Kouichi Sakurai

From MaRDI portal
(Redirected from Person:497668)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Tree parity machine-based symmetric encryption: a hybrid approach2024-10-29Paper
On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms
IEEE Transactions on Information Theory
2024-03-14Paper
On the complexity of computational problems associated with simple stochastic games
Lecture Notes in Computer Science
2024-01-29Paper
On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes
Lecture Notes in Computer Science
2023-12-12Paper
Explicit non-malleable codes from bipartite graphs
Arithmetic of Finite Fields
2023-08-10Paper
Attribute based tracing for securing group signatures against centralized authorities
Information Security Practice and Experience
2023-08-04Paper
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness
Information Security Practice and Experience
2023-06-30Paper
Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis2023-01-25Paper
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions
Theoretical Computer Science
2021-10-21Paper
Theory and application of computationally-independent one-way functions: interactive proof of ability -- revisited2021-08-31Paper
Visual secret sharing scheme with distributed levels of importance of shadows2021-08-31Paper
Analysis of variance of graph-clique mining for scalable proof of work2019-10-31Paper
Yet another note on block withholding attack on bitcoin mining pools2018-10-18Paper
Improving linear cryptanalysis of LOKI91 by probabilistic counting method
Fast Software Encryption
2018-05-09Paper
A multivariate quadratic challenge toward post-quantum generation cryptography
ACM Communications in Computer Algebra
2017-06-22Paper
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
Lecture Notes in Computer Science
2017-01-06Paper
On the application of clique problem for proof-of-work in cryptocurrencies
Information Security and Cryptology
2016-07-25Paper
Attribute-based two-tier signatures: definition and construction
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
A multivariate encryption scheme with Rainbow
Information and Communications Security
2016-04-21Paper
CCA-secure keyed-fully homomorphic encryption
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Security model and analysis of FHMQV, revisited
Information Security and Cryptology
2015-12-02Paper
A security analysis of uniformly-layered Rainbow defined over non-commutative rings
Pacific Journal of Mathematics for Industry
2015-11-10Paper
Evaluation of solving time for multivariate quadratic equation system using XL algorithm over small finite fields on GPU
Springer Proceedings in Mathematics & Statistics
2015-11-04Paper
Fine-grained conditional proxy re-encryption and application
Provable Security
2015-09-29Paper
A note on the security of KHL scheme
Theoretical Computer Science
2015-09-25Paper
Plaintext checkable encryption with designated checker
Advances in Mathematics of Communications
2015-04-14Paper
On zero-knowledge proofs (extended abstract)
Proceedings of the thirty-second annual ACM symposium on Theory of computing
2014-09-26Paper
Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic2013-09-26Paper
Multivariate Signature Scheme Using Quadratic Forms
Post-Quantum Cryptography
2013-06-14Paper
Application of scalar multiplication of Edwards curves to pairing-based cryptography
Advances in Information and Computer Security
2013-04-04Paper
Secure keyword search using Bloom filter with specified character positions
Provable Security
2012-11-06Paper
Multi-user keyword search scheme for secure data sharing with fine-grained access control
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Reducing the key size of rainbow using non-commutative rings
Lecture Notes in Computer Science
2012-06-08Paper
A security analysis of uniformly-layered Rainbow. Revisiting Sato-Araki's non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm
Post-Quantum Cryptography
2011-11-25Paper
General Fault Attacks on Multivariate Public Key Cryptosystems
Post-Quantum Cryptography
2011-11-25Paper
Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems
Information Security Practice and Experience
2011-05-19Paper
Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network
Lecture Notes in Computer Science
2010-11-03Paper
Adaptive and composable non-committing encryptions
Information Security and Privacy
2010-10-25Paper
On the zero-run length of a signed binary representation2010-09-14Paper
Improving the quality of protection of web application firewalls by a simplified taxonomy of web attacks
Advances in Information Security and Its Application
2010-05-10Paper
Reconsidering data logging in light of digital forensics
Advances in Information Security and Its Application
2010-05-10Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Ternary Subset Difference Method and Its Quantitative Analysis
Information Security Applications
2009-02-24Paper
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption
Advances in Information and Computer Security
2008-07-25Paper
On the Pseudorandomness of a Modification of KASUMI Type Permutations
Lecture Notes in Computer Science
2008-03-17Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2008-02-19Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Information and Communications Security
Lecture Notes in Computer Science
2006-10-24Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Cryptographic Hardware and Embedded Systems - CHES 2004
Lecture Notes in Computer Science
2005-08-23Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
scientific article; zbMATH DE number 2085418 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2085211 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 2048540 (Why is no real title available?)2004-03-01Paper
scientific article; zbMATH DE number 2048532 (Why is no real title available?)2004-03-01Paper
scientific article; zbMATH DE number 2048542 (Why is no real title available?)2004-03-01Paper
scientific article; zbMATH DE number 1980971 (Why is no real title available?)2003-09-15Paper
scientific article; zbMATH DE number 1979310 (Why is no real title available?)2003-09-11Paper
scientific article; zbMATH DE number 1955802 (Why is no real title available?)2003-07-29Paper
scientific article; zbMATH DE number 1951607 (Why is no real title available?)2003-07-21Paper
scientific article; zbMATH DE number 1950624 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950360 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1950359 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1941254 (Why is no real title available?)2003-06-29Paper
scientific article; zbMATH DE number 1941262 (Why is no real title available?)2003-06-29Paper
scientific article; zbMATH DE number 1878328 (Why is no real title available?)2003-03-09Paper
scientific article; zbMATH DE number 1759337 (Why is no real title available?)2003-01-25Paper
scientific article; zbMATH DE number 1759323 (Why is no real title available?)2003-01-25Paper
scientific article; zbMATH DE number 1759644 (Why is no real title available?)2002-11-24Paper
scientific article; zbMATH DE number 1759646 (Why is no real title available?)2002-11-24Paper
scientific article; zbMATH DE number 1759670 (Why is no real title available?)2002-11-23Paper
scientific article; zbMATH DE number 1500497 (Why is no real title available?)2002-08-05Paper
scientific article; zbMATH DE number 1676655 (Why is no real title available?)2001-11-25Paper
scientific article; zbMATH DE number 1440061 (Why is no real title available?)2001-10-03Paper
scientific article; zbMATH DE number 1440070 (Why is no real title available?)2001-10-02Paper
scientific article; zbMATH DE number 1612527 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1612501 (Why is no real title available?)2001-07-01Paper
scientific article; zbMATH DE number 1583944 (Why is no real title available?)2001-04-03Paper
scientific article; zbMATH DE number 1511692 (Why is no real title available?)2000-09-27Paper
scientific article; zbMATH DE number 697823 (Why is no real title available?)2000-06-21Paper
scientific article; zbMATH DE number 697822 (Why is no real title available?)2000-06-21Paper
scientific article; zbMATH DE number 697828 (Why is no real title available?)2000-06-21Paper
scientific article; zbMATH DE number 1461531 (Why is no real title available?)2000-06-20Paper
scientific article; zbMATH DE number 1404241 (Why is no real title available?)2000-02-20Paper
A key escrow system with protecting user's privacy by blind decoding
Lecture Notes in Computer Science
2000-02-15Paper
scientific article; zbMATH DE number 1341874 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1372657 (Why is no real title available?)1999-12-01Paper
scientific article; zbMATH DE number 1322342 (Why is no real title available?)1999-11-08Paper
scientific article; zbMATH DE number 1322402 (Why is no real title available?)1999-11-02Paper
Divertible and subliminal-free zero-knowledge proofs for languages
Journal of Cryptology
1999-09-22Paper
scientific article; zbMATH DE number 708809 (Why is no real title available?)1999-08-30Paper
scientific article; zbMATH DE number 1136088 (Why is no real title available?)1999-01-10Paper
A structural comparison of the computational difficulty of breaking discrete log cryptosystems
Journal of Cryptology
1999-01-03Paper
An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy
Information Processing Letters
1998-08-13Paper
Practical proofs of knowledge without relying on theoretical proofs of membership on languages
Theoretical Computer Science
1998-07-22Paper
scientific article; zbMATH DE number 1107670 (Why is no real title available?)1998-06-11Paper
scientific article; zbMATH DE number 1107699 (Why is no real title available?)1998-01-21Paper
scientific article; zbMATH DE number 1024012 (Why is no real title available?)1998-01-14Paper
scientific article; zbMATH DE number 1186877 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1302786 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1186883 (Why is no real title available?)1998-01-01Paper
scientific article; zbMATH DE number 1024028 (Why is no real title available?)1997-07-20Paper
A short certificate of the number of universal optimal strategies for stopping simple stochastic games
Information Processing Letters
1997-02-27Paper
scientific article; zbMATH DE number 503355 (Why is no real title available?)1994-11-29Paper
scientific article; zbMATH DE number 176556 (Why is no real title available?)1993-05-18Paper
On the Complexity of Hyperelliptic Discrete Logarithm Problem
Advances in Cryptology — EUROCRYPT ’91
1993-05-18Paper
Fuchsian Systems Associated with the $P^2 (\mathbb{F}_2 )$-Arrangement
SIAM Journal on Mathematical Analysis
1989-01-01Paper
EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE
Memoirs of the Faculty of Science, Kyushu University. Series A, Mathematics
1988-01-01Paper


Research outcomes over time


This page was built for person: Kouichi Sakurai