dblp.uni-trier.dewww.uni-trier.de

Kaoru Kurosawa

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
140EEGoichiro Hanaoka, Kaoru Kurosawa: Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. ASIACRYPT 2008: 308-325
139EEKouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa: Small Secret Key Attack on a Variant of RSA (Due to Takagi). CT-RSA 2008: 387-406
138EEKaoru Kurosawa, Kazuhiro Suzuki: Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme. EUROCRYPT 2008: 324-340
137EEKaoru Kurosawa, Jun Furukawa: Universally Composable Undeniable Signature. ICALP (2) 2008: 524-535
136EEKaoru Kurosawa, Takeshi Koshiba: Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification. ICITS 2008: 199-209
135EEJun Furukawa, Frederik Armknecht, Kaoru Kurosawa: A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. SCN 2008: 392-408
134EEKaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba: A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions. IEEE Transactions on Information Theory 54(6): 2566-2571 (2008)
133EETetsu Iwata, Tohru Yagi, Kaoru Kurosawa: Security of the Five-Round Kasumi Type Permutation. IEICE Transactions 91-A(1): 30-38 (2008)
132EEKazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota: Birthday Paradox for Multi-Collisions. IEICE Transactions 91-A(1): 39-45 (2008)
131EENoboru Kunihiro, Kaoru Kurosawa: Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA. IEICE Transactions 91-A(9): 2356-2364 (2008)
130EEKaoru Kurosawa, Swee-Huay Heng: The power of identification schemes. IJACT 1(1): 60-69 (2008)
129EEMasayuki Abe, Rosario Gennaro, Kaoru Kurosawa: Tag-KEM/DEM: A New Framework for Hybrid Encryption. J. Cryptology 21(1): 97-130 (2008)
2007
128 Kaoru Kurosawa: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings Springer 2007
127EEYvo Desmedt, Kaoru Kurosawa: A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. ISC 2007: 351-361
126EEKazuhiro Suzuki, Kaoru Kurosawa: How to Find Many Collisions of 3-Pass HAVAL. IWSEC 2007: 428-443
125EENoboru Kunihiro, Kaoru Kurosawa: Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. Public Key Cryptography 2007: 412-425
124EETetsu Iwata, Kaoru Kurosawa: How to Construct Super-Pseudorandom Permutations with Short Keys. IEICE Transactions 90-A(1): 2-13 (2007)
2006
123 Moti Yung, Kaoru Kurosawa, Reihaneh Safavi-Naini: Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006 ACM 2006
122EEMasayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa: Tag-KEM from Set Partial Domain One-Way Permutations. ACISP 2006: 360-370
121EEKaoru Kurosawa, Tsuyoshi Takagi: New Approach for Selectively Convertible Undeniable Signature Schemes. ASIACRYPT 2006: 428-443
120EEJun Furukawa, Kaoru Kurosawa, Hideki Imai: An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge. ICALP (2) 2006: 46-57
119EEKazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota: Birthday Paradox for Multi-collisions. ICISC 2006: 29-40
118EETri Van Le, Kaoru Kurosawa: Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. Information Hiding 2006: 297-313
117EEKaoru Kurosawa, Katja Schmidt-Samoa: New Online/Offline Signature Schemes Without Random Oracles. Public Key Cryptography 2006: 330-346
116EEKaoru Kurosawa, Swee-Huay Heng: The Power of Identification Schemes. Public Key Cryptography 2006: 364-377
115EEKaoru Kurosawa, Swee-Huay Heng: Relations Among Security Notions for Undeniable Signature Schemes. SCN 2006: 34-48
114EEWakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng: The security of the FDH variant of Chaum's undeniable signature scheme. IEEE Transactions on Information Theory 52(5): 2006-2017 (2006)
113EERyutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu: Primal-Dual Distance Bounds of Linear Codes With Application to Cryptography. IEEE Transactions on Information Theory 52(9): 4251-4256 (2006)
112EESwee-Huay Heng, Kaoru Kurosawa: k-Resilient Identity-Based Encryption in the Standard Model. IEICE Transactions 89-A(1): 39-46 (2006)
111EELan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Int. J. Inf. Sec. 5(4): 241-255 (2006)
110EEWakaha Ogata, Kaoru Kurosawa, Douglas R. Stinson: Optimum Secret Sharing Scheme Secure against Cheating. SIAM J. Discrete Math. 20(1): 79-95 (2006)
2005
109EEMasayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup: Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. EUROCRYPT 2005: 128-146
108EEKaoru Kurosawa, Swee-Huay Heng: 3-Move Undeniable Signature Scheme. EUROCRYPT 2005: 181-197
107EETetsu Iwata, Kaoru Kurosawa: How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms. FSE 2005: 268-283
106EEKaoru Kurosawa, Swee-Huay Heng: Identity-Based Identification Without Random Oracles. ICCSA (2) 2005: 603-613
105EEYvo Desmedt, Kaoru Kurosawa: Electronic Voting: Starting Over? ISC 2005: 329-343
104EEWakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng: The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. Public Key Cryptography 2005: 328-345
103EERyutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu: Primal-dual distance bounds of linear codes with application to cryptography CoRR abs/cs/0506087: (2005)
102EEYasuhiro Ohtaki, Masaru Kamada, Kaoru Kurosawa: A Scheme for Partial Disclosure of Transaction Log. IEICE Transactions 88-A(1): 222-229 (2005)
101EETetsu Iwata, Kaoru Kurosawa: On the Security of a MAC by Mitchell. IEICE Transactions 88-A(1): 25-32 (2005)
100EEKaoru Kurosawa, Tetsu Iwata, Quang Viet Duong: How to Improve Interpolation Attack. IEICE Transactions 88-A(1): 9-15 (2005)
99EEMasaru Kamada, Kaoru Kurosawa, Yasuhiro Ohtaki, Shusuke Okamoto: A Network Game Based on Fair Random Numbers. IEICE Transactions 88-D(5): 859-864 (2005)
98EELan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem. J. UCS 11(6): 986-1010 (2005)
2004
97EETetsu Iwata, Kaoru Kurosawa: How to Re-use Round Function in Super-Pseudorandom Permutation. ACISP 2004: 224-235
96EEKaoru Kurosawa, Toshihiko Matsuo: How to Remove MAC from DHIES. ACISP 2004: 236-247
95EELan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa: Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security. ACNS 2004: 61-75
94EEKaoru Kurosawa, Yvo Desmedt: A New Paradigm of Hybrid Encryption Scheme. CRYPTO 2004: 426-442
93EEQuang Viet Duong, Kaoru Kurosawa: Almost Ideal Contrast Visual Cryptography with Reversing. CT-RSA 2004: 353-365
92EESwee-Huay Heng, Kaoru Kurosawa: k-Resilient Identity-Based Encryption in the Standard Model. CT-RSA 2004: 67-80
91EETakeshi Koshiba, Kaoru Kurosawa: Short Exponent Diffie-Hellman Problems. Public Key Cryptography 2004: 173-186
90EEKaoru Kurosawa, Swee-Huay Heng: From Digital Signature to ID-based Identification/Signature. Public Key Cryptography 2004: 248-261
89EEWakaha Ogata, Kaoru Kurosawa, Douglas R. Stinson, Hajime Saido: New combinatorial designs and their applications to authentication codes and secret sharing schemes. Discrete Mathematics 279(1-3): 383-405 (2004)
88 Kaoru Kurosawa, Tetsu Iwata, Takayuki Yoshiwara: New covering radius of Reed-Muller codes for t-resilient functions. IEEE Transactions on Information Theory 20(3): 468-475 (2004)
87 Kaoru Kurosawa, Ryutaroh Matsumoto: Almost security of cryptographic Boolean functions. IEEE Transactions on Information Theory 50(11): 2752-2761 (2004)
86EEKaoru Kurosawa, Quang Viet Duong: How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer. IEICE Transactions 87-A(1): 141-146 (2004)
85EEKaoru Kurosawa, Tetsu Iwata: TMAC: Two-Key CBC MAC. IEICE Transactions 87-A(1): 46-52 (2004)
84EESwee-Huay Heng, Kaoru Kurosawa: Square Hash with a Small Key Size. IEICE Transactions 87-A(1): 54-59 (2004)
83EETetsu Iwata, Kaoru Kurosawa: On the Universal Hash Functions in Luby-Rackoff Cipher. IEICE Transactions 87-A(1): 60-66 (2004)
82EEToshihiko Matsuo, Kaoru Kurosawa: On Parallel Hash Functions Based on Block-Ciphers. IEICE Transactions 87-A(1): 67-74 (2004)
81EEWakaha Ogata, Kaoru Kurosawa: Oblivious keyword search. J. Complexity 20(2-3): 356-371 (2004)
2003
80EETetsu Iwata, Tohru Yagi, Kaoru Kurosawa: On the Pseudorandomness of KASUMI Type Permutations. ACISP 2003: 130-141
79EEToshihiko Matsuo, Kaoru Kurosawa: On Parallel Hash Functions Based on Block-Cipher. ACISP 2003: 510-521
78EESwee-Huay Heng, Kaoru Kurosawa: Square Hash with a Small Key Size. ACISP 2003: 522-531
77EEKaoru Kurosawa, Tsuyoshi Takagi: Some RSA-Based Encryption Schemes with Tight Security Reduction. ASIACRYPT 2003: 19-36
76EEKaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi: A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. ASIACRYPT 2003: 474-491
75EEKaoru Kurosawa, Tetsu Iwata: TMAC: Two-Key CBC MAC. CT-RSA 2003: 33-49
74EETetsu Iwata, Kaoru Kurosawa: OMAC: One-Key CBC MAC. FSE 2003: 129-153
73EETetsu Iwata, Kaoru Kurosawa: On the Security of a New Variant of OMAC. ICISC 2003: 67-78
72EETetsu Iwata, Kaoru Kurosawa: On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. IMA Int. Conf. 2003: 306-318
71EETetsu Iwata, Kaoru Kurosawa: Stronger Security Bounds for OMAC, TMAC, and XCBC. INDOCRYPT 2003: 402-415
70EEYvo Desmedt, Kaoru Kurosawa, Tri Van Le: Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. ISC 2003: 396-407
69EETetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa: Non-cryptographic primitive for pseudorandom permutation. Theor. Comput. Sci. 306(1-3): 139-154 (2003)
2002
68EEWakaha Ogata, Kaoru Kurosawa: Bounds for Robust Metering Schemes and Their Relationship with A-code. ASIACRYPT 2002: 64-80
67EEKaoru Kurosawa, Wakaha Ogata: Bit-Slice Auction Circuit. ESORICS 2002: 24-38
66EETetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa: Non-cryptographic Primitive for Pseudorandom Permutation. FSE 2002: 149-163
65EETetsu Iwata, Kaoru Kurosawa: On the Universal Hash Functionsin Luby-Rackoff Cipher. ICISC 2002: 226-236
64EEKaoru Kurosawa, Takuya Yoshida: Linear Code Implies Public-Key Traitor Tracing. Public Key Cryptography 2002: 172-187
63EEKaoru Kurosawa: Multi-recipient Public-Key Encryption with Shortened Ciphertext. Public Key Cryptography 2002: 48-63
62 Wataru Kishimoto, Koji Okada, Kaoru Kurosawa, Wakaha Ogata: On the bound for anonymous secret sharing schemes. Discrete Applied Mathematics 121(1-3): 193-202 (2002)
2001
61EETetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa: Round Security and Super-Pseudorandomness of MISTY Type Structure. FSE 2001: 233-247
60EEAkihiro Yamamura, Kaoru Kurosawa: Generic Algorithms and Key Agreement Protocols Based on Group Actions. ISAAC 2001: 208-218
59EEKaoru Kurosawa, Wakaha Ogata, Toshihiki Matsuo, Shuichi Makishima: IND-CCA Public Key Schemes Equivalent to Factoring n=pq. Public Key Cryptography 2001: 36-47
58EETetsu Iwata, Takayuki Yoshiwara, Kaoru Kurosawa: New Covering Radius of Reed-Muller Codes for t-Resilient Functions. Selected Areas in Cryptography 2001: 75-86
57 Satoshi Obana, Kaoru Kurosawa: Bounds and Combinatorial Structure of Multi-Receiver-Codes. Des. Codes Cryptography 22(1): 47-63 (2001)
56 Kaoru Kurosawa, Satoshi Obana: Combinatorial Bounds on Authentication Codes with Arbitration. Des. Codes Cryptography 22(3): 265-281 (2001)
55EEKaoru Kurosawa, Thomas Johansson, Douglas R. Stinson: Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications. J. Cryptology 14(4): 231-253 (2001)
2000
54EEMasashi Mitomo, Kaoru Kurosawa: Attack for Flash MIX. ASIACRYPT 2000: 192-204
53EEWakaha Ogata, Kaoru Kurosawa: Provably Secure Metering Scheme. ASIACRYPT 2000: 388-398
52EEYvo Desmedt, Kaoru Kurosawa: How to Break a Practical MIX and Design a New One. EUROCRYPT 2000: 557-572
51EETetsu Iwata, Kaoru Kurosawa: On the Pseudorandomness of the AES Finalists - RC6 and Serpent. FSE 2000: 231-243
50EEKaoru Kurosawa, Tetsu Iwata, Quang Viet Duong: Root Finding Interpolation Attack. Selected Areas in Cryptography 2000: 303-314
49 Satoshi Obana, Kaoru Kurosawa: Combinatorial Classification of Optimal Authentication Codes with Arbitration. Des. Codes Cryptography 20(3): 281-305 (2000)
48 Kaoru Kurosawa, Fumio Sato, Takahiro Sakata, Wataru Kishimoto: A relationship between linear complexity and kapa-error linear complexity. IEEE Transactions on Information Theory 46(2): 694-698 (2000)
47 Koji Okada, Kaoru Kurosawa: MDS secret-sharing scheme secure against cheaters. IEEE Transactions on Information Theory 46(3): 1078-1081 (2000)
1999
46 Takashi Satoh, Tetsu Iwata, Kaoru Kurosawa: On Cryptographically Secure Vectorial Boolean Functions. ASIACRYPT 1999: 20-28
45 Tetsu Iwata, Kaoru Kurosawa: Probabilistic Higher Order Differential Attack and Higher Order Bent Functions. ASIACRYPT 1999: 62-74
44 Kaoru Kurosawa, Wakaha Ogata: Efficient Rabin-type Digital Signature Scheme. Des. Codes Cryptography 16(1): 53-64 (1999)
43 Kaoru Kurosawa, Takuya Yoshida: Strongly universal hashing and identification codes via channels. IEEE Transactions on Information Theory 45(6): 2091-2095 (1999)
42EECarlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata: On a Fallacious Bound for Authentication Codes. J. Cryptology 12(3): 155-159 (1999)
1998
41EEYvo Desmedt, Brian King, Wataru Kishimoto, Kaoru Kurosawa: A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group. ACISP 1998: 391-402
40EEKaoru Kurosawa, Takuya Yoshida, Yvo Desmedt, Mike Burmester: Some Bounds and a Construction for Secure Broadcast Encryption. ASIACRYPT 1998: 420-433
39EEKaoru Kurosawa, Yvo Desmedt: Optimum Traitor Tracing and Asymmetric Schemes. EUROCRYPT 1998: 145-157
38 Kaoru Kurosawa, Koji Okada, Hajime Saido, Douglas R. Stinson: New Combinatorial Bounds for Authentication Codes and Key Predistribution Schemes. Des. Codes Cryptography 15(1): 87-100 (1998)
37EEWakaha Ogata, Kaoru Kurosawa: Some Basic Properties of General Nonperfect Secret Sharing Schemes. J. UCS 4(8): 690-704 (1998)
1997
36 Kaoru Kurosawa, Satoshi Obana: Characterisation of (k, n) Multi-receiver Authentication. ACISP 1997: 204-215
35EEKaoru Kurosawa, Thomas Johansson, Douglas R. Stinson: Almost k-wise Independent Sample Spaces and Their Cryptologic Applications. EUROCRYPT 1997: 409-421
34EEKaoru Kurosawa, Takashi Satoh: Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria. EUROCRYPT 1997: 434-449
33 Satoshi Obana, Kaoru Kurosawa: A2-code = Affine resolvable = BIBD. ICICS 1997: 118-129
32 Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori Takatani: Fault tolerant anonymous channel. ICICS 1997: 440-444
31EEKaoru Kurosawa, Takashi Satoh, K. Yamamoto: Highly Nonlinear t-resilient Functions. J. UCS 3(6): 721-729 (1997)
1996
30 Kaoru Kurosawa, Takashi Satoh: Generalization of Higher Order SAC to Vector Output Boolean Functions. ASIACRYPT 1996: 218-231
29EEWakaha Ogata, Kaoru Kurosawa: Optimum Secret Sharing Scheme Secure against Cheating. EUROCRYPT 1996: 200-211
28EEWakaha Ogata, Keiichi Sakano, Kaoru Kurosawa: Multisymbol Majority Vote and Hard Core. Inf. Process. Lett. 58(6): 285-292 (1996)
27EESatoshi Obana, Kaoru Kurosawa: Veto is Impossible in Secret Sharing Schemes. Inf. Process. Lett. 58(6): 293-295 (1996)
26EEKaoru Kurosawa, Koji Okada: Combinatorial Lower Bounds for Secret Sharing Schemes. Inf. Process. Lett. 60(6): 301-304 (1996)
1995
25 Kaoru Kurosawa, Sanpei Kageyama: New Bound for Afine Resolvable Designs and Its Application to Authentication Codes. COCOON 1995: 292-302
24EEKaoru Kurosawa, Satoshi Obana, Wakaha Ogata: t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes. CRYPTO 1995: 410-423
23EEKaoru Kurosawa, Satoshi Obana: Combinatorial Bounds for Authentication Codes with Arbitration. EUROCRYPT 1995: 289-300
22 Kaoru Kurosawa, Naonori Yamashita: Power Complementary and Linear Phase Filter Banks. ISCAS 1995: 760-763
21EEKaoru Kurosawa, Koji Okada, Shigeo Tsujii: Low Exponent Attack Against Elliptic Curve RSA. Inf. Process. Lett. 53(2): 77-83 (1995)
1994
20 Koji Okada, Kaoru Kurosawa: Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes. ASIACRYPT 1994: 33-41
19 Kaoru Kurosawa, Koji Okada, Keiichi Sakano: Security of the Center in Key Distribution Schemes. ASIACRYPT 1994: 333-341
18 Kaoru Kurosawa, Koji Okada, Shigeo Tsujii: Low Exponent Attack against Elliptic Curve RSA. ASIACRYPT 1994: 376-383
17 Kaoru Kurosawa, Koji Okada: Combinatorial Interpretation of Secret Sharing Schemes. ASIACRYPT 1994: 55-64
16EEKaoru Kurosawa: New Bound on Authentication Code with Arbitration. CRYPTO 1994: 140-149
15 Kaoru Kurosawa, Isao Yamada, Naonori Yamashita, Toshiriro Komou: Optimum Highpass Filter in Linear Phase Perfect Reconstruction QMF Bank. ISCAS 1994: 25-28
14 Kaoru Kurosawa, Isao Yamada, Masayuki Ihara: A Necessary Condition for Linear Phase in Two Dimensional Perfect Reconstruction QMF Banks. ISCAS 1994: 29-32
1993
13EEKaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii: Nonperfect Secret Sharing Schemes and Matroids. EUROCRYPT 1993: 126-141
12EEChoonsik Park, Kazutomo Itoh, Kaoru Kurosawa: Efficient Anonymous Channel and All/Nothing Election Scheme. EUROCRYPT 1993: 248-259
11EEChoonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii: On Key Distribution and Authentication in Mobile Radio Networks. EUROCRYPT 1993: 461-465
10 Kaoru Kurosawa, Kouichi Kawabe, Shigeo Tsujii: Stability and zeros of a complex polynomial. ISCAS 1993: 2279-2282
9 Kaoru Kurosawa, Isao Yamada, Tetsunari Yokokawa, Shigeo Tsujii: A fast stability test for multidimensional systems. ISCAS 1993: 579-582
1992
8 Takashi Satoh, Kaoru Kurosawa, Shigeo Tsujii: Privacy for Multi-Party Protocols. AUSCRYPT 1992: 252-260
7 Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii: Nonperfect Secret Sharing Schemes. AUSCRYPT 1992: 56-66
6 Kaoru Kurosawa, Osamu Watanabe: Computational and Statistical Indistinguishabilities. ISAAC 1992: 430-438
1991
5 Wakaha Ogata, Kaoru Kurosawa: On Claw Free Families. ASIACRYPT 1991: 111-123
4 Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai: 4 Move Perfect ZKIP of Knowledge with No Assumption. ASIACRYPT 1991: 321-330
1990
3EEKaoru Kurosawa, Shigeo Tsujii: Multi-Language Zero Knowledge Interactive Proof Systems. CRYPTO 1990: 339-352
2EEKaoru Kurosawa, Yutaka Katayama, Wakaha Ogata, Shigeo Tsujii: General Public Key Residue Cryptosystems and Mental Poker Protocols. EUROCRYPT 1990: 374-388
1986
1 Kaoru Kurosawa, Shigeo Tsujii: An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC. ICC 1986: 563-567

Coauthor Index

1Masayuki Abe [109] [122] [129]
2Frederik Armknecht [135]
3Carlo Blundo [42]
4Mike Burmester [40]
5Yang Cui [122]
6Yvo Desmedt [39] [40] [41] [52] [70] [94] [105] [127]
7Quang Viet Duong [50] [86] [93] [100]
8Jun Furukawa [120] [135] [137]
9Rosario Gennaro [109] [129]
10Goichiro Hanaoka [140]
11Swee-Huay Heng [78] [84] [90] [92] [104] [106] [108] [112] [114] [115] [116] [130]
12Masayuki Ihara [14]
13Hideki Imai [120] [122]
14Kazutomo Itoh [12]
15Kouichi Itoh [139]
16Toshiya Itoh [103] [113]
17Tetsu Iwata [45] [46] [50] [51] [58] [61] [65] [66] [69] [71] [72] [73] [74] [75] [80] [83] [85] [88] [97] [100] [101] [107] [124] [133]
18Thomas Johansson [35] [55]
19Sanpei Kageyama [25]
20Masaru Kamada [99] [102]
21Yutaka Katayama [2]
22Kouichi Kawabe [10]
23Brian King [41]
24Wataru Kishimoto [41] [48] [62] [134]
25Toshiriro Komou [15]
26Toshimitsu Konno [103] [113]
27Takeshi Koshiba [91] [134] [136]
28Noboru Kunihiro [125] [131] [139]
29Tri Van Le [70] [118]
30Shuichi Makishima [59]
31Ryutaroh Matsumoto [87] [103] [113]
32Toshihiki Matsuo [59]
33Toshihiko Matsuo [79] [82] [96]
34Masashi Mitomo [54]
35Lan Nguyen [95] [98] [111]
36Satoshi Obana [23] [24] [27] [33] [36] [49] [56] [57]
37Wakaha Ogata [2] [5] [7] [13] [24] [28] [29] [32] [37] [42] [44] [53] [59] [62] [67] [68] [81] [89] [104] [110] [114]
38Yasuhiro Ohtaki [99] [102]
39Koji Okada [13] [17] [18] [19] [20] [21] [26] [38] [47] [62]
40Shusuke Okamoto [99]
41Tatsuaki Okamoto [11]
42Choonsik Park [11] [12]
43Reihaneh Safavi-Naini [95] [98] [111] [123]
44Hajime Saido [38] [89]
45Takeshi Saito [4]
46Keiichi Sakano [13] [19] [28]
47Takahiro Sakata [48]
48Kazue Sako [32]
49Kouichi Sakurai [4]
50Alfredo De Santis [42]
51Fumio Sato [48]
52Takashi Satoh [8] [30] [31] [34] [46]
53Katja Schmidt-Samoa [76] [117]
54Victor Shoup [109]
55Douglas R. Stinson [35] [38] [55] [89] [110]
56Kazuhiro Suzuki [119] [126] [132] [138]
57Tsuyoshi Takagi [76] [77] [121]
58Kazunori Takatani [32]
59Dongvu Tonien [119] [132]
60Koji Toyota [119] [132]
61Shigeo Tsujii [1] [2] [3] [7] [8] [9] [10] [11] [13] [18] [21]
62Tomohiko Uyematsu [103] [113]
63Osamu Watanabe [6]
64Tohru Yagi [80] [133]
65Isao Yamada [9] [14] [15]
66K. Yamamoto [31]
67Akihiro Yamamura [60]
68Naonori Yamashita [15] [22]
69Tetsunari Yokokawa [9]
70Takuya Yoshida [40] [43] [64]
71Tomonobu Yoshino [61] [66] [69]
72Takayuki Yoshiwara [58] [88]
73Tomohiro Yuasa [61]
74Moti Yung (Mordechai M. Yung) [123]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)