Satake, Shohei; Gu, Yujie; Sakurai, Kouichi Explicit non-malleable codes from bipartite graphs. (English) Zbl 07724820 Mesnager, Sihem (ed.) et al., Arithmetic of finite fields. 9th international workshop, WAIFI 2022, Chengdu, China, August 29 – September 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13638, 221-236 (2023). MSC: 94B60 11T71 PDFBibTeX XMLCite \textit{S. Satake} et al., Lect. Notes Comput. Sci. 13638, 221--236 (2023; Zbl 07724820) Full Text: DOI
Gu, Yujie; Akao, Sonata; Esfahani, Navid Nasr; Miao, Ying; Sakurai, Kouichi On the information-theoretic security of combinatorial all-or-nothing transforms. (English) Zbl 07817805 IEEE Trans. Inf. Theory 68, No. 10, 6904-6914 (2022). MSC: 94-XX PDFBibTeX XMLCite \textit{Y. Gu} et al., IEEE Trans. Inf. Theory 68, No. 10, 6904--6914 (2022; Zbl 07817805) Full Text: DOI arXiv
Perera, Maharage Nisansala Sevwandi; Nakamura, Toru; Matsunaka, Takashi; Yokoyama, Hiroyuki; Sakurai, Kouichi Attribute based tracing for securing group signatures against centralized authorities. (English) Zbl 07722523 Su, Chunhua (ed.) et al., Information security practice and experience. 17th international conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13620, 554-572 (2022). Reviewer: Jaak Henno (Tallinn) MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{M. N. S. Perera} et al., Lect. Notes Comput. Sci. 13620, 554--572 (2022; Zbl 07722523) Full Text: DOI
Perera, Maharage Nisansala Sevwandi; Nakamura, Toru; Hashimoto, Masayuki; Yokoyama, Hiroyuki; Sakurai, Kouichi Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions. (English) Zbl 1517.94138 Theor. Comput. Sci. 891, 131-148 (2021). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. N. S. Perera} et al., Theor. Comput. Sci. 891, 131--148 (2021; Zbl 1517.94138) Full Text: DOI
Dutta, Sabyasachi; Sakurai, Kouichi Theory and application of computationally-independent one-way functions: interactive proof of ability – revisited. (English) Zbl 07388839 Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 97-109 (2021). MSC: 65-XX PDFBibTeX XMLCite \textit{S. Dutta} and \textit{K. Sakurai}, Adv. Intell. Syst. Comput. 1170, 97--109 (2021; Zbl 07388839) Full Text: DOI
Dutta, Sabyasachi; Bhore, Tamal; Sardar, M. Kutubuddin; Adhikari, Avishek; Sakurai, Kouichi Visual secret sharing scheme with distributed levels of importance of shadows. (English) Zbl 07388834 Giri, Debasis (ed.) et al., Proceedings of the fifth international conference on mathematics and computing, ICMC 2019, Bhubaneswar, India, February 6–9, 2019. Singapore: Springer. Adv. Intell. Syst. Comput. 1170, 19-32 (2021). MSC: 68-XX PDFBibTeX XMLCite \textit{S. Dutta} et al., Adv. Intell. Syst. Comput. 1170, 19--32 (2021; Zbl 07388834) Full Text: DOI
Roy, Partha Sarathi; Dutta, Sabyasachi; Morozov, Kirill; Adhikari, Avishek; Fukushima, Kazuhide; Kiyomoto, Shinsaku; Sakurai, Kouichi Hierarchical secret sharing schemes secure against rushing adversary: cheater identification and robustness. (English) Zbl 1518.94122 Su, Chunhua (ed.) et al., Information security practice and experience. 14th international conference, ISPEC 2018, Tokyo, Japan, September 25–27, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11125, 578-594 (2018). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{P. S. Roy} et al., Lect. Notes Comput. Sci. 11125, 578--594 (2018; Zbl 1518.94122) Full Text: DOI
Anada, Hiroaki; Matsushima, Tomohiro; Su, Chunhua; Meng, Weizhi; Kawamoto, Junpei; Bag, Samiran; Sakurai, Kouichi Analysis of variance of graph-clique mining for scalable proof of work. (English) Zbl 1477.94066 Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11449, 101-114 (2018). MSC: 94A62 05C90 68R10 PDFBibTeX XMLCite \textit{H. Anada} et al., Lect. Notes Comput. Sci. 11449, 101--114 (2018; Zbl 1477.94066) Full Text: DOI Link
Ghosh, Debdas (ed.); Giri, Debasis (ed.); Mohapatra, Ram N. (ed.); Savas, Ekrem (ed.); Sakurai, Kouichi (ed.); Singh, L. P. (ed.) Mathematics and computing. 4th international conference, ICMC 2018, Varanasi, India, January 9–11, 2018. Revised selected papers. (English) Zbl 1411.65006 Communications in Computer and Information Science 834. Singapore: Springer (ISBN 978-981-13-0022-6/pbk; 978-981-13-0023-3/ebook). xix, 325 p. (2018). MSC: 65-06 68-06 00B25 00A69 PDFBibTeX XMLCite \textit{D. Ghosh} (ed.) et al., Mathematics and computing. 4th international conference, ICMC 2018, Varanasi, India, January 9--11, 2018. Revised selected papers. Singapore: Springer (2018; Zbl 1411.65006) Full Text: DOI
Ghosh, Debdas (ed.); Giri, Debasis (ed.); Mohapatra, Ram N. (ed.); Sakurai, Kouichi (ed.); Savas, Ekrem (ed.); Som, Tanmoy (ed.) Mathematics and computing. ICMC 2018, Varanasi, India, January 9–11, 2018. Selected contributions from the 4th international conference. (English) Zbl 1402.65008 Springer Proceedings in Mathematics & Statistics 253. Singapore: Springer (ISBN 978-981-13-2094-1/hbk; 978-981-13-2095-8/ebook). xvii, 470 p. (2018). MSC: 65-06 68-06 00B25 PDFBibTeX XMLCite \textit{D. Ghosh} (ed.) et al., Mathematics and computing. ICMC 2018, Varanasi, India, January 9--11, 2018. Selected contributions from the 4th international conference. Singapore: Springer (2018; Zbl 1402.65008) Full Text: DOI
Anada, Hiroaki (ed.); Morozov, Kirill (ed.); Suga, Yuji (ed.); Okumura, Shinya (ed.); Sakurai, Kouichi (ed.) IMI workshop of the joint research projects on secret sharing for dependability, usability and security of network storage and its mathematical modeling, Fukuoka, Japan, September 5–7, 2016. (English) Zbl 1367.68003 MI Lecture Note 73. Fukuoka: Kyushu University, Institute of Mathematics for Industry and Graduate School of Mathematics. xii, 211 p. (2017). MSC: 68-06 68M10 94A62 00B25 PDFBibTeX XMLCite \textit{H. Anada} (ed.) et al., IMI workshop of the joint research projects on secret sharing for dependability, usability and security of network storage and its mathematical modeling, Fukuoka, Japan, September 5--7, 2016. Fukuoka: Kyushu University, Institute of Mathematics for Industry and Graduate School of Mathematics (2017; Zbl 1367.68003)
Bag, Samiran; Sakurai, Kouichi Yet another note on block withholding attack on bitcoin mining pools. (English) Zbl 1397.94046 Bishop, Matt (ed.) et al., Information security. 19th international conference, ISC 2016, Honolulu, HI, USA, September 3–6, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-45870-0/pbk; 978-3-319-45871-7/ebook). Lecture Notes in Computer Science 9866, 167-180 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Bag} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 9866, 167--180 (2016; Zbl 1397.94046) Full Text: DOI
Adhikari, Avishek; Morozov, Kirill; Obana, Satoshi; Roy, Partha Sarathi; Sakurai, Kouichi; Xu, Rui Efficient threshold secret sharing schemes secure against rushing cheaters. (English) Zbl 1407.94166 Nascimento, Anderson C. A. (ed.) et al., Information theoretic security. 9th international conference, ICITS 2016, Tacoma, WA, USA, August 9–12, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10015, 3-23 (2016). MSC: 94A62 PDFBibTeX XMLCite \textit{A. Adhikari} et al., Lect. Notes Comput. Sci. 10015, 3--23 (2016; Zbl 1407.94166) Full Text: DOI
Bag, Samiran; Ruj, Sushmita; Sakurai, Kouichi On the application of clique problem for proof-of-work in cryptocurrencies. (English) Zbl 1409.94861 Lin, Dongdai (ed.) et al., Information security and cryptology. 11th international conference, Inscrypt 2015, Beijing, China, November 1–3, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9589, 260-279 (2016). MSC: 94A60 05C90 PDFBibTeX XMLCite \textit{S. Bag} et al., Lect. Notes Comput. Sci. 9589, 260--279 (2016; Zbl 1409.94861) Full Text: DOI
Anada, Hiroaki; Arita, Seiko; Sakurai, Kouichi Attribute-based two-tier signatures: definition and construction. (English) Zbl 1384.94025 Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 36-49 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Anada} et al., Lect. Notes Comput. Sci. 9558, 36--49 (2016; Zbl 1384.94025) Full Text: DOI
Yasuda, Takanori; Sakurai, Kouichi A multivariate encryption scheme with Rainbow. (English) Zbl 1384.94109 Qing, Sihan (ed.) et al., Information and communications security. 17th international conference, ICICS 2015, Beijing, China, December 9–11, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-29813-9/pbk; 978-3-319-29814-6/ebook). Lecture Notes in Computer Science 9543, 236-251 (2016). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{T. Yasuda} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 9543, 236--251 (2016; Zbl 1384.94109) Full Text: DOI
Lai, Junzuo; Deng, Robert H.; Ma, Changshe; Sakurai, Kouichi; Weng, Jian CCA-secure keyed-fully homomorphic encryption. (English) Zbl 1388.94067 Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). Lecture Notes in Computer Science 9614, 70-98 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Lai} et al., Lect. Notes Comput. Sci. 9614, 70--98 (2016; Zbl 1388.94067) Full Text: DOI Link
Yasuda, Takanori; Dahan, Xavier; Huang, Yun-Ju; Takagi, Tsuyoshi; Sakurai, Kouichi A multivariate quadratic challenge toward post-quantum generation cryptography. (English) Zbl 1365.94467 ACM Commun. Comput. Algebra 49, No. 3, 105-107 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Yasuda} et al., ACM Commun. Comput. Algebra 49, No. 3, 105--107 (2015; Zbl 1365.94467) Full Text: DOI
Tanaka, Satoshi; Cheng, Chen-Mou; Sakurai, Kouichi Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU. (English) Zbl 1327.94076 Mohapatra, Ram N. (ed.) et al., Mathematics and computing. Selected papers based on the presentations at the 2nd international conference, ICMC, Haldia, India, January 5–10, 2015. New Delhi: Springer (ISBN 978-81-322-2451-8/hbk; 978-81-322-2452-5/ebook). Springer Proceedings in Mathematics & Statistics 139, 349-361 (2015). MSC: 94A60 68W30 11T71 PDFBibTeX XMLCite \textit{S. Tanaka} et al., Springer Proc. Math. Stat. 139, 349--361 (2015; Zbl 1327.94076) Full Text: DOI
Weng, Jian; Zhao, Yunlei; Deng, Robert H.; Liu, Shengli; Yang, Yanjiang; Sakurai, Kouichi A note on the security of KHL scheme. (English) Zbl 1336.94075 Theor. Comput. Sci. 602, 1-6 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Weng} et al., Theor. Comput. Sci. 602, 1--6 (2015; Zbl 1336.94075) Full Text: DOI
Das, Angsuman; Adhikari, Avishek; Sakurai, Kouichi Plaintext checkable encryption with designated checker. (English) Zbl 1331.94052 Adv. Math. Commun. 9, No. 1, 37-53 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Das} et al., Adv. Math. Commun. 9, No. 1, 37--53 (2015; Zbl 1331.94052) Full Text: DOI
Liu, Shengli; Sakurai, Kouichi; Weng, Jian; Zhang, Fangguo; Zhao, Yunlei Security model and analysis of FHMQV, revisited. (English) Zbl 1347.94048 Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 255-269 (2014). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{S. Liu} et al., Lect. Notes Comput. Sci. 8567, 255--269 (2014; Zbl 1347.94048) Full Text: DOI
Yasuda, Takanori; Sakurai, Kouichi A security analysis of uniformly-layered Rainbow defined over non-commutative rings. (English) Zbl 1353.94078 Pac. J. Math. Ind. 6, 81-89 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Yasuda} and \textit{K. Sakurai}, Pac. J. Math. Ind. 6, 81--89 (2014; Zbl 1353.94078) Full Text: DOI
Yang, Yanjiang; Lu, Haibing; Weng, Jian; Zhang, Youcheng; Sakurai, Kouichi Fine-grained conditional proxy re-encryption and application. (English) Zbl 1368.94134 Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 206-222 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Yang} et al., Lect. Notes Comput. Sci. 8782, 206--222 (2014; Zbl 1368.94134) Full Text: DOI
Shikata, Yoshihiro (ed.); Sakurai, Kouichi (ed.); Yasuda, Takanori (ed.); Dahan, Xavier (ed.) Workshop on algebraic constructions as a fundamental keystone of a safe and secure society. Mathematics for guaranteeing the reliability of the cyber-society, Kyushu University, Fukuoka, Japan, August 26–30, 2013. (English, Japanese) Zbl 1296.00027 MI Lecture Note 53. Fukuoka: Kyushu University, Institute of Mathematics for Industry and Graduate School of Mathematics. xii, 158 p. (2013). MSC: 00A69 65-06 65Z99 PDFBibTeX XMLCite \textit{Y. Shikata} (ed.) et al., Workshop on algebraic constructions as a fundamental keystone of a safe and secure society. Mathematics for guaranteeing the reliability of the cyber-society, Kyushu University, Fukuoka, Japan, August 26--30, 2013 (Japanese). Fukuoka: Kyushu University, Institute of Mathematics for Industry and Graduate School of Mathematics (2013; Zbl 1296.00027) Full Text: Link
Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi Multivariate signature scheme using quadratic forms. (English) Zbl 1306.94098 Gaborit, Philippe (ed.), Post-quantum cryptography. 5th international workshop, PQCrypto 2013, Limoges, France, June 4–7, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38615-2/pbk). Lecture Notes in Computer Science 7932, 243-258 (2013). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{T. Yasuda} et al., Lect. Notes Comput. Sci. 7932, 243--258 (2013; Zbl 1306.94098) Full Text: DOI
Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi Application of scalar multiplication of Edwards curves to pairing-based cryptography. (English) Zbl 1292.94158 Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 19-36 (2012). MSC: 94A60 14H45 14G50 PDFBibTeX XMLCite \textit{T. Yasuda} et al., Lect. Notes Comput. Sci. 7631, 19--36 (2012; Zbl 1292.94158) Full Text: DOI
Zhao, Liang; Nishide, Takashi; Sakurai, Kouichi Differential fault analysis of full LBlock. (English) Zbl 1352.94074 Schindler, Werner (ed.) et al., Constructive side-channel analysis and secure design. Third international workshop, COSADE 2012, Darmstadt, Germany, May 3–4, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29911-7/pbk). Lecture Notes in Computer Science 7275, 135-150 (2012). MSC: 94A60 PDFBibTeX XML Full Text: DOI
Zhao, Liang; Nishide, Takashi; Adhikari, Avishek; Rhee, Kyung-Hyune; Sakurai, Kouichi Cryptanalysis of randomized arithmetic codes based on Markov model. (English) Zbl 1292.94164 Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 341-362 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Zhao} et al., Lect. Notes Comput. Sci. 7537, 341--362 (2012; Zbl 1292.94164) Full Text: DOI
Suga, Takanori; Nishide, Takashi; Sakurai, Kouichi Secure keyword search using Bloom filter with specified character positions. (English) Zbl 1304.68044 Takagi, Tsuyoshi (ed.) et al., Provable security. 6th international conference, ProvSec 2012, Chengdu, China, September 26–28, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33271-5/pbk). Lecture Notes in Computer Science 7496, 235-252 (2012). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{T. Suga} et al., Lect. Notes Comput. Sci. 7496, 235--252 (2012; Zbl 1304.68044) Full Text: DOI
Zhao, Fangming; Nishide, Takashi; Sakurai, Kouichi Multi-user keyword search scheme for secure data sharing with fine-grained access control. (English) Zbl 1365.94473 Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 406-418 (2012). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{F. Zhao} et al., Lect. Notes Comput. Sci. 7259, 406--418 (2012; Zbl 1365.94473) Full Text: DOI
Yasuda, Takanori; Sakurai, Kouichi; Takagi, Tsuyoshi Reducing the key size of rainbow using non-commutative rings. (English) Zbl 1292.94157 Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 68-83 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Yasuda} et al., Lect. Notes Comput. Sci. 7178, 68--83 (2012; Zbl 1292.94157) Full Text: DOI
Yasuda, Takanori; Sakurai, Kouichi A security analysis of uniformly-layered Rainbow. Revisiting Sato-Araki’s non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm. (English) Zbl 1290.94159 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 275-294 (2011). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{T. Yasuda} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 7071, 275--294 (2011; Zbl 1290.94159) Full Text: DOI
Hashimoto, Yasufumi; Takagi, Tsuyoshi; Sakurai, Kouichi General fault attacks on multivariate public key cryptosystems. (English) Zbl 1290.94084 Yang, Bo-Yin (ed.), Post-quantum cryptography. 4th international workshop, PQCrypto 2011, Taipei, Taiwan, November 29–December 2, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25404-8/pbk). Lecture Notes in Computer Science 7071, 1-18 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Hashimoto} et al., Lect. Notes Comput. Sci. 7071, 1--18 (2011; Zbl 1290.94084) Full Text: DOI
Zhao, Fangming; Nishide, Takashi; Sakurai, Kouichi Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. (English) Zbl 1325.68086 Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 83-97 (2011). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{F. Zhao} et al., Lect. Notes Comput. Sci. 6672, 83--97 (2011; Zbl 1325.68086) Full Text: DOI
Kim, Tai-hoon (ed.); Vasilakos, Thanos (ed.); Sakurai, Kouichi (ed.); Xiao, Yang (ed.); Zhao, Gansen (ed.); Ślęzak, Dominik (ed.) Communication and networking. International conference, FGCN 2010, held as part of the future generation information technology conference, FGIT 2010, Jeju Island, Korea, December 13–15, 2010. Proceedings, Part II. (English) Zbl 1207.68009 Communications in Computer and Information Science 120. Berlin: Springer (ISBN 978-3-642-17603-6/pbk; 978-3-642-17604-3/ebook). xvii, 471 p. (2010). MSC: 68-06 68M10 68M11 68M20 68T42 00B25 PDFBibTeX XMLCite \textit{T.-h. Kim} (ed.) et al., Communication and networking. International conference, FGCN 2010, held as part of the future generation information technology conference, FGIT 2010, Jeju Island, Korea, December 13--15, 2010. Proceedings, Part II. Berlin: Springer (2010; Zbl 1207.68009) Full Text: DOI
Zhu, Huafei; Araragi, Tadashi; Nishide, Takashi; Sakurai, Kouichi Adaptive and composable non-committing encryptions. (English) Zbl 1323.94146 Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5–7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 135-144 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Zhu} et al., Lect. Notes Comput. Sci. 6168, 135--144 (2010; Zbl 1323.94146) Full Text: DOI
Yamada, Hisashi; Takagi, Tsuyoshi; Sakurai, Kouichi On the zero-run length of a signed binary representation. (English) Zbl 1198.94167 J. Math-for-Ind. 1, No. A, 27-32 (2009). MSC: 94A62 14G50 PDFBibTeX XMLCite \textit{H. Yamada} et al., J. Math-for-Ind. 1, No. A, 27--32 (2009; Zbl 1198.94167) Full Text: Link
Chou, Bin-Hui; Takahashi, Kenichi; Hori, Yoshiaki; Sakurai, Kouichi Reconsidering data logging in light of digital forensics. (English) Zbl 1209.68076 Park, Jong Hyuk (ed.) et al., Advances in information security and its application. Third international conference, ISA 2009, Seoul, Korea, June 25–27, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02632-4/pbk; 978-3-642-02633-1/ebook). Communications in Computer and Information Science 36, 111-118 (2009). MSC: 68M99 68M11 PDFBibTeX XMLCite \textit{B.-H. Chou} et al., Commun. Comput. Inf. Sci. 36, 111--118 (2009; Zbl 1209.68076) Full Text: DOI
Han, Yi; Sakai, Akihiro; Hori, Yoshiaki; Sakurai, Kouichi Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks. (English) Zbl 1211.68022 Park, Jong Hyuk (ed.) et al., Advances in information security and its application. Third international conference, ISA 2009, Seoul, Korea, June 25–27, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02632-4/pbk; 978-3-642-02633-1/ebook). Communications in Computer and Information Science 36, 105-110 (2009). MSC: 68M11 68N99 PDFBibTeX XMLCite \textit{Y. Han} et al., Commun. Comput. Inf. Sci. 36, 105--110 (2009; Zbl 1211.68022) Full Text: DOI
Ślezak, D. (ed.); Kim, T.-H. (ed.); Chang, A. C.-C. (ed.); Vasilakos, T. (ed.); Li, M. (ed.); Sakurai, K. (ed.) Communication and networking. International conference, FGCN/ACN 2009, held as part of the future generation information technology conference, FGIT 2009, Jeju Island, Korea, December 10–12, 2009. Proceedings. (English) Zbl 1183.68059 Communications in Computer and Information Science 56. Berlin: Springer (ISBN 978-3-642-10843-3/pbk; 978-3-642-10844-0/ebook). xvii, 647 p. (2009). MSC: 68M10 68-06 68W05 68U35 00B25 PDFBibTeX XMLCite \textit{D. Ślezak} (ed.) et al., Communication and networking. International conference, FGCN/ACN 2009, held as part of the future generation information technology conference, FGIT 2009, Jeju Island, Korea, December 10--12, 2009. Proceedings. Berlin: Springer (2009; Zbl 1183.68059) Full Text: DOI
Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi Ternary subset difference method and its quantitative analysis. (English) Zbl 1352.94036 Chung, Kyo-Il (ed.) et al., Information security applications. 9th international workshop, WISA 2008, Jeju Island, Korea, September 23–25, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-00305-9/pbk). Lecture Notes in Computer Science 5379, 225-239 (2009). MSC: 94A60 PDFBibTeX XML Full Text: DOI
Wang, Yufeng; Hori, Yoshiaki; Sakurai, Kouichi Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network. (English) Zbl 1197.68021 Cai, Jin-Yi (ed.) et al., Theory and applications of models of computation. 4th international conference, TAMC 2007, Shanghai, China, May 22–25, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72503-9/pbk). Lecture Notes in Computer Science 4484, 362-373 (2007). MSC: 68M10 PDFBibTeX XMLCite \textit{Y. Wang} et al., Lect. Notes Comput. Sci. 4484, 362--373 (2007; Zbl 1197.68021) Full Text: DOI
Hada, Satoshi; Sakurai, Kouichi A note on the (im)possibility of using obfuscators to transform private-key encryption into public-key encryption. (English) Zbl 1391.94756 Miyaji, Atsuko (ed.) et al., Advances in information and computer security. Second international workshop on security, IWSEC 2007, Nara, Japan, October 29–31, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75650-7/pbk). Lecture Notes in Computer Science 4752, 1-12 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Hada} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 4752, 1--12 (2007; Zbl 1391.94756) Full Text: DOI
Yoshiura, Hiroshi (ed.); Sakurai, Kouichi (ed.); Rannenberg, Kai (ed.); Murayama, Yuko (ed.); Kawamura, Shinichi (ed.) Advances in information and computer security. First international workshop on security, IWSEC 2006, Kyoto, Japan, October 23–24, 2006. Proceedings. (English) Zbl 1151.68311 Lecture Notes in Computer Science 4266. Berlin: Springer (ISBN 978-3-540-47699-3/pbk). xiii, 438 p. (2006). MSC: 68-06 94-06 68P25 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{H. Yoshiura} (ed.) et al., Advances in information and computer security. First international workshop on security, IWSEC 2006, Kyoto, Japan, October 23--24, 2006. Proceedings. Berlin: Springer (2006; Zbl 1151.68311) Full Text: DOI
Imamoto, Kenji; Sakurai, Kouichi Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic. (English) Zbl 1272.94082 Degano, Pierpaolo (ed.) et al., Proceedings of the 2nd workshop on automated reasoning for security protocol analysis (ARSPA 2005), Lisbon, Portugal, July 16, 2005. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 135, No. 1, 79-94 (2005). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{K. Imamoto} and \textit{K. Sakurai}, Electron. Notes Theor. Comput. Sci. 135, No. 1, 79--94 (2005; Zbl 1272.94082) Full Text: Link
Lee, Wonil; Sakurai, Kouichi; Hong, Seokhie; Lee, Sangjin On the pseudorandomness of a modification of KASUMI type permutations. (English) Zbl 1133.94326 Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 313-329 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{W. Lee} et al., Lect. Notes Comput. Sci. 3506, 313--329 (2005; Zbl 1133.94326) Full Text: DOI
Sakai, Yasuyuki; Sakurai, Kouichi Simple power analysis on fast modular reduction with NIST recommended elliptic curves. (English) Zbl 1122.94401 Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 169-180 (2005). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{Y. Sakai} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 3783, 169--180 (2005; Zbl 1122.94401) Full Text: DOI
Wang, Guilin; Bao, Feng; Imamoto, Kenji; Sakurai, Kouichi Generic, optimistic, and efficient schemes for fair certified email delivery. (English) Zbl 1122.94439 Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 40-52 (2005). MSC: 94A62 68M12 PDFBibTeX XMLCite \textit{G. Wang} et al., Lect. Notes Comput. Sci. 3783, 40--52 (2005; Zbl 1122.94439) Full Text: DOI
Imamoto, Kenji; Zhou, Jianying; Sakurai, Kouichi An evenhanded certified email system for contract signing. (English) Zbl 1122.94421 Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 1-13 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{K. Imamoto} et al., Lect. Notes Comput. Sci. 3783, 1--13 (2005; Zbl 1122.94421) Full Text: DOI
Nandi, Mridul; Lee, Wonil; Sakurai, Kouichi; Lee, Sangjin Security analysis of a 2/3-rate double length compression function in the black-box model. (English) Zbl 1140.94364 Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 243-254 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Nandi} et al., Lect. Notes Comput. Sci. 3557, 243--254 (2005; Zbl 1140.94364) Full Text: DOI
Koga, Satoshi; Sakurai, Kouichi A distributed online certificate status protocol with a single public key. (English) Zbl 1198.94154 Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 389-401 (2004). MSC: 94A62 PDFBibTeX XMLCite \textit{S. Koga} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2947, 389--401 (2004; Zbl 1198.94154) Full Text: DOI
Han, Dong-Guk; Lim, Jongin; Sakurai, Kouichi On security of XTR public key cryptosystems against side channel attacks. (English) Zbl 1098.94614 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 454-465 (2004). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D.-G. Han} et al., Lect. Notes Comput. Sci. 3108, 454--465 (2004; Zbl 1098.94614) Full Text: DOI
Lee, Wonil; Nandi, Mridul; Sarkar, Palash; Chang, Donghoon; Lee, Sangjin; Sakurai, Kouichi A generalization of PGV-hash functions and security analysis in black-box model. (English) Zbl 1098.94622 Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 212-223 (2004). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{W. Lee} et al., Lect. Notes Comput. Sci. 3108, 212--223 (2004; Zbl 1098.94622) Full Text: DOI
Sakai, Yasuyuki; Sakurai, Kouichi A new attack with side channel leakage during exponent recoding computations. (English) Zbl 1104.68495 Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 298-311 (2004). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 3156, 298--311 (2004; Zbl 1104.68495) Full Text: DOI
Han, Dong-Guk; Izu, Tetsuya; Lim, Jongin; Sakurai, Kouichi Modified power-analysis attacks on XTR and an efficient countermeasure. (English) Zbl 1109.94346 Lopez, Javier (ed.) et al., Information and communications security. 6th international conference, ICICS 2004, Malaga, Spain, October 27–29, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23563-9/pbk). Lecture Notes in Computer Science 3269, 305-317 (2004). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{D.-G. Han} et al., Lect. Notes Comput. Sci. 3269, 305--317 (2004; Zbl 1109.94346) Full Text: DOI
Sakai, Yasuyuki; Sakurai, Kouichi Timing attack against implementation of a parallel algorithm for modular exponentiation. (English) Zbl 1131.68455 Zhou, Jianying (ed.) et al., Applied cryptography and network security. First international conference, ACNS 2003, Kunming, China, October 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20208-0/pbk). Lect. Notes Comput. Sci. 2846, 319-330 (2003). MSC: 68P25 68M07 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2846, 319--330 (2003; Zbl 1131.68455) Full Text: DOI
Choi, Jae-Gwi; Sakurai, Kouichi; Park, Ji-Hwan Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. (English) Zbl 1131.94327 Zhou, Jianying (ed.) et al., Applied cryptography and network security. First international conference, ACNS 2003, Kunming, China, October 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20208-0/pbk). Lect. Notes Comput. Sci. 2846, 265-279 (2003). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{J.-G. Choi} et al., Lect. Notes Comput. Sci. 2846, 265--279 (2003; Zbl 1131.94327) Full Text: DOI
Furuya, Soichi; Sakurai, Kouichi Single-path authenticated-encryption scheme based on universal hashing. (English) Zbl 1027.68597 Nyberg, Kaisa (ed.) et al., Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John’s, Newfoundland, Canada, August 15-16, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2595, 94-109 (2003). MSC: 68P25 94A62 94A60 PDFBibTeX XMLCite \textit{S. Furuya} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2595, 94--109 (2003; Zbl 1027.68597) Full Text: Link
Sakurai, Kouichi; Takagi, Tsuyoshi A reject timing attack on an IND-CCA2 public-key cryptosystem. (English) Zbl 1031.94526 Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 359-373 (2003). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Sakurai} and \textit{T. Takagi}, Lect. Notes Comput. Sci. 2587, 359--373 (2003; Zbl 1031.94526) Full Text: Link
Sakurai, Kouichi; Takagi, Tsuyoshi New semantically secure public-key cryptosystems from the RSA-primitive. (English) Zbl 1055.94530 Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 1-16 (2002). MSC: 94A60 68Q25 PDFBibTeX XMLCite \textit{K. Sakurai} and \textit{T. Takagi}, Lect. Notes Comput. Sci. 2274, 1--16 (2002; Zbl 1055.94530) Full Text: Link
Furuya, Soichi; Sakurai, Kouichi Risks with raw-key masking – the security evaluation of 2-key XCBC. (English) Zbl 1023.94524 Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 327-341 (2002). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Furuya} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2513, 327--341 (2002; Zbl 1023.94524) Full Text: Link
Okeya, Katsuyuki; Sakurai, Kouichi Fast multi-scalar multiplication methods on elliptic curves with precomputation strategy using Montgomery trick. (English) Zbl 1028.94025 Kaliski, Burton S. jun. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2002. 4th international workshop, Redwood Shores, CA, USA, August 13-15, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2523, 564-578 (2002). MSC: 94A60 14G50 68M07 68W40 PDFBibTeX XMLCite \textit{K. Okeya} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2523, 564--578 (2002; Zbl 1028.94025) Full Text: Link
Imamoto, Kenji; Sakurai, Kouichi A certified e-mail system with receiver’s selective usage of delivery authority. (English) Zbl 1033.94559 Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 326-338 (2002). MSC: 94A62 68U35 PDFBibTeX XMLCite \textit{K. Imamoto} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2551, 326--338 (2002; Zbl 1033.94559) Full Text: Link
Sakurai, Kouichi; Takagi, Tsuyoshi On the security of a modified Paillier public-key primitive. (English) Zbl 1024.94514 Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 436-448 (2002). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Sakurai} and \textit{T. Takagi}, Lect. Notes Comput. Sci. 2384, 436--448 (2002; Zbl 1024.94514) Full Text: Link
Okeya, Katsuyuki; Sakurai, Kouichi On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling. (English) Zbl 1024.94512 Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 420-435 (2002). MSC: 94A60 68P25 14G50 PDFBibTeX XMLCite \textit{K. Okeya} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2384, 420--435 (2002; Zbl 1024.94512) Full Text: Link
Sakai, Yasuyuki; Sakurai, Kouichi Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint Hamming weight representation of scalars. (English) Zbl 1019.68577 Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 484-499 (2002). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2433, 484--499 (2002; Zbl 1019.68577) Full Text: Link
Okeya, Katsuyuki; Sakurai, Kouichi A second-order DPA attack breaks a window-method based countermeasure against side channel attacks. (English) Zbl 1019.68574 Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 389-401 (2002). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{K. Okeya} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2433, 389--401 (2002; Zbl 1019.68574) Full Text: Link
Yabe, T.; Ogata, Y.; Takizawa, K.; Kawai, T.; Segawa, A.; Sakurai, K. The next generation CIP as a conservative semi-Lagrangian solver for solid, liquid and gas. (English) Zbl 1058.76055 J. Comput. Appl. Math. 149, No. 1, 267-277 (2002). MSC: 76M25 76T30 76-02 PDFBibTeX XMLCite \textit{T. Yabe} et al., J. Comput. Appl. Math. 149, No. 1, 267--277 (2002; Zbl 1058.76055) Full Text: DOI
Sakurai, K.; Aoki, T.; Lee, W.-H.; Kato, K. Poisson equation solver with fourth-order accuracy by using interpolated differential operator scheme. (English) Zbl 0999.65114 Comput. Math. Appl. 43, No. 6-7, 621-630 (2002). MSC: 65N06 65N55 35J05 65Y05 65N15 PDFBibTeX XMLCite \textit{K. Sakurai} et al., Comput. Math. Appl. 43, No. 6--7, 621--630 (2002; Zbl 0999.65114) Full Text: DOI
Okeya, Katsuyuki; Miyazaki, Kunihiko; Sakurai, Kouichi A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks. (English) Zbl 0999.94541 Kim, Kwangjo (ed.), Information security and cryptology - ICISC 2001. 4th international conference, Seoul, Korea, December 6-7, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2288, 428-439 (2002). MSC: 94A60 14G50 11T71 94C12 PDFBibTeX XMLCite \textit{K. Okeya} et al., Lect. Notes Comput. Sci. 2288, 428--439 (2002; Zbl 0999.94541)
Nishioka, Mototsugu; Satoh, Hisayoshi; Sakurai, Kouichi Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring. (English) Zbl 0999.94529 Kim, Kwangjo (ed.), Information security and cryptology - ICISC 2001. 4th international conference, Seoul, Korea, December 6-7, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2288, 81-102 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. Nishioka} et al., Lect. Notes Comput. Sci. 2288, 81--102 (2002; Zbl 0999.94529)
Buchmann, Johannes; Sakurai, Kouichi; Takagi, Tsuyoshi An IND-CCA2 public-key cryptosystem with fast decryption. (English) Zbl 0999.94527 Kim, Kwangjo (ed.), Information security and cryptology - ICISC 2001. 4th international conference, Seoul, Korea, December 6-7, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2288, 51-71 (2002). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Buchmann} et al., Lect. Notes Comput. Sci. 2288, 51--71 (2002; Zbl 0999.94527)
Sakai, Yasuyuki; Sakurai, Kouichi On the power of multidoubling in speeding up elliptic scalar multiplication. (English) Zbl 1067.94560 Vaudenay, Serge (ed.) et al., Selected areas in cryptography. 8th annual international workshop, SAC 2001, Toronto, Ontario, Canada, August 16–17, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43066-0). Lect. Notes Comput. Sci. 2259, 268-283 (2001). MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{Y. Sakai} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2259, 268--283 (2001; Zbl 1067.94560) Full Text: Link
Okeya, Katsuyuki; Sakurai, Kouichi Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the \(y\)-coordinate on a Montgomery-form elliptic curve. (English) Zbl 1012.94551 Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2001. 3rd international workshop, Paris, France, May 14-16, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2162, 126-141 (2001). MSC: 94A60 14G50 68P25 PDFBibTeX XMLCite \textit{K. Okeya} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 2162, 126--141 (2001; Zbl 1012.94551) Full Text: Link
Di Crescenzo, Giovanni; Sakurai, Kouichi; Yung, Moti On zero-knowledge proofs: “from membership to decision” (extended abstract). (English) Zbl 1296.68077 Proceedings of the thirty-second annual ACM symposium on theory of computing (STOC 2000), Portland, Oregon, USA, May 21–23, 2000. New York, NY: ACM Press (ISBN 1-58113-184-4). 255-264 (2000). MSC: 68Q25 94A60 PDFBibTeX XMLCite \textit{G. Di Crescenzo} et al., in: Proceedings of the thirty-second annual ACM symposium on theory of computing, STOC 2000. Portland, Oregon, USA, May 21--23, 2000. New York, NY: ACM Press. 255--264 (2000; Zbl 1296.68077) Full Text: DOI
Sakurai, Kouichi; Miyazaki, Shingo An anonymous electronic bidding protocol based on a new convertible group signature scheme. On the importance of hiding the winner’s identity against bid-rigging. (English) Zbl 0963.94519 Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 385-399 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{K. Sakurai} and \textit{S. Miyazaki}, Lect. Notes Comput. Sci. 1841, 385--399 (2000; Zbl 0963.94519)
Sakai, Yasuyuki; Sakurai, Kouichi Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance. (English) Zbl 0963.94017 Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 59-73 (2000). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 1841, 59--73 (2000; Zbl 0963.94017)
Okeya, Katsuyuki; Sakurai, Kouichi Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. (English) Zbl 0963.94026 Roy, Bimal (ed.) et al., Progress in cryptology - INDOCRYPT 2000. 1st international conference in cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1977, 178-190 (2000). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Okeya} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 1977, 178--190 (2000; Zbl 0963.94026)
Duursma, Iwan; Sakurai, Kouichi Efficient algorithms for the Jacobian variety of hyperelliptic curves \(y^2=x^p-x+1\) over a finite field of odd characteristic \(p\). (English) Zbl 1009.11047 Buchmann, Johannes (ed.) et al., Coding theory, cryptography and related areas. Proceedings of an international conference, Guanajuato, Mexico, April 1998. Berlin: Springer. 73-89 (2000). MSC: 11G20 11T71 94A60 PDFBibTeX XMLCite \textit{I. Duursma} and \textit{K. Sakurai}, in: Coding theory, cryptography and related areas. Proceedings of an international conference, Guanajuato, Mexico, April 1998. Berlin: Springer. 73--89 (2000; Zbl 1009.11047)
Inoue, Toru; Sakurai, Kouichi Making hash functions from block ciphers secure and efficient by using convolutional codes. (English) Zbl 0969.94017 Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 391-404 (2000). MSC: 94A60 68P25 94B10 PDFBibTeX XMLCite \textit{T. Inoue} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 1751, 391--404 (2000; Zbl 0969.94017)
Okeya, Katsuyuki; Kurumatani, Hiroyuki; Sakurai, Kouichi Elliptic curves with the Montgomery-form and their cryptographic applications. (English) Zbl 0969.94021 Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 238-257 (2000). MSC: 94A60 11G05 14G50 11T71 PDFBibTeX XMLCite \textit{K. Okeya} et al., Lect. Notes Comput. Sci. 1751, 238--257 (2000; Zbl 0969.94021)
Tamura, Tetsuya; Sakurai, Kouichi; Matsumoto, Tsutomu A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems. (English) Zbl 1032.94527 Song, JooSeok (ed.), Information security and cryptology - ICISC ’99. 2nd international conference, Seoul, Korea, December 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1787, 221-235 (1999). MSC: 94A60 PDFBibTeX XMLCite \textit{T. Tamura} et al., Lect. Notes Comput. Sci. 1787, 221--235 (1999; Zbl 1032.94527)
Miyazaki, Shingo; Sakurai, Kouichi; Yung, Moti On threshold RSA-signing with no dealer. (English) Zbl 1032.94519 Song, JooSeok (ed.), Information security and cryptology - ICISC ’99. 2nd international conference, Seoul, Korea, December 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1787, 197-207 (1999). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Miyazaki} et al., Lect. Notes Comput. Sci. 1787, 197--207 (1999; Zbl 1032.94519)
Sakai, Yasuyuki; Sakurai, Kouichi Over \(F_p\) vs. over \(F_{2^n}\) and on Pentium vs. on Alpha in software implementation of hyperelliptic curve cryptosystems. (English) Zbl 1032.94525 Song, JooSeok (ed.), Information security and cryptology - ICISC ’99. 2nd international conference, Seoul, Korea, December 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1787, 82-101 (1999). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 1787, 82--101 (1999; Zbl 1032.94525)
Miyazaki, Shingo; Sakurai, Kouichi Key generation and decryption algorithms for distributed RSA cryptosystems. (Japanese) Zbl 0951.94545 RIMS Kokyuroku 1093, 156-161 (1999). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Miyazaki} and \textit{K. Sakurai}, RIMS Kokyuroku 1093, 156--161 (1999; Zbl 0951.94545)
Miyazaki, Shingo; Kuroda, Ikuko; Sakurai, Kouichi Toward fair international key escrow – an attempt by distributed trusted third agencies with threshold cryptography. (English) Zbl 0929.94007 Imai, Hideki (ed.) et al., Public key cryptography. 2nd international workshop on Practice and theory in public key cryptography, PKC ’99. Kamakura, Japan, March 1–3, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1560, 171-187 (1999). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Miyazaki} et al., Lect. Notes Comput. Sci. 1560, 171--187 (1999; Zbl 0929.94007)
Burmester, Mike; Desmedt, Yvo G.; Itoh, Toshiya; Sakurai, Kouichi; Shizuya, Hiroki Divertible and subliminal-free zero-knowledge proofs for languages. (English) Zbl 1013.68083 J. Cryptology 12, No. 3, 197-223 (1999). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{M. Burmester} et al., J. Cryptology 12, No. 3, 197--223 (1999; Zbl 1013.68083) Full Text: DOI
Sakurai, Kouichi; Yamane, Yoshinori; Miyazaki, Shingo; Inoue, Tohru A key escrow system with protecting user’s privacy by blind decoding. (English) Zbl 0930.94032 Okamoto, Eiji (ed.) et al., Information security. 1st international workshop, ISW ’97, Tatsunokuchi, Ishikawa, Japan, September 17–19, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1396, 147-157 (1998). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Sakurai} et al., Lect. Notes Comput. Sci. 1396, 147--157 (1998; Zbl 0930.94032) Full Text: DOI
Sakai, Yasuyuki; Sakurai, Kouichi Design of hyperelliptic cryptosystems in small characteristic and a software implementation over \(F_{2^n}\). (English) Zbl 1058.94523 Ohta, Kazuo (ed.) et al., Advances in cryptology - ASIACRYPT ’98. International conference on the Theory and application of cryptology and information security, Beijing, China, October 18–22, 1998. Proceedings. Berlin: Springer (ISBN 3-540-65109-8). Lect. Notes Comput. Sci. 1514, 80-94 (1998). MSC: 94A60 11Y16 PDFBibTeX XMLCite \textit{Y. Sakai} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 1514, 80--94 (1998; Zbl 1058.94523)
Dannoura, Eisuke; Sakurai, Kouichi An improvement on El-Yaniv-Fiat-Karp-Turpin’s money-making bi-directional trading strategy. (English) Zbl 0937.91061 Inf. Process. Lett. 66, No. 1, 27-33 (1998). Reviewer: H.Peters (Maastricht) MSC: 91G60 91-08 PDFBibTeX XMLCite \textit{E. Dannoura} and \textit{K. Sakurai}, Inf. Process. Lett. 66, No. 1, 27--33 (1998; Zbl 0937.91061) Full Text: DOI
David, Michael W.; Sakurai, Kouichi Security issues for contactless smart cards. (English) Zbl 1067.94527 Imai, Hideki (ed.) et al., Public key cryptography. 1st international workshop on practice and theory in public key cryptography, PKC ’98, Pacifico Yokohama, Japan, February 5–6, 1998. Proceedings. Berlin: Springer (ISBN 3-540-64693-0). Lect. Notes Comput. Sci. 1431, 247-252 (1998). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M. W. David} and \textit{K. Sakurai}, Lect. Notes Comput. Sci. 1431, 247--252 (1998; Zbl 1067.94527) Full Text: Link
Sakai, Yasuyuki; Sakurai, Kouichi; Ishizuka, Hirokazu Secure hyperelliptic cryptosystems and their performance. (English) Zbl 1067.94561 Imai, Hideki (ed.) et al., Public key cryptography. 1st international workshop on practice and theory in public key cryptography, PKC ’98, Pacifico Yokohama, Japan, February 5–6, 1998. Proceedings. Berlin: Springer (ISBN 3-540-64693-0). Lect. Notes Comput. Sci. 1431, 164-181 (1998). MSC: 94A60 14G50 PDFBibTeX XMLCite \textit{Y. Sakai} et al., Lect. Notes Comput. Sci. 1431, 164--181 (1998; Zbl 1067.94561) Full Text: Link
Di Crescenzo, Giovanni; Sakurai, Kouichi; Yung, Moti Result-indistinguishable zero-knowledge proofs: Increased power and constant-round protocols. (English) Zbl 0903.94028 Morvan, Michel (ed.) et al., STACS 98. 15th annual symposium on Theoretical aspects of computer science. Paris, France, February 25–27, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1373, 511-521 (1998). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{G. Di Crescenzo} et al., Lect. Notes Comput. Sci. 1373, 511--521 (1998; Zbl 0903.94028)
Sakurai, Kouichi; Shizuya, Hiroki A structural comparison of the computational difficulty of breaking discrete log cryptosystems. (English) Zbl 0903.94043 J. Cryptology 11, No. 1, 29-43 (1998). Reviewer: J.Vyskoč (Bratislava) MSC: 94A60 68Q99 PDFBibTeX XMLCite \textit{K. Sakurai} and \textit{H. Shizuya}, J. Cryptology 11, No. 1, 29--43 (1998; Zbl 0903.94043) Full Text: DOI
Sakurai, Kouichi; Furuya, Souichi Improving linear cryptanalysis of LOKI91 by probabilistic counting method. (English) Zbl 1385.94069 Biham, Eli (ed.), Fast software encryption. 4th international workshop, FSE ’97, Haifa, Israel, January 20–22, 1997. Proceedings. Berlin: Springer (ISBN 3-540-63247-6). Lect. Notes Comput. Sci. 1267, 114-133 (1997). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Sakurai} and \textit{S. Furuya}, Lect. Notes Comput. Sci. 1267, 114--133 (1997; Zbl 1385.94069) Full Text: DOI
Mambo, Masahiro; Okamoto, Eiji; Sakurai, Kouichi Protection of data and delegated keys in digital distribution. (English) Zbl 0989.94510 Varadharajan, Vijay (ed.) et al., Information security and privacy. 2nd Australasian conference, ACISP ’97. Sidney, NSW, Australia. July 7-9, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1270, 271-282 (1997). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Mambo} et al., Lect. Notes Comput. Sci. 1270, 271--282 (1997; Zbl 0989.94510)
Yanbe, Akio; Sakurai, Kouichi Design and analysis of optimal strategies for on-line lookahead paging games. (Japanese) Zbl 0942.68543 RIMS Kokyuroku 992, 229-235 (1997). MSC: 68N25 68Q25 PDFBibTeX XMLCite \textit{A. Yanbe} and \textit{K. Sakurai}, RIMS Kokyuroku 992, 229--235 (1997; Zbl 0942.68543)
Yanbe, Akio; Sakurai, Kouichi The computational complexity of the on-line \(k\)-server game. (Japanese. English summary) Zbl 0925.90414 RIMS Kokyuroku 978, 89-96 (1997). MSC: 91A46 68Q25 PDFBibTeX XMLCite \textit{A. Yanbe} and \textit{K. Sakurai}, RIMS Kokyuroku 978, 89--96 (1997; Zbl 0925.90414)
Sakurai, Kouichi Practical proofs of knowledge without relying on theoretical proofs of membership on languages. (English) Zbl 0901.68049 Theor. Comput. Sci. 181, No. 2, 317-335 (1997). MSC: 68P25 68M10 PDFBibTeX XMLCite \textit{K. Sakurai}, Theor. Comput. Sci. 181, No. 2, 317--335 (1997; Zbl 0901.68049) Full Text: DOI