2008 |
140 | EE | Goichiro Hanaoka,
Kaoru Kurosawa:
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.
ASIACRYPT 2008: 308-325 |
139 | EE | Kouichi Itoh,
Noboru Kunihiro,
Kaoru Kurosawa:
Small Secret Key Attack on a Variant of RSA (Due to Takagi).
CT-RSA 2008: 387-406 |
138 | EE | Kaoru Kurosawa,
Kazuhiro Suzuki:
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme.
EUROCRYPT 2008: 324-340 |
137 | EE | Kaoru Kurosawa,
Jun Furukawa:
Universally Composable Undeniable Signature.
ICALP (2) 2008: 524-535 |
136 | EE | Kaoru Kurosawa,
Takeshi Koshiba:
Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification.
ICITS 2008: 199-209 |
135 | EE | Jun Furukawa,
Frederik Armknecht,
Kaoru Kurosawa:
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort.
SCN 2008: 392-408 |
134 | EE | Kaoru Kurosawa,
Wataru Kishimoto,
Takeshi Koshiba:
A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions.
IEEE Transactions on Information Theory 54(6): 2566-2571 (2008) |
133 | EE | Tetsu Iwata,
Tohru Yagi,
Kaoru Kurosawa:
Security of the Five-Round Kasumi Type Permutation.
IEICE Transactions 91-A(1): 30-38 (2008) |
132 | EE | Kazuhiro Suzuki,
Dongvu Tonien,
Kaoru Kurosawa,
Koji Toyota:
Birthday Paradox for Multi-Collisions.
IEICE Transactions 91-A(1): 39-45 (2008) |
131 | EE | Noboru Kunihiro,
Kaoru Kurosawa:
Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA.
IEICE Transactions 91-A(9): 2356-2364 (2008) |
130 | EE | Kaoru Kurosawa,
Swee-Huay Heng:
The power of identification schemes.
IJACT 1(1): 60-69 (2008) |
129 | EE | Masayuki Abe,
Rosario Gennaro,
Kaoru Kurosawa:
Tag-KEM/DEM: A New Framework for Hybrid Encryption.
J. Cryptology 21(1): 97-130 (2008) |
2007 |
128 | | Kaoru Kurosawa:
Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings
Springer 2007 |
127 | EE | Yvo Desmedt,
Kaoru Kurosawa:
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring.
ISC 2007: 351-361 |
126 | EE | Kazuhiro Suzuki,
Kaoru Kurosawa:
How to Find Many Collisions of 3-Pass HAVAL.
IWSEC 2007: 428-443 |
125 | EE | Noboru Kunihiro,
Kaoru Kurosawa:
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA.
Public Key Cryptography 2007: 412-425 |
124 | EE | Tetsu Iwata,
Kaoru Kurosawa:
How to Construct Super-Pseudorandom Permutations with Short Keys.
IEICE Transactions 90-A(1): 2-13 (2007) |
2006 |
123 | | Moti Yung,
Kaoru Kurosawa,
Reihaneh Safavi-Naini:
Proceedings of the Sixth ACM Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006
ACM 2006 |
122 | EE | Masayuki Abe,
Yang Cui,
Hideki Imai,
Kaoru Kurosawa:
Tag-KEM from Set Partial Domain One-Way Permutations.
ACISP 2006: 360-370 |
121 | EE | Kaoru Kurosawa,
Tsuyoshi Takagi:
New Approach for Selectively Convertible Undeniable Signature Schemes.
ASIACRYPT 2006: 428-443 |
120 | EE | Jun Furukawa,
Kaoru Kurosawa,
Hideki Imai:
An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge.
ICALP (2) 2006: 46-57 |
119 | EE | Kazuhiro Suzuki,
Dongvu Tonien,
Kaoru Kurosawa,
Koji Toyota:
Birthday Paradox for Multi-collisions.
ICISC 2006: 29-40 |
118 | EE | Tri Van Le,
Kaoru Kurosawa:
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks.
Information Hiding 2006: 297-313 |
117 | EE | Kaoru Kurosawa,
Katja Schmidt-Samoa:
New Online/Offline Signature Schemes Without Random Oracles.
Public Key Cryptography 2006: 330-346 |
116 | EE | Kaoru Kurosawa,
Swee-Huay Heng:
The Power of Identification Schemes.
Public Key Cryptography 2006: 364-377 |
115 | EE | Kaoru Kurosawa,
Swee-Huay Heng:
Relations Among Security Notions for Undeniable Signature Schemes.
SCN 2006: 34-48 |
114 | EE | Wakaha Ogata,
Kaoru Kurosawa,
Swee-Huay Heng:
The security of the FDH variant of Chaum's undeniable signature scheme.
IEEE Transactions on Information Theory 52(5): 2006-2017 (2006) |
113 | EE | Ryutaroh Matsumoto,
Kaoru Kurosawa,
Toshiya Itoh,
Toshimitsu Konno,
Tomohiko Uyematsu:
Primal-Dual Distance Bounds of Linear Codes With Application to Cryptography.
IEEE Transactions on Information Theory 52(9): 4251-4256 (2006) |
112 | EE | Swee-Huay Heng,
Kaoru Kurosawa:
k-Resilient Identity-Based Encryption in the Standard Model.
IEICE Transactions 89-A(1): 39-46 (2006) |
111 | EE | Lan Nguyen,
Reihaneh Safavi-Naini,
Kaoru Kurosawa:
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security.
Int. J. Inf. Sec. 5(4): 241-255 (2006) |
110 | EE | Wakaha Ogata,
Kaoru Kurosawa,
Douglas R. Stinson:
Optimum Secret Sharing Scheme Secure against Cheating.
SIAM J. Discrete Math. 20(1): 79-95 (2006) |
2005 |
109 | EE | Masayuki Abe,
Rosario Gennaro,
Kaoru Kurosawa,
Victor Shoup:
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
EUROCRYPT 2005: 128-146 |
108 | EE | Kaoru Kurosawa,
Swee-Huay Heng:
3-Move Undeniable Signature Scheme.
EUROCRYPT 2005: 181-197 |
107 | EE | Tetsu Iwata,
Kaoru Kurosawa:
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms.
FSE 2005: 268-283 |
106 | EE | Kaoru Kurosawa,
Swee-Huay Heng:
Identity-Based Identification Without Random Oracles.
ICCSA (2) 2005: 603-613 |
105 | EE | Yvo Desmedt,
Kaoru Kurosawa:
Electronic Voting: Starting Over?
ISC 2005: 329-343 |
104 | EE | Wakaha Ogata,
Kaoru Kurosawa,
Swee-Huay Heng:
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme.
Public Key Cryptography 2005: 328-345 |
103 | EE | Ryutaroh Matsumoto,
Kaoru Kurosawa,
Toshiya Itoh,
Toshimitsu Konno,
Tomohiko Uyematsu:
Primal-dual distance bounds of linear codes with application to cryptography
CoRR abs/cs/0506087: (2005) |
102 | EE | Yasuhiro Ohtaki,
Masaru Kamada,
Kaoru Kurosawa:
A Scheme for Partial Disclosure of Transaction Log.
IEICE Transactions 88-A(1): 222-229 (2005) |
101 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Security of a MAC by Mitchell.
IEICE Transactions 88-A(1): 25-32 (2005) |
100 | EE | Kaoru Kurosawa,
Tetsu Iwata,
Quang Viet Duong:
How to Improve Interpolation Attack.
IEICE Transactions 88-A(1): 9-15 (2005) |
99 | EE | Masaru Kamada,
Kaoru Kurosawa,
Yasuhiro Ohtaki,
Shusuke Okamoto:
A Network Game Based on Fair Random Numbers.
IEICE Transactions 88-D(5): 859-864 (2005) |
98 | EE | Lan Nguyen,
Reihaneh Safavi-Naini,
Kaoru Kurosawa:
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem.
J. UCS 11(6): 986-1010 (2005) |
2004 |
97 | EE | Tetsu Iwata,
Kaoru Kurosawa:
How to Re-use Round Function in Super-Pseudorandom Permutation.
ACISP 2004: 224-235 |
96 | EE | Kaoru Kurosawa,
Toshihiko Matsuo:
How to Remove MAC from DHIES.
ACISP 2004: 236-247 |
95 | EE | Lan Nguyen,
Reihaneh Safavi-Naini,
Kaoru Kurosawa:
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.
ACNS 2004: 61-75 |
94 | EE | Kaoru Kurosawa,
Yvo Desmedt:
A New Paradigm of Hybrid Encryption Scheme.
CRYPTO 2004: 426-442 |
93 | EE | Quang Viet Duong,
Kaoru Kurosawa:
Almost Ideal Contrast Visual Cryptography with Reversing.
CT-RSA 2004: 353-365 |
92 | EE | Swee-Huay Heng,
Kaoru Kurosawa:
k-Resilient Identity-Based Encryption in the Standard Model.
CT-RSA 2004: 67-80 |
91 | EE | Takeshi Koshiba,
Kaoru Kurosawa:
Short Exponent Diffie-Hellman Problems.
Public Key Cryptography 2004: 173-186 |
90 | EE | Kaoru Kurosawa,
Swee-Huay Heng:
From Digital Signature to ID-based Identification/Signature.
Public Key Cryptography 2004: 248-261 |
89 | EE | Wakaha Ogata,
Kaoru Kurosawa,
Douglas R. Stinson,
Hajime Saido:
New combinatorial designs and their applications to authentication codes and secret sharing schemes.
Discrete Mathematics 279(1-3): 383-405 (2004) |
88 | | Kaoru Kurosawa,
Tetsu Iwata,
Takayuki Yoshiwara:
New covering radius of Reed-Muller codes for t-resilient functions.
IEEE Transactions on Information Theory 20(3): 468-475 (2004) |
87 | | Kaoru Kurosawa,
Ryutaroh Matsumoto:
Almost security of cryptographic Boolean functions.
IEEE Transactions on Information Theory 50(11): 2752-2761 (2004) |
86 | EE | Kaoru Kurosawa,
Quang Viet Duong:
How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer.
IEICE Transactions 87-A(1): 141-146 (2004) |
85 | EE | Kaoru Kurosawa,
Tetsu Iwata:
TMAC: Two-Key CBC MAC.
IEICE Transactions 87-A(1): 46-52 (2004) |
84 | EE | Swee-Huay Heng,
Kaoru Kurosawa:
Square Hash with a Small Key Size.
IEICE Transactions 87-A(1): 54-59 (2004) |
83 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Universal Hash Functions in Luby-Rackoff Cipher.
IEICE Transactions 87-A(1): 60-66 (2004) |
82 | EE | Toshihiko Matsuo,
Kaoru Kurosawa:
On Parallel Hash Functions Based on Block-Ciphers.
IEICE Transactions 87-A(1): 67-74 (2004) |
81 | EE | Wakaha Ogata,
Kaoru Kurosawa:
Oblivious keyword search.
J. Complexity 20(2-3): 356-371 (2004) |
2003 |
80 | EE | Tetsu Iwata,
Tohru Yagi,
Kaoru Kurosawa:
On the Pseudorandomness of KASUMI Type Permutations.
ACISP 2003: 130-141 |
79 | EE | Toshihiko Matsuo,
Kaoru Kurosawa:
On Parallel Hash Functions Based on Block-Cipher.
ACISP 2003: 510-521 |
78 | EE | Swee-Huay Heng,
Kaoru Kurosawa:
Square Hash with a Small Key Size.
ACISP 2003: 522-531 |
77 | EE | Kaoru Kurosawa,
Tsuyoshi Takagi:
Some RSA-Based Encryption Schemes with Tight Security Reduction.
ASIACRYPT 2003: 19-36 |
76 | EE | Kaoru Kurosawa,
Katja Schmidt-Samoa,
Tsuyoshi Takagi:
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
ASIACRYPT 2003: 474-491 |
75 | EE | Kaoru Kurosawa,
Tetsu Iwata:
TMAC: Two-Key CBC MAC.
CT-RSA 2003: 33-49 |
74 | EE | Tetsu Iwata,
Kaoru Kurosawa:
OMAC: One-Key CBC MAC.
FSE 2003: 129-153 |
73 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Security of a New Variant of OMAC.
ICISC 2003: 67-78 |
72 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
IMA Int. Conf. 2003: 306-318 |
71 | EE | Tetsu Iwata,
Kaoru Kurosawa:
Stronger Security Bounds for OMAC, TMAC, and XCBC.
INDOCRYPT 2003: 402-415 |
70 | EE | Yvo Desmedt,
Kaoru Kurosawa,
Tri Van Le:
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes.
ISC 2003: 396-407 |
69 | EE | Tetsu Iwata,
Tomonobu Yoshino,
Kaoru Kurosawa:
Non-cryptographic primitive for pseudorandom permutation.
Theor. Comput. Sci. 306(1-3): 139-154 (2003) |
2002 |
68 | EE | Wakaha Ogata,
Kaoru Kurosawa:
Bounds for Robust Metering Schemes and Their Relationship with A-code.
ASIACRYPT 2002: 64-80 |
67 | EE | Kaoru Kurosawa,
Wakaha Ogata:
Bit-Slice Auction Circuit.
ESORICS 2002: 24-38 |
66 | EE | Tetsu Iwata,
Tomonobu Yoshino,
Kaoru Kurosawa:
Non-cryptographic Primitive for Pseudorandom Permutation.
FSE 2002: 149-163 |
65 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Universal Hash Functionsin Luby-Rackoff Cipher.
ICISC 2002: 226-236 |
64 | EE | Kaoru Kurosawa,
Takuya Yoshida:
Linear Code Implies Public-Key Traitor Tracing.
Public Key Cryptography 2002: 172-187 |
63 | EE | Kaoru Kurosawa:
Multi-recipient Public-Key Encryption with Shortened Ciphertext.
Public Key Cryptography 2002: 48-63 |
62 | | Wataru Kishimoto,
Koji Okada,
Kaoru Kurosawa,
Wakaha Ogata:
On the bound for anonymous secret sharing schemes.
Discrete Applied Mathematics 121(1-3): 193-202 (2002) |
2001 |
61 | EE | Tetsu Iwata,
Tomonobu Yoshino,
Tomohiro Yuasa,
Kaoru Kurosawa:
Round Security and Super-Pseudorandomness of MISTY Type Structure.
FSE 2001: 233-247 |
60 | EE | Akihiro Yamamura,
Kaoru Kurosawa:
Generic Algorithms and Key Agreement Protocols Based on Group Actions.
ISAAC 2001: 208-218 |
59 | EE | Kaoru Kurosawa,
Wakaha Ogata,
Toshihiki Matsuo,
Shuichi Makishima:
IND-CCA Public Key Schemes Equivalent to Factoring n=pq.
Public Key Cryptography 2001: 36-47 |
58 | EE | Tetsu Iwata,
Takayuki Yoshiwara,
Kaoru Kurosawa:
New Covering Radius of Reed-Muller Codes for t-Resilient Functions.
Selected Areas in Cryptography 2001: 75-86 |
57 | | Satoshi Obana,
Kaoru Kurosawa:
Bounds and Combinatorial Structure of Multi-Receiver-Codes.
Des. Codes Cryptography 22(1): 47-63 (2001) |
56 | | Kaoru Kurosawa,
Satoshi Obana:
Combinatorial Bounds on Authentication Codes with Arbitration.
Des. Codes Cryptography 22(3): 265-281 (2001) |
55 | EE | Kaoru Kurosawa,
Thomas Johansson,
Douglas R. Stinson:
Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications.
J. Cryptology 14(4): 231-253 (2001) |
2000 |
54 | EE | Masashi Mitomo,
Kaoru Kurosawa:
Attack for Flash MIX.
ASIACRYPT 2000: 192-204 |
53 | EE | Wakaha Ogata,
Kaoru Kurosawa:
Provably Secure Metering Scheme.
ASIACRYPT 2000: 388-398 |
52 | EE | Yvo Desmedt,
Kaoru Kurosawa:
How to Break a Practical MIX and Design a New One.
EUROCRYPT 2000: 557-572 |
51 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Pseudorandomness of the AES Finalists - RC6 and Serpent.
FSE 2000: 231-243 |
50 | EE | Kaoru Kurosawa,
Tetsu Iwata,
Quang Viet Duong:
Root Finding Interpolation Attack.
Selected Areas in Cryptography 2000: 303-314 |
49 | | Satoshi Obana,
Kaoru Kurosawa:
Combinatorial Classification of Optimal Authentication Codes with Arbitration.
Des. Codes Cryptography 20(3): 281-305 (2000) |
48 | | Kaoru Kurosawa,
Fumio Sato,
Takahiro Sakata,
Wataru Kishimoto:
A relationship between linear complexity and kapa-error linear complexity.
IEEE Transactions on Information Theory 46(2): 694-698 (2000) |
47 | | Koji Okada,
Kaoru Kurosawa:
MDS secret-sharing scheme secure against cheaters.
IEEE Transactions on Information Theory 46(3): 1078-1081 (2000) |
1999 |
46 | | Takashi Satoh,
Tetsu Iwata,
Kaoru Kurosawa:
On Cryptographically Secure Vectorial Boolean Functions.
ASIACRYPT 1999: 20-28 |
45 | | Tetsu Iwata,
Kaoru Kurosawa:
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions.
ASIACRYPT 1999: 62-74 |
44 | | Kaoru Kurosawa,
Wakaha Ogata:
Efficient Rabin-type Digital Signature Scheme.
Des. Codes Cryptography 16(1): 53-64 (1999) |
43 | | Kaoru Kurosawa,
Takuya Yoshida:
Strongly universal hashing and identification codes via channels.
IEEE Transactions on Information Theory 45(6): 2091-2095 (1999) |
42 | EE | Carlo Blundo,
Alfredo De Santis,
Kaoru Kurosawa,
Wakaha Ogata:
On a Fallacious Bound for Authentication Codes.
J. Cryptology 12(3): 155-159 (1999) |
1998 |
41 | EE | Yvo Desmedt,
Brian King,
Wataru Kishimoto,
Kaoru Kurosawa:
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group.
ACISP 1998: 391-402 |
40 | EE | Kaoru Kurosawa,
Takuya Yoshida,
Yvo Desmedt,
Mike Burmester:
Some Bounds and a Construction for Secure Broadcast Encryption.
ASIACRYPT 1998: 420-433 |
39 | EE | Kaoru Kurosawa,
Yvo Desmedt:
Optimum Traitor Tracing and Asymmetric Schemes.
EUROCRYPT 1998: 145-157 |
38 | | Kaoru Kurosawa,
Koji Okada,
Hajime Saido,
Douglas R. Stinson:
New Combinatorial Bounds for Authentication Codes and Key Predistribution Schemes.
Des. Codes Cryptography 15(1): 87-100 (1998) |
37 | EE | Wakaha Ogata,
Kaoru Kurosawa:
Some Basic Properties of General Nonperfect Secret Sharing Schemes.
J. UCS 4(8): 690-704 (1998) |
1997 |
36 | | Kaoru Kurosawa,
Satoshi Obana:
Characterisation of (k, n) Multi-receiver Authentication.
ACISP 1997: 204-215 |
35 | EE | Kaoru Kurosawa,
Thomas Johansson,
Douglas R. Stinson:
Almost k-wise Independent Sample Spaces and Their Cryptologic Applications.
EUROCRYPT 1997: 409-421 |
34 | EE | Kaoru Kurosawa,
Takashi Satoh:
Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria.
EUROCRYPT 1997: 434-449 |
33 | | Satoshi Obana,
Kaoru Kurosawa:
A2-code = Affine resolvable = BIBD.
ICICS 1997: 118-129 |
32 | | Wakaha Ogata,
Kaoru Kurosawa,
Kazue Sako,
Kazunori Takatani:
Fault tolerant anonymous channel.
ICICS 1997: 440-444 |
31 | EE | Kaoru Kurosawa,
Takashi Satoh,
K. Yamamoto:
Highly Nonlinear t-resilient Functions.
J. UCS 3(6): 721-729 (1997) |
1996 |
30 | | Kaoru Kurosawa,
Takashi Satoh:
Generalization of Higher Order SAC to Vector Output Boolean Functions.
ASIACRYPT 1996: 218-231 |
29 | EE | Wakaha Ogata,
Kaoru Kurosawa:
Optimum Secret Sharing Scheme Secure against Cheating.
EUROCRYPT 1996: 200-211 |
28 | EE | Wakaha Ogata,
Keiichi Sakano,
Kaoru Kurosawa:
Multisymbol Majority Vote and Hard Core.
Inf. Process. Lett. 58(6): 285-292 (1996) |
27 | EE | Satoshi Obana,
Kaoru Kurosawa:
Veto is Impossible in Secret Sharing Schemes.
Inf. Process. Lett. 58(6): 293-295 (1996) |
26 | EE | Kaoru Kurosawa,
Koji Okada:
Combinatorial Lower Bounds for Secret Sharing Schemes.
Inf. Process. Lett. 60(6): 301-304 (1996) |
1995 |
25 | | Kaoru Kurosawa,
Sanpei Kageyama:
New Bound for Afine Resolvable Designs and Its Application to Authentication Codes.
COCOON 1995: 292-302 |
24 | EE | Kaoru Kurosawa,
Satoshi Obana,
Wakaha Ogata:
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes.
CRYPTO 1995: 410-423 |
23 | EE | Kaoru Kurosawa,
Satoshi Obana:
Combinatorial Bounds for Authentication Codes with Arbitration.
EUROCRYPT 1995: 289-300 |
22 | | Kaoru Kurosawa,
Naonori Yamashita:
Power Complementary and Linear Phase Filter Banks.
ISCAS 1995: 760-763 |
21 | EE | Kaoru Kurosawa,
Koji Okada,
Shigeo Tsujii:
Low Exponent Attack Against Elliptic Curve RSA.
Inf. Process. Lett. 53(2): 77-83 (1995) |
1994 |
20 | | Koji Okada,
Kaoru Kurosawa:
Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes.
ASIACRYPT 1994: 33-41 |
19 | | Kaoru Kurosawa,
Koji Okada,
Keiichi Sakano:
Security of the Center in Key Distribution Schemes.
ASIACRYPT 1994: 333-341 |
18 | | Kaoru Kurosawa,
Koji Okada,
Shigeo Tsujii:
Low Exponent Attack against Elliptic Curve RSA.
ASIACRYPT 1994: 376-383 |
17 | | Kaoru Kurosawa,
Koji Okada:
Combinatorial Interpretation of Secret Sharing Schemes.
ASIACRYPT 1994: 55-64 |
16 | EE | Kaoru Kurosawa:
New Bound on Authentication Code with Arbitration.
CRYPTO 1994: 140-149 |
15 | | Kaoru Kurosawa,
Isao Yamada,
Naonori Yamashita,
Toshiriro Komou:
Optimum Highpass Filter in Linear Phase Perfect Reconstruction QMF Bank.
ISCAS 1994: 25-28 |
14 | | Kaoru Kurosawa,
Isao Yamada,
Masayuki Ihara:
A Necessary Condition for Linear Phase in Two Dimensional Perfect Reconstruction QMF Banks.
ISCAS 1994: 29-32 |
1993 |
13 | EE | Kaoru Kurosawa,
Koji Okada,
Keiichi Sakano,
Wakaha Ogata,
Shigeo Tsujii:
Nonperfect Secret Sharing Schemes and Matroids.
EUROCRYPT 1993: 126-141 |
12 | EE | Choonsik Park,
Kazutomo Itoh,
Kaoru Kurosawa:
Efficient Anonymous Channel and All/Nothing Election Scheme.
EUROCRYPT 1993: 248-259 |
11 | EE | Choonsik Park,
Kaoru Kurosawa,
Tatsuaki Okamoto,
Shigeo Tsujii:
On Key Distribution and Authentication in Mobile Radio Networks.
EUROCRYPT 1993: 461-465 |
10 | | Kaoru Kurosawa,
Kouichi Kawabe,
Shigeo Tsujii:
Stability and zeros of a complex polynomial.
ISCAS 1993: 2279-2282 |
9 | | Kaoru Kurosawa,
Isao Yamada,
Tetsunari Yokokawa,
Shigeo Tsujii:
A fast stability test for multidimensional systems.
ISCAS 1993: 579-582 |
1992 |
8 | | Takashi Satoh,
Kaoru Kurosawa,
Shigeo Tsujii:
Privacy for Multi-Party Protocols.
AUSCRYPT 1992: 252-260 |
7 | | Wakaha Ogata,
Kaoru Kurosawa,
Shigeo Tsujii:
Nonperfect Secret Sharing Schemes.
AUSCRYPT 1992: 56-66 |
6 | | Kaoru Kurosawa,
Osamu Watanabe:
Computational and Statistical Indistinguishabilities.
ISAAC 1992: 430-438 |
1991 |
5 | | Wakaha Ogata,
Kaoru Kurosawa:
On Claw Free Families.
ASIACRYPT 1991: 111-123 |
4 | | Takeshi Saito,
Kaoru Kurosawa,
Kouichi Sakurai:
4 Move Perfect ZKIP of Knowledge with No Assumption.
ASIACRYPT 1991: 321-330 |
1990 |
3 | EE | Kaoru Kurosawa,
Shigeo Tsujii:
Multi-Language Zero Knowledge Interactive Proof Systems.
CRYPTO 1990: 339-352 |
2 | EE | Kaoru Kurosawa,
Yutaka Katayama,
Wakaha Ogata,
Shigeo Tsujii:
General Public Key Residue Cryptosystems and Mental Poker Protocols.
EUROCRYPT 1990: 374-388 |
1986 |
1 | | Kaoru Kurosawa,
Shigeo Tsujii:
An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC.
ICC 1986: 563-567 |