Kaoru Kurosawa

From MaRDI portal
Revision as of 18:09, 24 September 2023 by Import230924090903 (talk | contribs) (Created automatically from import230924090903)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:175146

Available identifiers

zbMath Open kurosawa.kaoruMaRDI QIDQ175146

List of research outcomes

PublicationDate of PublicationType
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not $$\mathtt {q}$$ -type) Assumptions2024-03-14Paper
How to Solve Multiple Short-Exponent Discrete Logarithm Problem2024-03-14Paper
New bound for affine resolvable designs and its application to authentication codes2023-12-12Paper
On the optimal communication complexity of error-correcting multi-server PIR2023-08-14Paper
More Efficient Construction of Bounded KDM Secure Encryption2022-07-01Paper
Optimum attack on 3-round Feistel-2 structure2022-04-22Paper
Bit-Slice Auction Circuit2022-02-16Paper
Efficient No-dictionary Verifiable Searchable Symmetric Encryption2021-03-17Paper
How to correct errors in multi-server PIR2020-05-05Paper
IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions2018-11-26Paper
UC-secure dynamic searchable symmetric encryption scheme2018-10-24Paper
How to solve DLOG problem with auxiliary input2018-10-24Paper
How to prove KDM security of BHHO2018-10-24Paper
Anonymous and leakage resilient IBE and IPE2017-10-06Paper
One-Wayness Equivalent to General Factoring2017-08-08Paper
Truly Efficient $2$-Round Perfectly Secure Message Transmission Scheme2017-08-08Paper
Power of a Public Random Permutation and Its Application to Authenticated Encryption2017-07-27Paper
General Error Decodable Secret Sharing Scheme and Its Application2017-07-12Paper
How to make a linear network code (strongly) secure2017-02-17Paper
Combinatorial lower bounds for secret sharing schemes2016-05-26Paper
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints2016-03-02Paper
IBE Under $$k$$-LIN with Shorter Ciphertexts and Private Keys2015-10-20Paper
How to Construct Strongly Secure Network Coding Scheme2015-09-30Paper
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces2015-09-30Paper
Improved reconstruction of RSA private-keys from their fraction2015-05-21Paper
How to Factor N 1 and N 2 When $p_1=p_2 \bmod 2^t$2014-09-15Paper
Optimum Secret Sharing Scheme Secure against Cheating2014-08-20Paper
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited2014-06-24Paper
2-Pass Key Exchange Protocols from CPA-Secure KEM2014-03-28Paper
Leakage Resilient IBE and IPE under the DLIN Assumption2014-01-24Paper
New leakage-resilient CCA-secure public key encryption2014-01-23Paper
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions2012-09-07Paper
Round-efficient perfectly secure message transmission scheme against general adversary2012-03-23Paper
Generic Fully Simulatable Adaptive Oblivious Transfer2011-06-28Paper
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary2011-06-28Paper
The Round Complexity of Perfectly Secure General VSS2011-05-19Paper
Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)2010-12-07Paper
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption2010-09-10Paper
Provably Secure Convertible Undeniable Signatures with Unambiguity2010-09-10Paper
A new and improved paradigm for hybrid encryption secure against chosen-ciphertext attack2010-03-01Paper
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes2010-02-09Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Fast Software Encryption2010-01-05Paper
Simple Adaptive Oblivious Transfer without Random Oracle2009-12-15Paper
Almost Secure (1-Round, n-Channel) Message Transmission Scheme2009-12-03Paper
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes2009-07-07Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions2009-02-24Paper
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption2009-02-10Paper
The power of identification schemes2009-01-15Paper
Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification2009-01-09Paper
New Covering Radius of Reed–Muller Codes for<tex>$t$</tex>-Resilient Functions2008-12-21Paper
Almost Security of Cryptographic Boolean Functions2008-12-21Paper
The security of the FDH variant of Chaum's undeniable signature scheme2008-12-21Paper
Primal-Dual Distance Bounds of Linear Codes With Application to Cryptography2008-12-21Paper
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security2008-12-21Paper
Relations Among Security Notions for Undeniable Signature Schemes2008-11-27Paper
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort2008-11-20Paper
Universally Composable Undeniable Signature2008-08-19Paper
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring2008-06-24Paper
Birthday Paradox for Multi-collisions2008-05-06Paper
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM2008-05-06Paper
3-Move Undeniable Signature Scheme2008-05-06Paper
Small Secret Key Attack on a Variant of RSA (Due to Takagi)2008-04-24Paper
New Approach for Selectively Convertible Undeniable Signature Schemes2008-04-24Paper
Tag-KEM/DEM: A new framework for hybrid encryption2008-04-16Paper
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme2008-04-15Paper
Progress in Cryptology - INDOCRYPT 20032007-11-29Paper
Cryptography and Coding2007-11-28Paper
Immunity against correlation attack on quantum stream cipher by Yuen 2000 protocol2007-09-20Paper
An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge2007-09-11Paper
Tag-KEM from Set Partial Domain One-Way Permutations2007-09-07Paper
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi’s RSA2007-09-04Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Public Key Cryptography - PKC 20062007-05-02Paper
Information Security2006-10-20Paper
Fast Software Encryption2006-06-22Paper
Optimum Secret Sharing Scheme Secure against Cheating2006-06-01Paper
https://portal.mardi4nfdi.de/entity/Q33749372006-03-01Paper
Information Security and Cryptology - ICISC 20032005-12-27Paper
Public Key Cryptography - PKC 20052005-12-07Paper
Information Security and Privacy2005-09-07Paper
Information Security and Privacy2005-09-07Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
https://portal.mardi4nfdi.de/entity/Q30463502004-08-12Paper
Round Security and Super-Pseudorandomness of MISTY Type Structure2004-08-12Paper
https://portal.mardi4nfdi.de/entity/Q47364232004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439262004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439362004-08-09Paper
Oblivious keyword search2004-08-06Paper
https://portal.mardi4nfdi.de/entity/Q44740902004-08-04Paper
New combinatorial designs and their applications to authentication codes and secret sharing schemes.2004-03-29Paper
Non-cryptographic primitive for pseudorandom permutation.2004-03-14Paper
https://portal.mardi4nfdi.de/entity/Q44507402004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44507822004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44507832004-02-16Paper
Algebraic multidimensional phase unwrapping and zero distribution of complex polynomials-characterization of multivariate stable polynomials2003-12-02Paper
https://portal.mardi4nfdi.de/entity/Q44185252003-08-10Paper
https://portal.mardi4nfdi.de/entity/Q44133272003-07-17Paper
Bounds for Robust Metering Schemes and Their Relationship with A2-code2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q45362652003-01-25Paper
https://portal.mardi4nfdi.de/entity/Q45379942002-10-13Paper
https://portal.mardi4nfdi.de/entity/Q27245802002-09-01Paper
On the bound for anonymous secret sharing schemes2002-08-29Paper
https://portal.mardi4nfdi.de/entity/Q43306332002-05-14Paper
https://portal.mardi4nfdi.de/entity/Q43306412002-05-14Paper
Combinatorial classification of optimal authentication codes with arbitration2002-01-31Paper
https://portal.mardi4nfdi.de/entity/Q27627632002-01-09Paper
Almost \(k\)-wise independent sample spaces and their cryptologic applications2002-01-02Paper
https://portal.mardi4nfdi.de/entity/Q27572522001-11-25Paper
Combinatorial bounds on authentication codes with arbitration.2001-07-03Paper
https://portal.mardi4nfdi.de/entity/Q27074332001-07-03Paper
https://portal.mardi4nfdi.de/entity/Q27074152001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45207652001-02-27Paper
https://portal.mardi4nfdi.de/entity/Q45205052001-02-26Paper
Bounds and combinatorial structure of \((k,n)\) multi-receiver \(A\)-codes2001-02-18Paper
https://portal.mardi4nfdi.de/entity/Q45024802000-09-12Paper
https://portal.mardi4nfdi.de/entity/Q45024862000-09-12Paper
Strongly universal hashing and identification codes via channels2000-09-07Paper
A relationship between linear complexity and k-error linear complexity2000-09-07Paper
MDS secret-sharing scheme secure against cheaters2000-09-07Paper
https://portal.mardi4nfdi.de/entity/Q45015012000-09-04Paper
https://portal.mardi4nfdi.de/entity/Q43140392000-06-21Paper
On a fallacious bound for authentication codes2000-05-22Paper
https://portal.mardi4nfdi.de/entity/Q49406922000-03-01Paper
https://portal.mardi4nfdi.de/entity/Q49347042000-01-31Paper
https://portal.mardi4nfdi.de/entity/Q49347142000-01-31Paper
New combinatorial bounds for authentication codes and key predistribution schemes1999-11-14Paper
Efficient Rabin-type digital signature scheme1999-10-10Paper
https://portal.mardi4nfdi.de/entity/Q42565501999-09-13Paper
https://portal.mardi4nfdi.de/entity/Q42496341999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q42492851999-06-17Paper
https://portal.mardi4nfdi.de/entity/Q42467321999-06-15Paper
A2-code = Affine resolvable + BIBD1998-07-03Paper
https://portal.mardi4nfdi.de/entity/Q43736611998-01-21Paper
https://portal.mardi4nfdi.de/entity/Q43434131997-11-23Paper
https://portal.mardi4nfdi.de/entity/Q43424721997-07-20Paper
https://portal.mardi4nfdi.de/entity/Q43416721997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43416911997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43417771997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43417791997-06-18Paper
https://portal.mardi4nfdi.de/entity/Q43418041997-06-18Paper
Veto is impossible in secret sharing schemes1997-02-27Paper
Fast stability test algorithm for discrete time systems1997-02-27Paper
https://portal.mardi4nfdi.de/entity/Q42795861994-09-20Paper
https://portal.mardi4nfdi.de/entity/Q40368941993-05-18Paper
New noninteractive identity-based key distribution system1992-06-25Paper
M mod 3 security of RSA1989-01-01Paper
Cryptographically secure pseudorandom sequence generator based on reciprocal number cryptosystem1988-01-01Paper
PUBLIC KEY CRYPTOSYSTEM USING A RECIPROCAL NUMBER WITH THE SAME INTRACTABILITY AS FACTORING A LARGE NUMBER1988-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Kaoru Kurosawa