Kouichi Sakurai

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

147EEChunhua Su, Kouichi Sakurai: A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree. ADMA 2008: 170-181
146EERyuzou Nishi, Yoshiaki Hori, Kouichi Sakurai: Key Distribution Scheme Using Matched Filter Resistant against DoS Attack. AINA Workshops 2008: 1534-1539
145EEYufeng Wang, Yoshiaki Hori, Kouichi Sakurai: Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System. AINA Workshops 2008: 241-246
144EELi Mingchu, Ren Yizhi, Kouichi Sakurai, Cui Yongrui, Wang Zhihui: Granularity Considering in a Trust Model for P2P Networks. AINA Workshops 2008: 307-312
143EEChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119
142EEKohei Tatara, Yoshiaki Hori, Kouichi Sakurai: Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. MUE 2008: 485-489
141EEKazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Ternary Subset Difference Method and Its Quantitative Analysis. WISA 2008: 225-239
140EEKazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Analysis of Program Obfuscation Schemes with Variable Encoding Technique. IEICE Transactions 91-A(1): 316-329 (2008)
139EEErwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai: Toward a Scalable Visualization System for Network Traffic Monitoring. IEICE Transactions 91-D(5): 1300-1310 (2008)
138EERyuzou Nishi, Yoshiaki Hori, Kouichi Sakurai: Reliable Key Distribution Scheme for Lossy Channels. IEICE Transactions 91-D(5): 1485-1488 (2008)
137EEKenji Imamoto, Jianying Zhou, Kouichi Sakurai: Achieving evenhandedness in certified email system for contract signing. Int. J. Inf. Sec. 7(6): 383-394 (2008)
136EEYufeng Wang, Yoshiaki Hori, Kouichi Sakurai: Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment. J. Comput. Sci. Technol. 23(1): 129-140 (2008)
135EEChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391
134EEYufeng Wang, Yoshiaki Hori, Kouichi Sakurai: On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments. APWeb/WAIM Workshops 2007: 211-216
133EEHyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai: A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. ARES 2007: 1160-1166
132EEYufeng Wang, Yoshiaki Hori, Kouichi Sakurai: An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. ATC 2007: 249-258
131EESang-Soo Yeo, Kouichi Sakurai, Sung-Eon Cho, KiSung Yang, Sung Kwon Kim: Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard. ISPA Workshops 2007: 245-254
130EEChunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai: Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208
129EESatoshi Hada, Kouichi Sakurai: A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. IWSEC 2007: 1-12
128EEHyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai: Enforcement of Integrated Security Policy in Trusted Operating Systems. IWSEC 2007: 214-229
127EEKenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai: An Approach of Program Analysis Prevention for Information Protection. MUE 2007: 35-40
126EEFangming Zhao, Yoshiaki Hori, Kouichi Sakurai: Analysis of Privacy Disclosure in DNS Query. MUE 2007: 952-957
125EEYufeng Wang, Yoshiaki Hori, Kouichi Sakurai: Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment. PAKDD Workshops 2007: 502-514
124EEKenichi Takahashi, Yoshiki Mitsuyuki, Tsunenori Mine, Kouichi Sakurai, Makoto Amamiya: Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System. PRIMA 2007: 134-145
123EEKenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya: An Approach of Trusted Program Generation for User-Responsible Privacy. UIC 2007: 1159-1170
122EEYufeng Wang, Yoshiaki Hori, Kouichi Sakurai: On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network. UIC 2007: 382-391
121EEShinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Kouichi Sakurai: On Effectiveness of Clock Control in Stream Ciphers. IEICE Transactions 90-A(9): 1780-1787 (2007)
120 Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings Springer 2006
119EEFumiaki Nagano, Kohei Tatara, Kouichi Sakurai, Toshihiro Tabata: An Intrusion Detection System using Alteration of Data. AINA (1) 2006: 243-248
118EEJeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. Communications and Multimedia Security 2006: 87-96
117EEJin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won: An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590
116EEJong-Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee: Distributing Security-Mediated PKI Revisited. EuroPKI 2006: 31-44
115EEJong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai: A Proactive Secret Sharing for Server Assisted Threshold Signatures. HPCC 2006: 250-259
114EEHyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai: Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. ISPEC 2006: 235-247
113EESatoshi Hada, Kouichi Sakurai: Ciphertext-Auditable Public Key Encryption. IWSEC 2006: 308-321
112EEZhan Wang, Yoshiaki Hori, Kouichi Sakurai: Application and Evaluation of Bayesian Filter for Chinese Spam. Inscrypt 2006: 253-263
111EEJeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. International Conference on Computational Science (1) 2006: 977-980
110EEKohei Tatara, Toshihiro Tabata, Kouichi Sakurai: Actively Modifying Control Flow of Program for Efficient Anormaly Detection. KES (2) 2006: 737-744
109EEKenji Imamoto, Kouichi Sakurai: Off-line verification of one-time ID in distributed environment. PST 2006: 60
108EEKenji Imamoto, Kouichi Sakurai: Enhanced Privacy in Key-Exchange Protocols by One-time ID. SecPerU 2006: 63-68
107 Kenichi Takahashi, Kouichi Sakurai: A Framework for the User-Oriented Personal Information Protection. Security and Management 2006: 12-19
106 Yoshifumi Ueshige, Kouichi Sakurai: A Proposal of One-Time Biometric Authentication. Security and Management 2006: 78-83
105EEYufeng Wang, Wendong Wang, Kouichi Sakurai, Yoshiaki Hori: On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance. UIC 2006: 1008-1018
104EEErwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai: Interactively combining 2D and 3D visualization for network traffic monitoring. VizSEC 2006: 123-127
103EEYasuyuki Sakai, Kouichi Sakurai: Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems. IEICE Transactions 89-A(1): 231-237 (2006)
102EEJunichiro Saito, Kouichi Sakurai: Grouping Proof for RFID Tags. AINA 2005: 621-624
101EERyuzou Nishi, Hitoshi Morioka, Kouichi Sakurai: Trends and Issues for Security of Home-Network Based on Power Line Communication. AINA 2005: 655-660
100EEJunichiro Saito, Kenji Imamoto, Kouichi Sakurai: Reassignment Scheme of an RFID Tag's Key for Owner Transfer. EUC Workshops 2005: 1303-1312
99EEKenichi Takahashi, Kouichi Sakurai, Makoto Amamiya: A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. EUC Workshops 2005: 433-442
98EETatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai: Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow. EUC Workshops 2005: 916-925
97EEMridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee: Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. FSE 2005: 243-254
96EEKenji Imamoto, Jianying Zhou, Kouichi Sakurai: An Evenhanded Certified Email System for Contract Signing. ICICS 2005: 1-13
95EEYasuyuki Sakai, Kouichi Sakurai: Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. ICICS 2005: 169-180
94EEGuilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai: Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. ICICS 2005: 40-52
93EEYong-Sork Her, Kenji Imamoto, Kouichi Sakurai: Some Remarks on Security of Receipt-Free E-auction. ICITA (2) 2005: 560-563
92EESangCheol Hwang, Namhoon Lee, Kouichi Sakurai, GungGil Park, Jaecheol Ryou: The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. ICOIN 2005: 835-842
91EEKohei Tatara, Yoshiaki Hori, Kouichi Sakurai: Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet. ICPADS (2) 2005: 235-239
90EERyuzou Nishi, Kouichi Sakurai: Group key distribution scheme for reducing required rekey message size. ICPADS (2) 2005: 280-284
89EEKenji Imamoto, Kouichi Sakurai: Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic. Electr. Notes Theor. Comput. Sci. 135(1): 79-94 (2005)
88EEYasuyuki Sakai, Kouichi Sakurai: On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks. IEICE Transactions 88-A(1): 154-160 (2005)
87EESatoshi Koga, Kouichi Sakurai: Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost. IEICE Transactions 88-A(1): 247-254 (2005)
86EEHyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai: A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment. IEICE Transactions 88-A(1): 270-279 (2005)
85EEWook Shin, Jeong-Gun Lee, Hong Kook Kim, Kouichi Sakurai: Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling. IEICE Transactions 88-A(1): 327-330 (2005)
84EEWonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai: PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. IEICE Transactions 88-A(1): 39-48 (2005)
83EEShinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers. IEICE Transactions 88-A(10): 2778-2791 (2005)
82EEDong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Side Channel Cryptanalysis on XTR Public Key Cryptosystem. IEICE Transactions 88-A(5): 1214-1223 (2005)
81EEWonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai: Pseudorandomness of SPN-Type Transformations. ACISP 2004: 212-223
80EEDong-Guk Han, Jongin Lim, Kouichi Sakurai: On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. ACISP 2004: 454-465
79EEKenji Imamoto, Kouichi Sakurai: A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model. AINA (1) 2004: 327-333
78EESatoshi Koga, Kouichi Sakurai: A Merging Method of Certification Authorities Without Using Cross-Certifications. AINA (2) 2004: 174-177
77EEYasuyuki Sakai, Kouichi Sakurai: A New Attack with Side Channel Leakage During Exponent Recoding Computations. CHES 2004: 298-311
76EEJunichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. EUC 2004: 879-890
75EESatoshi Koga, Jae-Cheol Ryou, Kouichi Sakurai: Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation. EuroPKI 2004: 85-97
74 Toshihiro Tabata, Kouichi Sakurai: Design of Intrusion Detection System at User Level with System-Call Interposing. ICETE (2) 2004: 263-268
73EEDong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. ICICS 2004: 305-317
72EEWonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee: On the Pseudorandomness of a Modification of KASUMI Type Permutations. ICISC 2004: 313-329
71EEKwon Il Lee, Kouichi Sakurai, Jun Seok Lee, Jae-Cheol Ryou: A DRM Framework for Secure Distribution of Mobile Contents. ICOIN 2004: 905-914
70EESatoshi Koga, Kouichi Sakurai: A Distributed Online Certificate Status Protocol with a Single Public Key. Public Key Cryptography 2004: 389-401
69EEManabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai: Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment. WISA 2004: 135-143
68EEKenji Imamoto, Kouichi Sakurai: Key-Exchange Protocol Using Pre-agreed Session-ID. WISA 2004: 375-387
67EEKohei Tatara, Toshihiro Tabata, Kouichi Sakurai: A Probabilistic Method for Detecting Anomalous Program Behavior. WISA 2004: 87-98
66EEKenji Imamoto, Kouichi Sakurai: Analysis and Design for Private Message Board Systems. IEICE Transactions 87-A(1): 204-211 (2004)
65EEJae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park: Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. ACNS 2003: 265-279
64EEYasuyuki Sakai, Kouichi Sakurai: Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. ACNS 2003: 319-330
63EEMichael W. David, Kouichi Sakurai: Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. AINA 2003: 716-722
62EEKenji Imamoto, Kouichi Sakurai: Certified E-mail Systems Using Public Notice Board. DEXA Workshops 2003: 460-464
61EEKazuhide Fukushima, Kouichi Sakurai: A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. WISA 2003: 303-316
60EEJae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park: An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme. WWW (Posters) 2003
59EEKatsuyuki Okeya, Kouichi Sakurai: On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. ACISP 2002: 420-435
58EEKouichi Sakurai, Tsuyoshi Takagi: On the Security of a Modified Paillier Public-Key Primitive. ACISP 2002: 436-448
57EEKatsuyuki Okeya, Kouichi Sakurai: Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. CHES 2002: 564-578
56EESoichi Furuya, Kouichi Sakurai: Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. ICICS 2002: 327-341
55EEKouichi Sakurai, Tsuyoshi Takagi: A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. ICISC 2002: 359-373
54EEKenji Imamoto, Kouichi Sakurai: A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. INDOCRYPT 2002: 326-338
53EEKatsuyuki Okeya, Kouichi Sakurai: A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. ISC 2002: 389-401
52EEYasuyuki Sakai, Kouichi Sakurai: Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. ISC 2002: 484-500
51EEKouichi Sakurai, Tsuyoshi Takagi: New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Public Key Cryptography 2002: 1-16
50EESoichi Furuya, Kouichi Sakurai: Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Selected Areas in Cryptography 2002: 94-109
49EEKatsuyuki Okeya, Kouichi Sakurai: Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve. CHES 2001: 126-141
48EEKatsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai: A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. ICISC 2001: 428-439
47EEJohannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi: An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. ICISC 2001: 51-71
46EEMototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai: Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. ICISC 2001: 81-102
45EEYasuyuki Sakai, Kouichi Sakurai: On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. Selected Areas in Cryptography 2001: 268-283
44EEDaisuke Hirakiuchi, Kouichi Sakurai: English vs. Sealed Bid in Anonymous Electronic Auction Protocols. WETICE 2001: 171-176
43 Kouichi Sakurai, Shingo Miyazaki: An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. ACISP 2000: 385-399
42 Yasuyuki Sakai, Kouichi Sakurai: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. ACISP 2000: 59-73
41EEKatsuyuki Okeya, Kouichi Sakurai: Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. INDOCRYPT 2000: 178-190
40 Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai: Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications. Public Key Cryptography 2000: 238-257
39 Toro Inoue, Kouichi Sakurai: Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes. Public Key Cryptography 2000: 391-404
38EEGiovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: On zero-knowledge proofs (extended abstract): ``from membership to decision''. STOC 2000: 255-264
37 Shingo Miyazaki, Kouichi Sakurai, Moti Yung: On Threshold RSA-Signing with no Dealer. ICISC 1999: 197-207
36 Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto: A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. ICISC 1999: 221-235
35EEShingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai: Toward Fair International Key Escrow. Public Key Cryptography 1999: 171-187
34EEMike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya: Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. J. Cryptology 12(3): 197-223 (1999)
33EEYasuyuki Sakai, Kouichi Sakurai: Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. ASIACRYPT 1998: 80-94
32EEShingo Miyazaki, Kouichi Sakurai: A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem. Financial Cryptography 1998: 296-308
31EEGiovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it. ISAAC 1998: 59-68
30EEYasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka: Secure Hyperelliptic Cryptosystems and Their Performances. Public Key Cryptography 1998: 164-181
29EEMichael W. David, Kouichi Sakurai: Security Issues for Contactless Smart Cards. Public Key Cryptography 1998: 247-252
28 Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols. STACS 1998: 511-521
27EEEisuke Dannoura, Kouichi Sakurai: An Improvement on El-Yaniv-Fiat-Karp-Turpin's Money-Making Bi-Directional Trading Strategy. Inf. Process. Lett. 66(1): 27-33 (1998)
26EEKouichi Sakurai, Hiroki Shizuya: A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. J. Cryptology 11(1): 29-43 (1998)
25 Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai: Protection of Data and Delegated Keys in Digital Distribution. ACISP 1997: 271-282
24EEKouichi Sakurai, Souichi Furuya: Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method. FSE 1997: 114-133
23 Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Zero-knowledge proofs of decision power: new protocols and optimal round-complexity. ICICS 1997: 17-27
22 Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka: On weak RSA-keys produced from Pretty Good Privacy. ICICS 1997: 314-324
21 Eisuke Dannoura, Kouichi Sakurai: On-Line Versus Off-Line in Money-Making Strategies with BROKERAGE. ISAAC 1997: 173-182
20 Kouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue: A Key Escrow System with Protecting User's Privacy by Blind Decoding. ISW 1997: 147-157
19EEKouichi Sakurai: Practical Proofs of Knowledge without Relying on Theoretical Proofs of Membership on Languages. Theor. Comput. Sci. 181(2): 317-335 (1997)
18 Kouichi Sakurai: A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. ASIACRYPT 1996: 159-172
17 Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto: How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. ASIACRYPT 1996: 322-333
16 Akio Yanbe, Kouichi Sakurai: On the Complexity of Computational Problems Associated with Simple Stochastic Games (Extended Abstract). COCOON 1996: 310-322
15 Kouichi Sakurai, Yuliang Zheng: Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). ISAAC 1996: 376-385
14 Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung: A Progress Report on Subliminal-Free Channels. Information Hiding 1996: 157-168
13 Kouichi Sakurai, Yoshinori Yamane: Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection. Information Hiding 1996: 257-264
12EEAkio Yanbe, Kouichi Sakurai: A Short Certificate of the Number of Universal Optimal Strategies for Stopping Simple Stochastic Games. Inf. Process. Lett. 57(1): 17-24 (1996)
11 Kouichi Sakurai: On Separating Proofs of Knowledge from Proofs of Membership of Languages and Its Application to Secure Identification Schemes (Extended Abstract). COCOON 1995: 496-509
10EEKouichi Sakurai, Hiroki Shizuya: Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. EUROCRYPT 1995: 341-355
9 Kouichi Sakurai, Toshiya Itoh: Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes. AUSCRYPT 1992: 231-243
8 Kouichi Sakurai, Toshiya Itoh: On Bit Correlations Among Preimages of "Many to One" One-Way Functions. AUSCRYPT 1992: 435-446
7EEKouichi Sakurai, Toshiya Itoh: On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract). CRYPTO 1992: 246-259
6EETatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya: How Intractable Is the Discrete Logarithm for a General Finite Group? EUROCRYPT 1992: 420-428
5 Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai: 4 Move Perfect ZKIP of Knowledge with No Assumption. ASIACRYPT 1991: 321-330
4 Toshiya Itoh, Kouichi Sakurai: On the Complexity of Constant Round ZKIP of Possession of Knowledge. ASIACRYPT 1991: 331-345
3 Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya: Any Language in IP Has a Divertable ZKIP. ASIACRYPT 1991: 382-396
2EETatsuaki Okamoto, Kouichi Sakurai: Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems. CRYPTO 1991: 267-278
1EEHiroki Shizuya, Toshiya Itoh, Kouichi Sakurai: On the Complexity of Hyperelliptic Discrete Logarithm Problem. EUROCRYPT 1991: 337-351

Coauthor Index

1Makoto Amamiya [99] [123] [124]
2Feng Bao [94] [130] [135] [143]
3Johannes Buchmann [47]
4Mike Burmester [14] [34]
5Donghoon Chang [81] [84]
6Sung-Eon Cho [131]
7Jae-Gwi Choi [60] [65]
8Giovanni Di Crescenzo [23] [28] [31] [38]
9Eisuke Dannoura [21] [27]
10Michael W. David [29] [63]
11Yvo Desmedt [14] [34]
12Kazuhide Fukushima [61] [121] [140] [141]
13Soichi Furuya [50] [56]
14Souichi Furuya [24]
15Satoshi Hada [113] [129]
16Dong-Guk Han [73] [80] [82]
17Yong-Sork Her [93]
18Daisuke Hirakiuchi [44]
19Seokhie Hong [72]
20Yoshiaki Hori [91] [104] [105] [112] [122] [125] [126] [132] [134] [136] [138] [139] [142] [145] [146]
21SangCheol Hwang [92]
22Kenji Imamoto [54] [62] [66] [68] [79] [89] [93] [94] [96] [100] [108] [109] [137]
23Tohru Inoue [20]
24Toro Inoue [39]
25Hirokazu Ishizuka [22] [30]
26Toshiya Itoh [1] [3] [4] [7] [8] [9] [14] [34]
27Manabu Iwanaga [69]
28Tetsuya Izu [73] [82]
29Shin-ichi Kawamura [120]
30Hong Kook Kim [85]
31Howon Kim (Ho Won Kim) [117]
32Hyung Chan Kim [86] [114] [128] [133]
33Seungjoo Kim [117]
34Sung Kwon Kim [131]
35Shinsaku Kiyomoto [83] [121] [140] [141]
36Satoshi Koga [70] [75] [78] [87]
37Masayoshi Kohara [104] [139]
38Ikuko Kuroda [35]
39Kaoru Kurosawa [5]
40Hiroyuki Kurumatani [40]
41Jin Kwak [117]
42Jeong Ok Kwon [111] [118]
43Dong Hoon Lee [111] [118]
44Jeong-Gun Lee [85]
45Jun Seok Lee [71]
46Kwon Il Lee [71]
47Namhoon Lee [92]
48Sangjin Lee [72] [81] [84] [97]
49Wonil Lee [72] [81] [84] [97]
50Jongin Lim (Jong In Lim) [73] [80] [82]
51Zhaoyu Liu [123] [127]
52Erwan Le Malécot [104] [139]
53Masahiro Mambo [17] [25]
54Tsutomu Matsumoto [36]
55Tsunenori Mine [124]
56Li Mingchu [144]
57Yoshiki Mitsuyuki [124]
58Kunihiko Miyazaki [48]
59Shingo Miyazaki [20] [32] [35] [37] [43]
60Hitoshi Morioka [101]
61Yuko Murayama [120]
62Fumiaki Nagano [119]
63Mridul Nandi [81] [84] [97]
64Ryuzou Nishi [90] [101] [138] [146]
65Mototsugu Nishioka [46]
66Eiji Okamoto [17] [25]
67Tatsuaki Okamoto [2] [6]
68Katsuyuki Okeya [40] [41] [48] [49] [53] [57] [59]
69GungGil Park [92]
70Ji-Hwan Park [60] [65]
71Namje Park [117]
72R. S. Ramakrishna [86] [114] [128] [133]
73Kai Rannenberg [120]
74Keunwoo Rhee [117]
75Kyung Hyune Rhee [115] [116]
76Jae-Cheol Ryou [71] [75] [76]
77Jaecheol Ryou [92]
78Junichiro Saito [76] [100] [102]
79Takeshi Saito [5]
80Yasuyuki Sakai [22] [30] [33] [42] [45] [52] [64] [77] [88] [95] [103]
81Palash Sarkar [81] [84]
82Hisayoshi Satoh [46]
83Wook Shin [85] [114] [128] [133]
84Hiroki Shizuya [1] [3] [6] [10] [14] [26] [34]
85Chunhua Su [130] [135] [143] [147]
86Toshihiro Tabata [67] [69] [74] [98] [110] [119]
87Tsuyoshi Takagi [47] [51] [55] [58] [130] [135] [143]
88Kenichi Takahashi [99] [107] [123] [124] [127]
89Tetsuya Tamura [36]
90Toshiaki Tanaka [83] [121] [140] [141]
91Kohei Tatara [67] [91] [110] [119] [142]
92Tatsuya Toyofuku [98]
93Yoshifumi Ueshige [106]
94Guilin Wang [94]
95Wendong Wang [105]
96Yufeng Wang [105] [122] [125] [132] [134] [136] [145]
97Zhan Wang [112]
98Dongho Won [117]
99Yoshinori Yamane [13]
100Yoshinori Yamani [20]
101Akio Yanbe [12] [16]
102Jong-Phil Yang [115] [116]
103KiSung Yang [131]
104Sang-Soo Yeo (Sang Soo Yeo) [131]
105Ren Yizhi [144]
106Cui Yongrui [144]
107Hiroshi Yoshiura [120]
108Moti Yung (Mordechai M. Yung) [14] [23] [28] [31] [37] [38]
109Fangming Zhao [126]
110Yuliang Zheng [15]
111Wang Zhihui [144]
112Jianying Zhou [96] [130] [135] [137] [143]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)