key CBC MAC. (English) Zbl 1039.94527 Joye, Marc (ed.), Topics in cryptology – CT-RSA 2003. The cryptographers’ track at the RSA conference 2003, San Francisco, CA, USA, April 13–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-00847-0/pbk). Lect. Notes Comput. Sci. 2612, 33-49 (2003). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{T. Iwata}, Lect. Notes Comput. Sci. 2612, 33--49 (2003; Zbl 1039.94527) Full Text: Link
Iwata, Tetsu; Kurosawa, Kaoru On the universal hash functions in Luby-Rackoff cipher. (English) Zbl 1031.94518 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 226-236 (2003). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{T. Iwata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2587, 226--236 (2003; Zbl 1031.94518) Full Text: Link
Kurosawa, Kaoru; Ogata, Wakaha Bit-slice auction circuit. (English) Zbl 1482.68071 Gollmann, Dieter (ed.) et al., Computer security – ESORICS 2002. 7th European symposium on research in computer security, Zurich, Switzerland, October 14–16, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2502, 24-38 (2002). MSC: 68M25 68Q06 91B26 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{W. Ogata}, Lect. Notes Comput. Sci. 2502, 24--38 (2002; Zbl 1482.68071) Full Text: DOI
Iwata, Tetsu; Yoshino, Tomonobu; Yuasa, Tomohiro; Kurosawa, Kaoru Round security and super-pseudorandomness of MISTY type structure. (English) Zbl 1073.68632 Matsui, Mitsuru (ed.), Fast software encryption. 8th international workshop, FSE 2001, Yokohama, Japan, April 2–4, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43869-6). Lect. Notes Comput. Sci. 2355, 233-247 (2002). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Iwata} et al., Lect. Notes Comput. Sci. 2355, 233--247 (2002; Zbl 1073.68632) Full Text: DOI
Iwata, Tetsu; Yoshino, Tomonobu; Kurosawa, Kaoru Non-cryptographic primitive for pseudorandom permutation. (English) Zbl 1045.94522 Daemen, Joan (ed.) et al., Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers. Berlin: Springer (ISBN 3-540-44009-7). Lect. Notes Comput. Sci. 2365, 149-163 (2002). MSC: 94A60 68N99 68P25 PDFBibTeX XMLCite \textit{T. Iwata} et al., Lect. Notes Comput. Sci. 2365, 149--163 (2002; Zbl 1045.94522) Full Text: Link
Kurosawa, Kaoru; Yoshida, Takuya Linear code implies public-key traitor tracing. (English) Zbl 1055.94523 Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 172-187 (2002). MSC: 94A60 94B05 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{T. Yoshida}, Lect. Notes Comput. Sci. 2274, 172--187 (2002; Zbl 1055.94523) Full Text: Link
Kurosawa, Kaoru Multi-recipient public-key encryption with shortened ciphertext. (English) Zbl 1055.94522 Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 48-63 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2274, 48--63 (2002; Zbl 1055.94522) Full Text: Link
Kishimoto, Wataru; Okada, Koji; Kurosawa, Kaoru; Ogata, Wakaha On the bound for anonymous secret sharing schemes. (English) Zbl 1020.94018 Discrete Appl. Math. 121, No. 1-3, 193-202 (2002). MSC: 94A62 05B05 PDFBibTeX XMLCite \textit{W. Kishimoto} et al., Discrete Appl. Math. 121, No. 1--3, 193--202 (2002; Zbl 1020.94018) Full Text: DOI
Iwata, Tetsu; Yoshiwara, Takayuki; Kurosawa, Kaoru New covering radius of Reed-Muller codes for \(t\)-resilient functions. (English) Zbl 1067.94539 Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 75-86 (2001). MSC: 94A60 94B05 94B75 94D10 PDFBibTeX XMLCite \textit{T. Iwata} et al., Lect. Notes Comput. Sci. 2259, 75--86 (2001; Zbl 1067.94539) Full Text: Link
Yamamura, Akihiro; Kurosawa, Kaoru Generic algorithms and key agreement protocols based on group actions. (English) Zbl 1076.94529 Eades, Peter (ed.) et al., Algorithms and computation. 12th international symposium, ISAAC 2001, Christchurch, New Zealand, December 19–21, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42985-9). Lect. Notes Comput. Sci. 2223, 208-218 (2001). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Yamamura} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 2223, 208--218 (2001; Zbl 1076.94529) Full Text: Link
Iwata, Tetsu; Kurosawa, Kaoru On the pseudorandomness of the AES finalists – RC6 and Serpent. (English) Zbl 0994.68630 Schneier, Bruce (ed.), Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1978, 231-243 (2001). MSC: 68U99 68P25 94A60 PDFBibTeX XMLCite \textit{T. Iwata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 1978, 231--243 (2001; Zbl 0994.68630)
Kurosawa, Kaoru; Iwata, Tetsu; Quang, Viet Duong Root finding interpolation attack. (English) Zbl 0981.94507 Stinson, Douglas R. (ed.) et al., Selected areas in cryptography. 7th annual international workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2012, 303-314 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., Lect. Notes Comput. Sci. 2012, 303--314 (2001; Zbl 0981.94507) Full Text: Link
Kurosawa, Kaoru; Johansson, Thomas; Stinson, Douglas R. Almost \(k\)-wise independent sample spaces and their cryptologic applications. (English) Zbl 1008.94017 J. Cryptology 14, No. 4, 231-253 (2001). Reviewer: Jürgen Bierbrauer (Houghton) MSC: 94A60 60A99 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., J. Cryptology 14, No. 4, 231--253 (2001; Zbl 1008.94017) Full Text: DOI
Kurosawa, Kaoru; Ogata, Wakaha; Matsuo, Toshihiko; Makishima, Shuichi IND-CCA public key schemes equivalent to factoring \(n=pq\). (English) Zbl 0991.94041 Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 36-47 (2001). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., Lect. Notes Comput. Sci. 1992, 36--47 (2001; Zbl 0991.94041)
Kurosawa, Kaoru; Obana, Satoshi Combinatorial bounds on authentication codes with arbitration. (English) Zbl 1053.94016 Des. Codes Cryptography 22, No. 3, 265-281 (2001). MSC: 94A62 PDFBibTeX XMLCite \textit{K. Kurosawa} and \textit{S. Obana}, Des. Codes Cryptography 22, No. 3, 265--281 (2001; Zbl 1053.94016) Full Text: DOI
Obana, Satoshi; Kurosawa, Kaoru Bounds and combinatorial structure of \((k,n)\) multi-receiver \(A\)-codes. (English) Zbl 0971.94006 Des. Codes Cryptography 22, No. 1, 47-63 (2001). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Obana} and \textit{K. Kurosawa}, Des. Codes Cryptography 22, No. 1, 47--63 (2001; Zbl 0971.94006) Full Text: DOI
Desmedt, Yvo; Kurosawa, Kaoru How to break a practical MIX and design a new one. (English) Zbl 1082.94516 Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 557-572 (2000). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Desmedt} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 1807, 557--572 (2000; Zbl 1082.94516)
Ogata, Wakaha; Kurosawa, Kaoru Provably secure metering scheme. (English) Zbl 0977.68032 Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 388-398 (2000). MSC: 68P25 68M10 94A60 PDFBibTeX XMLCite \textit{W. Ogata} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 1976, 388--398 (2000; Zbl 0977.68032)
Mitomo, Masashi; Kurosawa, Kaoru Attack for flash MIX. (English) Zbl 0974.94019 Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 192-204 (2000). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Mitomo} and \textit{K. Kurosawa}, Lect. Notes Comput. Sci. 1976, 192--204 (2000; Zbl 0974.94019)
Obana, Satoshi; Kurosawa, Kaoru Combinatorial classification of optimal authentication codes with arbitration. (English) Zbl 0978.94041 Des. Codes Cryptography 20, No. 3, 281-305 (2000). Reviewer: Jozef Vyskoč (Bratislava) MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Obana} and \textit{K. Kurosawa}, Des. Codes Cryptography 20, No. 3, 281--305 (2000; Zbl 0978.94041) Full Text: DOI
Okada, Koji; Kurosawa, Kaoru MDS secret-sharing scheme secure against cheaters. (English) Zbl 1002.94031 IEEE Trans. Inf. Theory 46, No. 3, 1078-1081 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{K. Okada} and \textit{K. Kurosawa}, IEEE Trans. Inf. Theory 46, No. 3, 1078--1081 (2000; Zbl 1002.94031) Full Text: DOI Link
Kurosawa, Kaoru; Sato, Fumio; Sakata, Takahiro; Kishimoto, Wataru A relationship between linear complexity and \(k\)-error linear complexity. (English) Zbl 0996.94030 IEEE Trans. Inf. Theory 46, No. 2, 694-698 (2000). MSC: 94A55 94A60 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., IEEE Trans. Inf. Theory 46, No. 2, 694--698 (2000; Zbl 0996.94030) Full Text: DOI