2008 |
147 | EE | Chunhua Su,
Kouichi Sakurai:
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree.
ADMA 2008: 170-181 |
146 | EE | Ryuzou Nishi,
Yoshiaki Hori,
Kouichi Sakurai:
Key Distribution Scheme Using Matched Filter Resistant against DoS Attack.
AINA Workshops 2008: 1534-1539 |
145 | EE | Yufeng Wang,
Yoshiaki Hori,
Kouichi Sakurai:
Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System.
AINA Workshops 2008: 241-246 |
144 | EE | Li Mingchu,
Ren Yizhi,
Kouichi Sakurai,
Cui Yongrui,
Wang Zhihui:
Granularity Considering in a Trust Model for P2P Networks.
AINA Workshops 2008: 307-312 |
143 | EE | Chunhua Su,
Feng Bao,
Jianying Zhou,
Tsuyoshi Takagi,
Kouichi Sakurai:
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
ARES 2008: 112-119 |
142 | EE | Kohei Tatara,
Yoshiaki Hori,
Kouichi Sakurai:
Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection.
MUE 2008: 485-489 |
141 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Ternary Subset Difference Method and Its Quantitative Analysis.
WISA 2008: 225-239 |
140 | EE | Kazuhide Fukushima,
Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Transactions 91-A(1): 316-329 (2008) |
139 | EE | Erwan Le Malécot,
Masayoshi Kohara,
Yoshiaki Hori,
Kouichi Sakurai:
Toward a Scalable Visualization System for Network Traffic Monitoring.
IEICE Transactions 91-D(5): 1300-1310 (2008) |
138 | EE | Ryuzou Nishi,
Yoshiaki Hori,
Kouichi Sakurai:
Reliable Key Distribution Scheme for Lossy Channels.
IEICE Transactions 91-D(5): 1485-1488 (2008) |
137 | EE | Kenji Imamoto,
Jianying Zhou,
Kouichi Sakurai:
Achieving evenhandedness in certified email system for contract signing.
Int. J. Inf. Sec. 7(6): 383-394 (2008) |
136 | EE | Yufeng Wang,
Yoshiaki Hori,
Kouichi Sakurai:
Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment.
J. Comput. Sci. Technol. 23(1): 129-140 (2008) |
2007 |
135 | EE | Chunhua Su,
Feng Bao,
Jianying Zhou,
Tsuyoshi Takagi,
Kouichi Sakurai:
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation.
AINA Workshops (1) 2007: 385-391 |
134 | EE | Yufeng Wang,
Yoshiaki Hori,
Kouichi Sakurai:
On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments.
APWeb/WAIM Workshops 2007: 211-216 |
133 | EE | Hyung Chan Kim,
R. S. Ramakrishna,
Wook Shin,
Kouichi Sakurai:
A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
ARES 2007: 1160-1166 |
132 | EE | Yufeng Wang,
Yoshiaki Hori,
Kouichi Sakurai:
An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System.
ATC 2007: 249-258 |
131 | EE | Sang-Soo Yeo,
Kouichi Sakurai,
Sung-Eon Cho,
KiSung Yang,
Sung Kwon Kim:
Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard.
ISPA Workshops 2007: 245-254 |
130 | EE | Chunhua Su,
Jianying Zhou,
Feng Bao,
Tsuyoshi Takagi,
Kouichi Sakurai:
Two-Party Privacy-Preserving Agglomerative Document Clustering.
ISPEC 2007: 193-208 |
129 | EE | Satoshi Hada,
Kouichi Sakurai:
A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.
IWSEC 2007: 1-12 |
128 | EE | Hyung Chan Kim,
R. S. Ramakrishna,
Wook Shin,
Kouichi Sakurai:
Enforcement of Integrated Security Policy in Trusted Operating Systems.
IWSEC 2007: 214-229 |
127 | EE | Kenichi Takahashi,
Zhaoyu Liu,
Kouichi Sakurai:
An Approach of Program Analysis Prevention for Information Protection.
MUE 2007: 35-40 |
126 | EE | Fangming Zhao,
Yoshiaki Hori,
Kouichi Sakurai:
Analysis of Privacy Disclosure in DNS Query.
MUE 2007: 952-957 |
125 | EE | Yufeng Wang,
Yoshiaki Hori,
Kouichi Sakurai:
Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment.
PAKDD Workshops 2007: 502-514 |
124 | EE | Kenichi Takahashi,
Yoshiki Mitsuyuki,
Tsunenori Mine,
Kouichi Sakurai,
Makoto Amamiya:
Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System.
PRIMA 2007: 134-145 |
123 | EE | Kenichi Takahashi,
Zhaoyu Liu,
Kouichi Sakurai,
Makoto Amamiya:
An Approach of Trusted Program Generation for User-Responsible Privacy.
UIC 2007: 1159-1170 |
122 | EE | Yufeng Wang,
Yoshiaki Hori,
Kouichi Sakurai:
On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network.
UIC 2007: 382-391 |
121 | EE | Shinsaku Kiyomoto,
Kazuhide Fukushima,
Toshiaki Tanaka,
Kouichi Sakurai:
On Effectiveness of Clock Control in Stream Ciphers.
IEICE Transactions 90-A(9): 1780-1787 (2007) |
2006 |
120 | | Hiroshi Yoshiura,
Kouichi Sakurai,
Kai Rannenberg,
Yuko Murayama,
Shin-ichi Kawamura:
Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings
Springer 2006 |
119 | EE | Fumiaki Nagano,
Kohei Tatara,
Kouichi Sakurai,
Toshihiro Tabata:
An Intrusion Detection System using Alteration of Data.
AINA (1) 2006: 243-248 |
118 | EE | Jeong Ok Kwon,
Kouichi Sakurai,
Dong Hoon Lee:
One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.
Communications and Multimedia Security 2006: 87-96 |
117 | EE | Jin Kwak,
Keunwoo Rhee,
Namje Park,
Howon Kim,
Seungjoo Kim,
Kouichi Sakurai,
Dongho Won:
An RFID System Based MCLT System with Improved Privacy.
EUC Workshops 2006: 579-590 |
116 | EE | Jong-Phil Yang,
Kouichi Sakurai,
Kyung Hyune Rhee:
Distributing Security-Mediated PKI Revisited.
EuroPKI 2006: 31-44 |
115 | EE | Jong-Phil Yang,
Kyung Hyune Rhee,
Kouichi Sakurai:
A Proactive Secret Sharing for Server Assisted Threshold Signatures.
HPCC 2006: 250-259 |
114 | EE | Hyung Chan Kim,
Wook Shin,
R. S. Ramakrishna,
Kouichi Sakurai:
Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
ISPEC 2006: 235-247 |
113 | EE | Satoshi Hada,
Kouichi Sakurai:
Ciphertext-Auditable Public Key Encryption.
IWSEC 2006: 308-321 |
112 | EE | Zhan Wang,
Yoshiaki Hori,
Kouichi Sakurai:
Application and Evaluation of Bayesian Filter for Chinese Spam.
Inscrypt 2006: 253-263 |
111 | EE | Jeong Ok Kwon,
Kouichi Sakurai,
Dong Hoon Lee:
Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks.
International Conference on Computational Science (1) 2006: 977-980 |
110 | EE | Kohei Tatara,
Toshihiro Tabata,
Kouichi Sakurai:
Actively Modifying Control Flow of Program for Efficient Anormaly Detection.
KES (2) 2006: 737-744 |
109 | EE | Kenji Imamoto,
Kouichi Sakurai:
Off-line verification of one-time ID in distributed environment.
PST 2006: 60 |
108 | EE | Kenji Imamoto,
Kouichi Sakurai:
Enhanced Privacy in Key-Exchange Protocols by One-time ID.
SecPerU 2006: 63-68 |
107 | | Kenichi Takahashi,
Kouichi Sakurai:
A Framework for the User-Oriented Personal Information Protection.
Security and Management 2006: 12-19 |
106 | | Yoshifumi Ueshige,
Kouichi Sakurai:
A Proposal of One-Time Biometric Authentication.
Security and Management 2006: 78-83 |
105 | EE | Yufeng Wang,
Wendong Wang,
Kouichi Sakurai,
Yoshiaki Hori:
On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance.
UIC 2006: 1008-1018 |
104 | EE | Erwan Le Malécot,
Masayoshi Kohara,
Yoshiaki Hori,
Kouichi Sakurai:
Interactively combining 2D and 3D visualization for network traffic monitoring.
VizSEC 2006: 123-127 |
103 | EE | Yasuyuki Sakai,
Kouichi Sakurai:
Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems.
IEICE Transactions 89-A(1): 231-237 (2006) |
2005 |
102 | EE | Junichiro Saito,
Kouichi Sakurai:
Grouping Proof for RFID Tags.
AINA 2005: 621-624 |
101 | EE | Ryuzou Nishi,
Hitoshi Morioka,
Kouichi Sakurai:
Trends and Issues for Security of Home-Network Based on Power Line Communication.
AINA 2005: 655-660 |
100 | EE | Junichiro Saito,
Kenji Imamoto,
Kouichi Sakurai:
Reassignment Scheme of an RFID Tag's Key for Owner Transfer.
EUC Workshops 2005: 1303-1312 |
99 | EE | Kenichi Takahashi,
Kouichi Sakurai,
Makoto Amamiya:
A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability.
EUC Workshops 2005: 433-442 |
98 | EE | Tatsuya Toyofuku,
Toshihiro Tabata,
Kouichi Sakurai:
Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow.
EUC Workshops 2005: 916-925 |
97 | EE | Mridul Nandi,
Wonil Lee,
Kouichi Sakurai,
Sangjin Lee:
Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
FSE 2005: 243-254 |
96 | EE | Kenji Imamoto,
Jianying Zhou,
Kouichi Sakurai:
An Evenhanded Certified Email System for Contract Signing.
ICICS 2005: 1-13 |
95 | EE | Yasuyuki Sakai,
Kouichi Sakurai:
Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves.
ICICS 2005: 169-180 |
94 | EE | Guilin Wang,
Feng Bao,
Kenji Imamoto,
Kouichi Sakurai:
Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery.
ICICS 2005: 40-52 |
93 | EE | Yong-Sork Her,
Kenji Imamoto,
Kouichi Sakurai:
Some Remarks on Security of Receipt-Free E-auction.
ICITA (2) 2005: 560-563 |
92 | EE | SangCheol Hwang,
Namhoon Lee,
Kouichi Sakurai,
GungGil Park,
Jaecheol Ryou:
The Improved Risk Analysis Mechanism in the Practical Risk Analysis System.
ICOIN 2005: 835-842 |
91 | EE | Kohei Tatara,
Yoshiaki Hori,
Kouichi Sakurai:
Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet.
ICPADS (2) 2005: 235-239 |
90 | EE | Ryuzou Nishi,
Kouichi Sakurai:
Group key distribution scheme for reducing required rekey message size.
ICPADS (2) 2005: 280-284 |
89 | EE | Kenji Imamoto,
Kouichi Sakurai:
Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic.
Electr. Notes Theor. Comput. Sci. 135(1): 79-94 (2005) |
88 | EE | Yasuyuki Sakai,
Kouichi Sakurai:
On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks.
IEICE Transactions 88-A(1): 154-160 (2005) |
87 | EE | Satoshi Koga,
Kouichi Sakurai:
Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost.
IEICE Transactions 88-A(1): 247-254 (2005) |
86 | EE | Hyung Chan Kim,
R. S. Ramakrishna,
Kouichi Sakurai:
A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment.
IEICE Transactions 88-A(1): 270-279 (2005) |
85 | EE | Wook Shin,
Jeong-Gun Lee,
Hong Kook Kim,
Kouichi Sakurai:
Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling.
IEICE Transactions 88-A(1): 327-330 (2005) |
84 | EE | Wonil Lee,
Mridul Nandi,
Palash Sarkar,
Donghoon Chang,
Sangjin Lee,
Kouichi Sakurai:
PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis.
IEICE Transactions 88-A(1): 39-48 (2005) |
83 | EE | Shinsaku Kiyomoto,
Toshiaki Tanaka,
Kouichi Sakurai:
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Transactions 88-A(10): 2778-2791 (2005) |
82 | EE | Dong-Guk Han,
Tetsuya Izu,
Jongin Lim,
Kouichi Sakurai:
Side Channel Cryptanalysis on XTR Public Key Cryptosystem.
IEICE Transactions 88-A(5): 1214-1223 (2005) |
2004 |
81 | EE | Wonil Lee,
Mridul Nandi,
Palash Sarkar,
Donghoon Chang,
Sangjin Lee,
Kouichi Sakurai:
Pseudorandomness of SPN-Type Transformations.
ACISP 2004: 212-223 |
80 | EE | Dong-Guk Han,
Jongin Lim,
Kouichi Sakurai:
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks.
ACISP 2004: 454-465 |
79 | EE | Kenji Imamoto,
Kouichi Sakurai:
A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model.
AINA (1) 2004: 327-333 |
78 | EE | Satoshi Koga,
Kouichi Sakurai:
A Merging Method of Certification Authorities Without Using Cross-Certifications.
AINA (2) 2004: 174-177 |
77 | EE | Yasuyuki Sakai,
Kouichi Sakurai:
A New Attack with Side Channel Leakage During Exponent Recoding Computations.
CHES 2004: 298-311 |
76 | EE | Junichiro Saito,
Jae-Cheol Ryou,
Kouichi Sakurai:
Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags.
EUC 2004: 879-890 |
75 | EE | Satoshi Koga,
Jae-Cheol Ryou,
Kouichi Sakurai:
Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation.
EuroPKI 2004: 85-97 |
74 | | Toshihiro Tabata,
Kouichi Sakurai:
Design of Intrusion Detection System at User Level with System-Call Interposing.
ICETE (2) 2004: 263-268 |
73 | EE | Dong-Guk Han,
Tetsuya Izu,
Jongin Lim,
Kouichi Sakurai:
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.
ICICS 2004: 305-317 |
72 | EE | Wonil Lee,
Kouichi Sakurai,
Seokhie Hong,
Sangjin Lee:
On the Pseudorandomness of a Modification of KASUMI Type Permutations.
ICISC 2004: 313-329 |
71 | EE | Kwon Il Lee,
Kouichi Sakurai,
Jun Seok Lee,
Jae-Cheol Ryou:
A DRM Framework for Secure Distribution of Mobile Contents.
ICOIN 2004: 905-914 |
70 | EE | Satoshi Koga,
Kouichi Sakurai:
A Distributed Online Certificate Status Protocol with a Single Public Key.
Public Key Cryptography 2004: 389-401 |
69 | EE | Manabu Iwanaga,
Toshihiro Tabata,
Kouichi Sakurai:
Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment.
WISA 2004: 135-143 |
68 | EE | Kenji Imamoto,
Kouichi Sakurai:
Key-Exchange Protocol Using Pre-agreed Session-ID.
WISA 2004: 375-387 |
67 | EE | Kohei Tatara,
Toshihiro Tabata,
Kouichi Sakurai:
A Probabilistic Method for Detecting Anomalous Program Behavior.
WISA 2004: 87-98 |
66 | EE | Kenji Imamoto,
Kouichi Sakurai:
Analysis and Design for Private Message Board Systems.
IEICE Transactions 87-A(1): 204-211 (2004) |
2003 |
65 | EE | Jae-Gwi Choi,
Kouichi Sakurai,
Ji-Hwan Park:
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party.
ACNS 2003: 265-279 |
64 | EE | Yasuyuki Sakai,
Kouichi Sakurai:
Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.
ACNS 2003: 319-330 |
63 | EE | Michael W. David,
Kouichi Sakurai:
Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity.
AINA 2003: 716-722 |
62 | EE | Kenji Imamoto,
Kouichi Sakurai:
Certified E-mail Systems Using Public Notice Board.
DEXA Workshops 2003: 460-464 |
61 | EE | Kazuhide Fukushima,
Kouichi Sakurai:
A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.
WISA 2003: 303-316 |
60 | EE | Jae-Gwi Choi,
Kouichi Sakurai,
Ji-Hwan Park:
An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme.
WWW (Posters) 2003 |
2002 |
59 | EE | Katsuyuki Okeya,
Kouichi Sakurai:
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling.
ACISP 2002: 420-435 |
58 | EE | Kouichi Sakurai,
Tsuyoshi Takagi:
On the Security of a Modified Paillier Public-Key Primitive.
ACISP 2002: 436-448 |
57 | EE | Katsuyuki Okeya,
Kouichi Sakurai:
Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick.
CHES 2002: 564-578 |
56 | EE | Soichi Furuya,
Kouichi Sakurai:
Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC.
ICICS 2002: 327-341 |
55 | EE | Kouichi Sakurai,
Tsuyoshi Takagi:
A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem.
ICISC 2002: 359-373 |
54 | EE | Kenji Imamoto,
Kouichi Sakurai:
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority.
INDOCRYPT 2002: 326-338 |
53 | EE | Katsuyuki Okeya,
Kouichi Sakurai:
A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks.
ISC 2002: 389-401 |
52 | EE | Yasuyuki Sakai,
Kouichi Sakurai:
Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.
ISC 2002: 484-500 |
51 | EE | Kouichi Sakurai,
Tsuyoshi Takagi:
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive.
Public Key Cryptography 2002: 1-16 |
50 | EE | Soichi Furuya,
Kouichi Sakurai:
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing.
Selected Areas in Cryptography 2002: 94-109 |
2001 |
49 | EE | Katsuyuki Okeya,
Kouichi Sakurai:
Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve.
CHES 2001: 126-141 |
48 | EE | Katsuyuki Okeya,
Kunihiko Miyazaki,
Kouichi Sakurai:
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.
ICISC 2001: 428-439 |
47 | EE | Johannes Buchmann,
Kouichi Sakurai,
Tsuyoshi Takagi:
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
ICISC 2001: 51-71 |
46 | EE | Mototsugu Nishioka,
Hisayoshi Satoh,
Kouichi Sakurai:
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring.
ICISC 2001: 81-102 |
45 | EE | Yasuyuki Sakai,
Kouichi Sakurai:
On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication.
Selected Areas in Cryptography 2001: 268-283 |
44 | EE | Daisuke Hirakiuchi,
Kouichi Sakurai:
English vs. Sealed Bid in Anonymous Electronic Auction Protocols.
WETICE 2001: 171-176 |
2000 |
43 | | Kouichi Sakurai,
Shingo Miyazaki:
An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme.
ACISP 2000: 385-399 |
42 | | Yasuyuki Sakai,
Kouichi Sakurai:
Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance.
ACISP 2000: 59-73 |
41 | EE | Katsuyuki Okeya,
Kouichi Sakurai:
Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack.
INDOCRYPT 2000: 178-190 |
40 | | Katsuyuki Okeya,
Hiroyuki Kurumatani,
Kouichi Sakurai:
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications.
Public Key Cryptography 2000: 238-257 |
39 | | Toro Inoue,
Kouichi Sakurai:
Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes.
Public Key Cryptography 2000: 391-404 |
38 | EE | Giovanni Di Crescenzo,
Kouichi Sakurai,
Moti Yung:
On zero-knowledge proofs (extended abstract): ``from membership to decision''.
STOC 2000: 255-264 |
1999 |
37 | | Shingo Miyazaki,
Kouichi Sakurai,
Moti Yung:
On Threshold RSA-Signing with no Dealer.
ICISC 1999: 197-207 |
36 | | Tetsuya Tamura,
Kouichi Sakurai,
Tsutomu Matsumoto:
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.
ICISC 1999: 221-235 |
35 | EE | Shingo Miyazaki,
Ikuko Kuroda,
Kouichi Sakurai:
Toward Fair International Key Escrow.
Public Key Cryptography 1999: 171-187 |
34 | EE | Mike Burmester,
Yvo Desmedt,
Toshiya Itoh,
Kouichi Sakurai,
Hiroki Shizuya:
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages.
J. Cryptology 12(3): 197-223 (1999) |
1998 |
33 | EE | Yasuyuki Sakai,
Kouichi Sakurai:
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n.
ASIACRYPT 1998: 80-94 |
32 | EE | Shingo Miyazaki,
Kouichi Sakurai:
A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem.
Financial Cryptography 1998: 296-308 |
31 | EE | Giovanni Di Crescenzo,
Kouichi Sakurai,
Moti Yung:
Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it.
ISAAC 1998: 59-68 |
30 | EE | Yasuyuki Sakai,
Kouichi Sakurai,
Hirokazu Ishizuka:
Secure Hyperelliptic Cryptosystems and Their Performances.
Public Key Cryptography 1998: 164-181 |
29 | EE | Michael W. David,
Kouichi Sakurai:
Security Issues for Contactless Smart Cards.
Public Key Cryptography 1998: 247-252 |
28 | | Giovanni Di Crescenzo,
Kouichi Sakurai,
Moti Yung:
Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols.
STACS 1998: 511-521 |
27 | EE | Eisuke Dannoura,
Kouichi Sakurai:
An Improvement on El-Yaniv-Fiat-Karp-Turpin's Money-Making Bi-Directional Trading Strategy.
Inf. Process. Lett. 66(1): 27-33 (1998) |
26 | EE | Kouichi Sakurai,
Hiroki Shizuya:
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems.
J. Cryptology 11(1): 29-43 (1998) |
1997 |
25 | | Masahiro Mambo,
Eiji Okamoto,
Kouichi Sakurai:
Protection of Data and Delegated Keys in Digital Distribution.
ACISP 1997: 271-282 |
24 | EE | Kouichi Sakurai,
Souichi Furuya:
Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method.
FSE 1997: 114-133 |
23 | | Giovanni Di Crescenzo,
Kouichi Sakurai,
Moti Yung:
Zero-knowledge proofs of decision power: new protocols and optimal round-complexity.
ICICS 1997: 17-27 |
22 | | Yasuyuki Sakai,
Kouichi Sakurai,
Hirokazu Ishizuka:
On weak RSA-keys produced from Pretty Good Privacy.
ICICS 1997: 314-324 |
21 | | Eisuke Dannoura,
Kouichi Sakurai:
On-Line Versus Off-Line in Money-Making Strategies with BROKERAGE.
ISAAC 1997: 173-182 |
20 | | Kouichi Sakurai,
Yoshinori Yamani,
Shingo Miyazaki,
Tohru Inoue:
A Key Escrow System with Protecting User's Privacy by Blind Decoding.
ISW 1997: 147-157 |
19 | EE | Kouichi Sakurai:
Practical Proofs of Knowledge without Relying on Theoretical Proofs of Membership on Languages.
Theor. Comput. Sci. 181(2): 317-335 (1997) |
1996 |
18 | | Kouichi Sakurai:
A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes.
ASIACRYPT 1996: 159-172 |
17 | | Masahiro Mambo,
Kouichi Sakurai,
Eiji Okamoto:
How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem.
ASIACRYPT 1996: 322-333 |
16 | | Akio Yanbe,
Kouichi Sakurai:
On the Complexity of Computational Problems Associated with Simple Stochastic Games (Extended Abstract).
COCOON 1996: 310-322 |
15 | | Kouichi Sakurai,
Yuliang Zheng:
Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract).
ISAAC 1996: 376-385 |
14 | | Mike Burmester,
Yvo Desmedt,
Toshiya Itoh,
Kouichi Sakurai,
Hiroki Shizuya,
Moti Yung:
A Progress Report on Subliminal-Free Channels.
Information Hiding 1996: 157-168 |
13 | | Kouichi Sakurai,
Yoshinori Yamane:
Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection.
Information Hiding 1996: 257-264 |
12 | EE | Akio Yanbe,
Kouichi Sakurai:
A Short Certificate of the Number of Universal Optimal Strategies for Stopping Simple Stochastic Games.
Inf. Process. Lett. 57(1): 17-24 (1996) |
1995 |
11 | | Kouichi Sakurai:
On Separating Proofs of Knowledge from Proofs of Membership of Languages and Its Application to Secure Identification Schemes (Extended Abstract).
COCOON 1995: 496-509 |
10 | EE | Kouichi Sakurai,
Hiroki Shizuya:
Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems.
EUROCRYPT 1995: 341-355 |
1992 |
9 | | Kouichi Sakurai,
Toshiya Itoh:
Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes.
AUSCRYPT 1992: 231-243 |
8 | | Kouichi Sakurai,
Toshiya Itoh:
On Bit Correlations Among Preimages of "Many to One" One-Way Functions.
AUSCRYPT 1992: 435-446 |
7 | EE | Kouichi Sakurai,
Toshiya Itoh:
On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract).
CRYPTO 1992: 246-259 |
6 | EE | Tatsuaki Okamoto,
Kouichi Sakurai,
Hiroki Shizuya:
How Intractable Is the Discrete Logarithm for a General Finite Group?
EUROCRYPT 1992: 420-428 |
1991 |
5 | | Takeshi Saito,
Kaoru Kurosawa,
Kouichi Sakurai:
4 Move Perfect ZKIP of Knowledge with No Assumption.
ASIACRYPT 1991: 321-330 |
4 | | Toshiya Itoh,
Kouichi Sakurai:
On the Complexity of Constant Round ZKIP of Possession of Knowledge.
ASIACRYPT 1991: 331-345 |
3 | | Toshiya Itoh,
Kouichi Sakurai,
Hiroki Shizuya:
Any Language in IP Has a Divertable ZKIP.
ASIACRYPT 1991: 382-396 |
2 | EE | Tatsuaki Okamoto,
Kouichi Sakurai:
Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems.
CRYPTO 1991: 267-278 |
1 | EE | Hiroki Shizuya,
Toshiya Itoh,
Kouichi Sakurai:
On the Complexity of Hyperelliptic Discrete Logarithm Problem.
EUROCRYPT 1991: 337-351 |