Kouichi Sakurai

From MaRDI portal
Person:497668

Available identifiers

zbMath Open sakurai.kouichiMaRDI QIDQ497668

List of research outcomes





PublicationDate of PublicationType
Tree parity machine-based symmetric encryption: a hybrid approach2024-10-29Paper
On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms2024-03-14Paper
On the complexity of computational problems associated with simple stochastic games2024-01-29Paper
On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes2023-12-12Paper
Explicit non-malleable codes from bipartite graphs2023-08-10Paper
Attribute based tracing for securing group signatures against centralized authorities2023-08-04Paper
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness2023-06-30Paper
Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis2023-01-25Paper
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions2021-10-21Paper
Theory and application of computationally-independent one-way functions: interactive proof of ability -- revisited2021-08-31Paper
Visual secret sharing scheme with distributed levels of importance of shadows2021-08-31Paper
Analysis of variance of graph-clique mining for scalable proof of work2019-10-31Paper
Yet another note on block withholding attack on bitcoin mining pools2018-10-18Paper
Improving linear cryptanalysis of LOKI91 by probabilistic counting method2018-05-09Paper
A multivariate quadratic challenge toward post-quantum generation cryptography2017-06-22Paper
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters2017-01-06Paper
On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies2016-07-25Paper
Attribute-Based Two-Tier Signatures: Definition and Construction2016-05-19Paper
A Multivariate Encryption Scheme with Rainbow2016-04-21Paper
CCA-Secure Keyed-Fully Homomorphic Encryption2016-04-13Paper
Security Model and Analysis of FHMQV, Revisited2015-12-02Paper
A security analysis of uniformly-layered Rainbow defined over non-commutative rings2015-11-10Paper
Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU2015-11-04Paper
Fine-Grained Conditional Proxy Re-Encryption and Application2015-09-29Paper
A note on the security of KHL scheme2015-09-25Paper
Plaintext checkable encryption with designated checker2015-04-14Paper
On zero-knowledge proofs (extended abstract)2014-09-26Paper
Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic2013-09-26Paper
Multivariate Signature Scheme Using Quadratic Forms2013-06-14Paper
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography2013-04-04Paper
Secure Keyword Search Using Bloom Filter with Specified Character Positions2012-11-06Paper
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control2012-11-01Paper
Reducing the Key Size of Rainbow Using Non-commutative Rings2012-06-08Paper
A Security Analysis of Uniformly-Layered Rainbow2011-11-25Paper
General Fault Attacks on Multivariate Public Key Cryptosystems2011-11-25Paper
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems2011-05-19Paper
Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network2010-11-03Paper
Adaptive and Composable Non-committing Encryptions2010-10-25Paper
https://portal.mardi4nfdi.de/entity/Q57479082010-09-14Paper
Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks2010-05-10Paper
Reconsidering Data Logging in Light of Digital Forensics2010-05-10Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Ternary Subset Difference Method and Its Quantitative Analysis2009-02-24Paper
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption2008-07-25Paper
On the Pseudorandomness of a Modification of KASUMI Type Permutations2008-03-17Paper
Applied Cryptography and Network Security2008-02-19Paper
Applied Cryptography and Network Security2008-02-19Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Fast Software Encryption2006-06-22Paper
Information Security and Privacy2005-09-07Paper
Information Security and Privacy2005-09-07Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper
Information and Communications Security2005-08-19Paper
https://portal.mardi4nfdi.de/entity/Q30439232004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q47364402004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44525762004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44525642004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44525812004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44283612003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44257432003-09-11Paper
https://portal.mardi4nfdi.de/entity/Q44174162003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44138562003-07-21Paper
https://portal.mardi4nfdi.de/entity/Q44133372003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44129982003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44129972003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44084592003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q44084702003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q47977902003-03-09Paper
https://portal.mardi4nfdi.de/entity/Q45362762003-01-25Paper
https://portal.mardi4nfdi.de/entity/Q45362602003-01-25Paper
https://portal.mardi4nfdi.de/entity/Q45366382002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q45366422002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q45366722002-11-23Paper
https://portal.mardi4nfdi.de/entity/Q45015092002-08-05Paper
https://portal.mardi4nfdi.de/entity/Q27572572001-11-25Paper
https://portal.mardi4nfdi.de/entity/Q49500492001-10-03Paper
https://portal.mardi4nfdi.de/entity/Q49500602001-10-02Paper
https://portal.mardi4nfdi.de/entity/Q27211682001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27211192001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27076042001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45053762000-09-27Paper
https://portal.mardi4nfdi.de/entity/Q43140402000-06-21Paper
https://portal.mardi4nfdi.de/entity/Q43140392000-06-21Paper
https://portal.mardi4nfdi.de/entity/Q43140452000-06-21Paper
https://portal.mardi4nfdi.de/entity/Q44858602000-06-20Paper
https://portal.mardi4nfdi.de/entity/Q49378612000-02-20Paper
A key escrow system with protecting user's privacy by blind decoding2000-02-15Paper
https://portal.mardi4nfdi.de/entity/Q42634322000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q47038591999-12-01Paper
https://portal.mardi4nfdi.de/entity/Q42533641999-11-08Paper
https://portal.mardi4nfdi.de/entity/Q42534341999-11-02Paper
Divertible and subliminal-free zero-knowledge proofs for languages1999-09-22Paper
https://portal.mardi4nfdi.de/entity/Q43186971999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q43813991999-01-10Paper
A structural comparison of the computational difficulty of breaking discrete log cryptosystems1999-01-03Paper
An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy1998-08-13Paper
Practical proofs of knowledge without relying on theoretical proofs of membership on languages1998-07-22Paper
https://portal.mardi4nfdi.de/entity/Q43736081998-06-11Paper
https://portal.mardi4nfdi.de/entity/Q43736441998-01-21Paper
https://portal.mardi4nfdi.de/entity/Q43416871998-01-14Paper
https://portal.mardi4nfdi.de/entity/Q38400911998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q42492561998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38401011998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43417111997-07-20Paper
A short certificate of the number of universal optimal strategies for stopping simple stochastic games1997-02-27Paper
https://portal.mardi4nfdi.de/entity/Q42796941994-11-29Paper
On the Complexity of Hyperelliptic Discrete Logarithm Problem1993-05-18Paper
https://portal.mardi4nfdi.de/entity/Q40357251993-05-18Paper
Fuchsian Systems Associated with the $P^2 (\mathbb{F}_2 )$-Arrangement1989-01-01Paper
EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE1988-01-01Paper

Research outcomes over time

This page was built for person: Kouichi Sakurai