The following pages link to Kouichi Sakurai (Q497668):
Displaying 50 items.
- A note on the security of KHL scheme (Q497669) (← links)
- A security analysis of uniformly-layered Rainbow defined over non-commutative rings (Q890605) (← links)
- An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy (Q1129108) (← links)
- Divertible and subliminal-free zero-knowledge proofs for languages (Q1304980) (← links)
- A short certificate of the number of universal optimal strategies for stopping simple stochastic games (Q1350746) (← links)
- A structural comparison of the computational difficulty of breaking discrete log cryptosystems (Q1382147) (← links)
- Practical proofs of knowledge without relying on theoretical proofs of membership on languages (Q1391315) (← links)
- Yet another note on block withholding attack on bitcoin mining pools (Q1799195) (← links)
- Plaintext checkable encryption with designated checker (Q2018428) (← links)
- Visual secret sharing scheme with distributed levels of importance of shadows (Q2050665) (← links)
- Theory and application of computationally-independent one-way functions: interactive proof of ability -- revisited (Q2050672) (← links)
- Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions (Q2235756) (← links)
- Analysis of variance of graph-clique mining for scalable proof of work (Q2331941) (← links)
- (Q2707604) (← links)
- (Q2721119) (← links)
- (Q2721168) (← links)
- (Q2757257) (← links)
- CCA-Secure Keyed-Fully Homomorphic Encryption (Q2798772) (← links)
- A Multivariate Encryption Scheme with Rainbow (Q2801772) (← links)
- Attribute-Based Two-Tier Signatures: Definition and Construction (Q2806760) (← links)
- (Q2848482) (← links)
- Reducing the Key Size of Rainbow Using Non-commutative Rings (Q2889995) (← links)
- Fine-Grained Conditional Proxy Re-Encryption and Application (Q2948152) (← links)
- Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters (Q2953805) (← links)
- Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems (Q3001865) (← links)
- (Q3043923) (← links)
- Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network (Q3053049) (← links)
- General Fault Attacks on Multivariate Public Key Cryptosystems (Q3102780) (← links)
- A Security Analysis of Uniformly-Layered Rainbow (Q3102798) (← links)
- Adaptive and Composable Non-committing Encryptions (Q3163101) (← links)
- Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control (Q3166835) (← links)
- On zero-knowledge proofs (extended abstract) (Q3191992) (← links)
- Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU (Q3449432) (← links)
- Security Model and Analysis of FHMQV, Revisited (Q3454157) (← links)
- A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption (Q3515100) (← links)
- Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks (Q3558801) (← links)
- Reconsidering Data Logging in Light of Digital Forensics (Q3558803) (← links)
- Ternary Subset Difference Method and Its Quantitative Analysis (Q3605394) (← links)
- EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE (Q3828112) (← links)
- (Q3840091) (← links)
- (Q3840101) (← links)
- (Q4035725) (← links)
- On the Complexity of Hyperelliptic Discrete Logarithm Problem (Q4037478) (← links)
- Fuchsian Systems Associated with the $P^2 (\mathbb{F}_2 )$-Arrangement (Q4204419) (← links)
- (Q4249256) (← links)
- A key escrow system with protecting user's privacy by blind decoding (Q4251015) (← links)
- (Q4253364) (← links)
- (Q4253434) (← links)
- (Q4263432) (← links)
- (Q4279694) (← links)