Kouichi Sakurai

From MaRDI portal
Person:497668

Available identifiers

zbMath Open sakurai.kouichiMaRDI QIDQ497668

List of research outcomes

PublicationDate of PublicationType
On the Information-Theoretic Security of Combinatorial All-or-Nothing Transforms2024-03-14Paper
On the complexity of computational problems associated with simple stochastic games2024-01-29Paper
On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes2023-12-12Paper
Explicit non-malleable codes from bipartite graphs2023-08-10Paper
Attribute based tracing for securing group signatures against centralized authorities2023-08-04Paper
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness2023-06-30Paper
Almost fully anonymous attribute-based group signatures with verifier-local revocation and member registration from lattice assumptions2021-10-21Paper
Visual secret sharing scheme with distributed levels of importance of shadows2021-08-31Paper
Theory and application of computationally-independent one-way functions: interactive proof of ability -- revisited2021-08-31Paper
Analysis of variance of graph-clique mining for scalable proof of work2019-10-31Paper
Yet another note on block withholding attack on bitcoin mining pools2018-10-18Paper
Improving linear cryptanalysis of LOKI91 by probabilistic counting method2018-05-09Paper
A multivariate quadratic challenge toward post-quantum generation cryptography2017-06-22Paper
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters2017-01-06Paper
On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies2016-07-25Paper
Attribute-Based Two-Tier Signatures: Definition and Construction2016-05-19Paper
A Multivariate Encryption Scheme with Rainbow2016-04-21Paper
CCA-Secure Keyed-Fully Homomorphic Encryption2016-04-13Paper
Security Model and Analysis of FHMQV, Revisited2015-12-02Paper
A security analysis of uniformly-layered Rainbow defined over non-commutative rings2015-11-10Paper
Evaluation of Solving Time for Multivariate Quadratic Equation System Using XL Algorithm Over Small Finite Fields on GPU2015-11-04Paper
Fine-Grained Conditional Proxy Re-Encryption and Application2015-09-29Paper
A note on the security of KHL scheme2015-09-25Paper
Plaintext checkable encryption with designated checker2015-04-14Paper
On zero-knowledge proofs (extended abstract)2014-09-26Paper
https://portal.mardi4nfdi.de/entity/Q28484822013-09-26Paper
Multivariate Signature Scheme Using Quadratic Forms2013-06-14Paper
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography2013-04-04Paper
Secure Keyword Search Using Bloom Filter with Specified Character Positions2012-11-06Paper
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control2012-11-01Paper
Reducing the Key Size of Rainbow Using Non-commutative Rings2012-06-08Paper
General Fault Attacks on Multivariate Public Key Cryptosystems2011-11-25Paper
A Security Analysis of Uniformly-Layered Rainbow2011-11-25Paper
Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems2011-05-19Paper
Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network2010-11-03Paper
Adaptive and Composable Non-committing Encryptions2010-10-25Paper
https://portal.mardi4nfdi.de/entity/Q57479082010-09-14Paper
Improving the Quality of Protection of Web Application Firewalls by a Simplified Taxonomy of Web Attacks2010-05-10Paper
Reconsidering Data Logging in Light of Digital Forensics2010-05-10Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Ternary Subset Difference Method and Its Quantitative Analysis2009-02-24Paper
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption2008-07-25Paper
On the Pseudorandomness of a Modification of KASUMI Type Permutations2008-03-17Paper
Applied Cryptography and Network Security2008-02-19Paper
Applied Cryptography and Network Security2008-02-19Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Information and Communications Security2006-10-24Paper
Fast Software Encryption2006-06-22Paper
Information Security and Privacy2005-09-07Paper
Information Security and Privacy2005-09-07Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper
Information and Communications Security2005-08-19Paper
https://portal.mardi4nfdi.de/entity/Q30439232004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q47364402004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44525642004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44525762004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44525812004-03-01Paper
https://portal.mardi4nfdi.de/entity/Q44283612003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44257432003-09-11Paper
https://portal.mardi4nfdi.de/entity/Q44174162003-07-29Paper
https://portal.mardi4nfdi.de/entity/Q44138562003-07-21Paper
https://portal.mardi4nfdi.de/entity/Q44129972003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44129982003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133372003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44084592003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q44084702003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q47977902003-03-09Paper
https://portal.mardi4nfdi.de/entity/Q45362602003-01-25Paper
https://portal.mardi4nfdi.de/entity/Q45362762003-01-25Paper
https://portal.mardi4nfdi.de/entity/Q45366382002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q45366422002-11-24Paper
https://portal.mardi4nfdi.de/entity/Q45366722002-11-23Paper
https://portal.mardi4nfdi.de/entity/Q45015092002-08-05Paper
https://portal.mardi4nfdi.de/entity/Q27572572001-11-25Paper
https://portal.mardi4nfdi.de/entity/Q49500492001-10-03Paper
https://portal.mardi4nfdi.de/entity/Q49500602001-10-02Paper
https://portal.mardi4nfdi.de/entity/Q27211192001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27211682001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q27076042001-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45053762000-09-27Paper
https://portal.mardi4nfdi.de/entity/Q43140392000-06-21Paper
https://portal.mardi4nfdi.de/entity/Q43140402000-06-21Paper
https://portal.mardi4nfdi.de/entity/Q43140452000-06-21Paper
https://portal.mardi4nfdi.de/entity/Q44858602000-06-20Paper
https://portal.mardi4nfdi.de/entity/Q49378612000-02-20Paper
A key escrow system with protecting user's privacy by blind decoding2000-02-15Paper
https://portal.mardi4nfdi.de/entity/Q42634322000-02-01Paper
https://portal.mardi4nfdi.de/entity/Q47038591999-12-01Paper
https://portal.mardi4nfdi.de/entity/Q42533641999-11-08Paper
https://portal.mardi4nfdi.de/entity/Q42534341999-11-02Paper
Divertible and subliminal-free zero-knowledge proofs for languages1999-09-22Paper
https://portal.mardi4nfdi.de/entity/Q43186971999-08-30Paper
https://portal.mardi4nfdi.de/entity/Q43813991999-01-10Paper
A structural comparison of the computational difficulty of breaking discrete log cryptosystems1999-01-03Paper
An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy1998-08-13Paper
Practical proofs of knowledge without relying on theoretical proofs of membership on languages1998-07-22Paper
https://portal.mardi4nfdi.de/entity/Q43736081998-06-11Paper
https://portal.mardi4nfdi.de/entity/Q43736441998-01-21Paper
https://portal.mardi4nfdi.de/entity/Q43416871998-01-14Paper
https://portal.mardi4nfdi.de/entity/Q38400911998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q38401011998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q42492561998-01-01Paper
https://portal.mardi4nfdi.de/entity/Q43417111997-07-20Paper
A short certificate of the number of universal optimal strategies for stopping simple stochastic games1997-02-27Paper
https://portal.mardi4nfdi.de/entity/Q42796941994-11-29Paper
https://portal.mardi4nfdi.de/entity/Q40357251993-05-18Paper
On the Complexity of Hyperelliptic Discrete Logarithm Problem1993-05-18Paper
Fuchsian Systems Associated with the $P^2 (\mathbb{F}_2 )$-Arrangement1989-01-01Paper
EQUIVAIENCE PROBLEM AND AUTOMORPHISMS OF SOME ABELIAN BRANCHED COVERINGS OF THE RIEMANN SPHERE1988-01-01Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Kouichi Sakurai