2008 | ||
---|---|---|
147 | EE | Chunhua Su, Kouichi Sakurai: A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree. ADMA 2008: 170-181 |
146 | EE | Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai: Key Distribution Scheme Using Matched Filter Resistant against DoS Attack. AINA Workshops 2008: 1534-1539 |
145 | EE | Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System. AINA Workshops 2008: 241-246 |
144 | EE | Li Mingchu, Ren Yizhi, Kouichi Sakurai, Cui Yongrui, Wang Zhihui: Granularity Considering in a Trust Model for P2P Networks. AINA Workshops 2008: 307-312 |
143 | EE | Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119 |
142 | EE | Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai: Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. MUE 2008: 485-489 |
141 | EE | Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Ternary Subset Difference Method and Its Quantitative Analysis. WISA 2008: 225-239 |
140 | EE | Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Analysis of Program Obfuscation Schemes with Variable Encoding Technique. IEICE Transactions 91-A(1): 316-329 (2008) |
139 | EE | Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai: Toward a Scalable Visualization System for Network Traffic Monitoring. IEICE Transactions 91-D(5): 1300-1310 (2008) |
138 | EE | Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai: Reliable Key Distribution Scheme for Lossy Channels. IEICE Transactions 91-D(5): 1485-1488 (2008) |
137 | EE | Kenji Imamoto, Jianying Zhou, Kouichi Sakurai: Achieving evenhandedness in certified email system for contract signing. Int. J. Inf. Sec. 7(6): 383-394 (2008) |
136 | EE | Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment. J. Comput. Sci. Technol. 23(1): 129-140 (2008) |
2007 | ||
135 | EE | Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391 |
134 | EE | Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments. APWeb/WAIM Workshops 2007: 211-216 |
133 | EE | Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai: A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. ARES 2007: 1160-1166 |
132 | EE | Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. ATC 2007: 249-258 |
131 | EE | Sang-Soo Yeo, Kouichi Sakurai, Sung-Eon Cho, KiSung Yang, Sung Kwon Kim: Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard. ISPA Workshops 2007: 245-254 |
130 | EE | Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai: Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208 |
129 | EE | Satoshi Hada, Kouichi Sakurai: A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. IWSEC 2007: 1-12 |
128 | EE | Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai: Enforcement of Integrated Security Policy in Trusted Operating Systems. IWSEC 2007: 214-229 |
127 | EE | Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai: An Approach of Program Analysis Prevention for Information Protection. MUE 2007: 35-40 |
126 | EE | Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai: Analysis of Privacy Disclosure in DNS Query. MUE 2007: 952-957 |
125 | EE | Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment. PAKDD Workshops 2007: 502-514 |
124 | EE | Kenichi Takahashi, Yoshiki Mitsuyuki, Tsunenori Mine, Kouichi Sakurai, Makoto Amamiya: Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System. PRIMA 2007: 134-145 |
123 | EE | Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya: An Approach of Trusted Program Generation for User-Responsible Privacy. UIC 2007: 1159-1170 |
122 | EE | Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network. UIC 2007: 382-391 |
121 | EE | Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Kouichi Sakurai: On Effectiveness of Clock Control in Stream Ciphers. IEICE Transactions 90-A(9): 1780-1787 (2007) |
2006 | ||
120 | Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings Springer 2006 | |
119 | EE | Fumiaki Nagano, Kohei Tatara, Kouichi Sakurai, Toshihiro Tabata: An Intrusion Detection System using Alteration of Data. AINA (1) 2006: 243-248 |
118 | EE | Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. Communications and Multimedia Security 2006: 87-96 |
117 | EE | Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won: An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590 |
116 | EE | Jong-Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee: Distributing Security-Mediated PKI Revisited. EuroPKI 2006: 31-44 |
115 | EE | Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai: A Proactive Secret Sharing for Server Assisted Threshold Signatures. HPCC 2006: 250-259 |
114 | EE | Hyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai: Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. ISPEC 2006: 235-247 |
113 | EE | Satoshi Hada, Kouichi Sakurai: Ciphertext-Auditable Public Key Encryption. IWSEC 2006: 308-321 |
112 | EE | Zhan Wang, Yoshiaki Hori, Kouichi Sakurai: Application and Evaluation of Bayesian Filter for Chinese Spam. Inscrypt 2006: 253-263 |
111 | EE | Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. International Conference on Computational Science (1) 2006: 977-980 |
110 | EE | Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai: Actively Modifying Control Flow of Program for Efficient Anormaly Detection. KES (2) 2006: 737-744 |
109 | EE | Kenji Imamoto, Kouichi Sakurai: Off-line verification of one-time ID in distributed environment. PST 2006: 60 |
108 | EE | Kenji Imamoto, Kouichi Sakurai: Enhanced Privacy in Key-Exchange Protocols by One-time ID. SecPerU 2006: 63-68 |
107 | Kenichi Takahashi, Kouichi Sakurai: A Framework for the User-Oriented Personal Information Protection. Security and Management 2006: 12-19 | |
106 | Yoshifumi Ueshige, Kouichi Sakurai: A Proposal of One-Time Biometric Authentication. Security and Management 2006: 78-83 | |
105 | EE | Yufeng Wang, Wendong Wang, Kouichi Sakurai, Yoshiaki Hori: On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance. UIC 2006: 1008-1018 |
104 | EE | Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai: Interactively combining 2D and 3D visualization for network traffic monitoring. VizSEC 2006: 123-127 |
103 | EE | Yasuyuki Sakai, Kouichi Sakurai: Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems. IEICE Transactions 89-A(1): 231-237 (2006) |
2005 | ||
102 | EE | Junichiro Saito, Kouichi Sakurai: Grouping Proof for RFID Tags. AINA 2005: 621-624 |
101 | EE | Ryuzou Nishi, Hitoshi Morioka, Kouichi Sakurai: Trends and Issues for Security of Home-Network Based on Power Line Communication. AINA 2005: 655-660 |
100 | EE | Junichiro Saito, Kenji Imamoto, Kouichi Sakurai: Reassignment Scheme of an RFID Tag's Key for Owner Transfer. EUC Workshops 2005: 1303-1312 |
99 | EE | Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya: A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. EUC Workshops 2005: 433-442 |
98 | EE | Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai: Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow. EUC Workshops 2005: 916-925 |
97 | EE | Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee: Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. FSE 2005: 243-254 |
96 | EE | Kenji Imamoto, Jianying Zhou, Kouichi Sakurai: An Evenhanded Certified Email System for Contract Signing. ICICS 2005: 1-13 |
95 | EE | Yasuyuki Sakai, Kouichi Sakurai: Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. ICICS 2005: 169-180 |
94 | EE | Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai: Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. ICICS 2005: 40-52 |
93 | EE | Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai: Some Remarks on Security of Receipt-Free E-auction. ICITA (2) 2005: 560-563 |
92 | EE | SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, GungGil Park, Jaecheol Ryou: The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. ICOIN 2005: 835-842 |
91 | EE | Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai: Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet. ICPADS (2) 2005: 235-239 |
90 | EE | Ryuzou Nishi, Kouichi Sakurai: Group key distribution scheme for reducing required rekey message size. ICPADS (2) 2005: 280-284 |
89 | EE | Kenji Imamoto, Kouichi Sakurai: Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic. Electr. Notes Theor. Comput. Sci. 135(1): 79-94 (2005) |
88 | EE | Yasuyuki Sakai, Kouichi Sakurai: On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks. IEICE Transactions 88-A(1): 154-160 (2005) |
87 | EE | Satoshi Koga, Kouichi Sakurai: Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost. IEICE Transactions 88-A(1): 247-254 (2005) |
86 | EE | Hyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai: A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment. IEICE Transactions 88-A(1): 270-279 (2005) |
85 | EE | Wook Shin, Jeong-Gun Lee, Hong Kook Kim, Kouichi Sakurai: Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling. IEICE Transactions 88-A(1): 327-330 (2005) |
84 | EE | Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai: PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. IEICE Transactions 88-A(1): 39-48 (2005) |
83 | EE | Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers. IEICE Transactions 88-A(10): 2778-2791 (2005) |
82 | EE | Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Side Channel Cryptanalysis on XTR Public Key Cryptosystem. IEICE Transactions 88-A(5): 1214-1223 (2005) |
2004 | ||
81 | EE | Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai: Pseudorandomness of SPN-Type Transformations. ACISP 2004: 212-223 |
80 | EE | Dong-Guk Han, Jongin Lim, Kouichi Sakurai: On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. ACISP 2004: 454-465 |
79 | EE | Kenji Imamoto, Kouichi Sakurai: A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model. AINA (1) 2004: 327-333 |
78 | EE | Satoshi Koga, Kouichi Sakurai: A Merging Method of Certification Authorities Without Using Cross-Certifications. AINA (2) 2004: 174-177 |
77 | EE | Yasuyuki Sakai, Kouichi Sakurai: A New Attack with Side Channel Leakage During Exponent Recoding Computations. CHES 2004: 298-311 |
76 | EE | Junichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. EUC 2004: 879-890 |
75 | EE | Satoshi Koga, Jae-Cheol Ryou, Kouichi Sakurai: Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation. EuroPKI 2004: 85-97 |
74 | Toshihiro Tabata, Kouichi Sakurai: Design of Intrusion Detection System at User Level with System-Call Interposing. ICETE (2) 2004: 263-268 | |
73 | EE | Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. ICICS 2004: 305-317 |
72 | EE | Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee: On the Pseudorandomness of a Modification of KASUMI Type Permutations. ICISC 2004: 313-329 |
71 | EE | Kwon Il Lee, Kouichi Sakurai, Jun Seok Lee, Jae-Cheol Ryou: A DRM Framework for Secure Distribution of Mobile Contents. ICOIN 2004: 905-914 |
70 | EE | Satoshi Koga, Kouichi Sakurai: A Distributed Online Certificate Status Protocol with a Single Public Key. Public Key Cryptography 2004: 389-401 |
69 | EE | Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai: Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment. WISA 2004: 135-143 |
68 | EE | Kenji Imamoto, Kouichi Sakurai: Key-Exchange Protocol Using Pre-agreed Session-ID. WISA 2004: 375-387 |
67 | EE | Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai: A Probabilistic Method for Detecting Anomalous Program Behavior. WISA 2004: 87-98 |
66 | EE | Kenji Imamoto, Kouichi Sakurai: Analysis and Design for Private Message Board Systems. IEICE Transactions 87-A(1): 204-211 (2004) |
2003 | ||
65 | EE | Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park: Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. ACNS 2003: 265-279 |
64 | EE | Yasuyuki Sakai, Kouichi Sakurai: Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. ACNS 2003: 319-330 |
63 | EE | Michael W. David, Kouichi Sakurai: Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. AINA 2003: 716-722 |
62 | EE | Kenji Imamoto, Kouichi Sakurai: Certified E-mail Systems Using Public Notice Board. DEXA Workshops 2003: 460-464 |
61 | EE | Kazuhide Fukushima, Kouichi Sakurai: A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. WISA 2003: 303-316 |
60 | EE | Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park: An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme. WWW (Posters) 2003 |
2002 | ||
59 | EE | Katsuyuki Okeya, Kouichi Sakurai: On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. ACISP 2002: 420-435 |
58 | EE | Kouichi Sakurai, Tsuyoshi Takagi: On the Security of a Modified Paillier Public-Key Primitive. ACISP 2002: 436-448 |
57 | EE | Katsuyuki Okeya, Kouichi Sakurai: Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. CHES 2002: 564-578 |
56 | EE | Soichi Furuya, Kouichi Sakurai: Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. ICICS 2002: 327-341 |
55 | EE | Kouichi Sakurai, Tsuyoshi Takagi: A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. ICISC 2002: 359-373 |
54 | EE | Kenji Imamoto, Kouichi Sakurai: A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. INDOCRYPT 2002: 326-338 |
53 | EE | Katsuyuki Okeya, Kouichi Sakurai: A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. ISC 2002: 389-401 |
52 | EE | Yasuyuki Sakai, Kouichi Sakurai: Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. ISC 2002: 484-500 |
51 | EE | Kouichi Sakurai, Tsuyoshi Takagi: New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Public Key Cryptography 2002: 1-16 |
50 | EE | Soichi Furuya, Kouichi Sakurai: Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Selected Areas in Cryptography 2002: 94-109 |
2001 | ||
49 | EE | Katsuyuki Okeya, Kouichi Sakurai: Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve. CHES 2001: 126-141 |
48 | EE | Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai: A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. ICISC 2001: 428-439 |
47 | EE | Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi: An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. ICISC 2001: 51-71 |
46 | EE | Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai: Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. ICISC 2001: 81-102 |
45 | EE | Yasuyuki Sakai, Kouichi Sakurai: On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. Selected Areas in Cryptography 2001: 268-283 |
44 | EE | Daisuke Hirakiuchi, Kouichi Sakurai: English vs. Sealed Bid in Anonymous Electronic Auction Protocols. WETICE 2001: 171-176 |
2000 | ||
43 | Kouichi Sakurai, Shingo Miyazaki: An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. ACISP 2000: 385-399 | |
42 | Yasuyuki Sakai, Kouichi Sakurai: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. ACISP 2000: 59-73 | |
41 | EE | Katsuyuki Okeya, Kouichi Sakurai: Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. INDOCRYPT 2000: 178-190 |
40 | Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai: Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications. Public Key Cryptography 2000: 238-257 | |
39 | Toro Inoue, Kouichi Sakurai: Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes. Public Key Cryptography 2000: 391-404 | |
38 | EE | Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: On zero-knowledge proofs (extended abstract): ``from membership to decision''. STOC 2000: 255-264 |
1999 | ||
37 | Shingo Miyazaki, Kouichi Sakurai, Moti Yung: On Threshold RSA-Signing with no Dealer. ICISC 1999: 197-207 | |
36 | Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto: A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. ICISC 1999: 221-235 | |
35 | EE | Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai: Toward Fair International Key Escrow. Public Key Cryptography 1999: 171-187 |
34 | EE | Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya: Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. J. Cryptology 12(3): 197-223 (1999) |
1998 | ||
33 | EE | Yasuyuki Sakai, Kouichi Sakurai: Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. ASIACRYPT 1998: 80-94 |
32 | EE | Shingo Miyazaki, Kouichi Sakurai: A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem. Financial Cryptography 1998: 296-308 |
31 | EE | Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it. ISAAC 1998: 59-68 |
30 | EE | Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka: Secure Hyperelliptic Cryptosystems and Their Performances. Public Key Cryptography 1998: 164-181 |
29 | EE | Michael W. David, Kouichi Sakurai: Security Issues for Contactless Smart Cards. Public Key Cryptography 1998: 247-252 |
28 | Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols. STACS 1998: 511-521 | |
27 | EE | Eisuke Dannoura, Kouichi Sakurai: An Improvement on El-Yaniv-Fiat-Karp-Turpin's Money-Making Bi-Directional Trading Strategy. Inf. Process. Lett. 66(1): 27-33 (1998) |
26 | EE | Kouichi Sakurai, Hiroki Shizuya: A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. J. Cryptology 11(1): 29-43 (1998) |
1997 | ||
25 | Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai: Protection of Data and Delegated Keys in Digital Distribution. ACISP 1997: 271-282 | |
24 | EE | Kouichi Sakurai, Souichi Furuya: Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method. FSE 1997: 114-133 |
23 | Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Zero-knowledge proofs of decision power: new protocols and optimal round-complexity. ICICS 1997: 17-27 | |
22 | Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka: On weak RSA-keys produced from Pretty Good Privacy. ICICS 1997: 314-324 | |
21 | Eisuke Dannoura, Kouichi Sakurai: On-Line Versus Off-Line in Money-Making Strategies with BROKERAGE. ISAAC 1997: 173-182 | |
20 | Kouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue: A Key Escrow System with Protecting User's Privacy by Blind Decoding. ISW 1997: 147-157 | |
19 | EE | Kouichi Sakurai: Practical Proofs of Knowledge without Relying on Theoretical Proofs of Membership on Languages. Theor. Comput. Sci. 181(2): 317-335 (1997) |
1996 | ||
18 | Kouichi Sakurai: A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. ASIACRYPT 1996: 159-172 | |
17 | Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto: How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. ASIACRYPT 1996: 322-333 | |
16 | Akio Yanbe, Kouichi Sakurai: On the Complexity of Computational Problems Associated with Simple Stochastic Games (Extended Abstract). COCOON 1996: 310-322 | |
15 | Kouichi Sakurai, Yuliang Zheng: Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). ISAAC 1996: 376-385 | |
14 | Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung: A Progress Report on Subliminal-Free Channels. Information Hiding 1996: 157-168 | |
13 | Kouichi Sakurai, Yoshinori Yamane: Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection. Information Hiding 1996: 257-264 | |
12 | EE | Akio Yanbe, Kouichi Sakurai: A Short Certificate of the Number of Universal Optimal Strategies for Stopping Simple Stochastic Games. Inf. Process. Lett. 57(1): 17-24 (1996) |
1995 | ||
11 | Kouichi Sakurai: On Separating Proofs of Knowledge from Proofs of Membership of Languages and Its Application to Secure Identification Schemes (Extended Abstract). COCOON 1995: 496-509 | |
10 | EE | Kouichi Sakurai, Hiroki Shizuya: Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. EUROCRYPT 1995: 341-355 |
1992 | ||
9 | Kouichi Sakurai, Toshiya Itoh: Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes. AUSCRYPT 1992: 231-243 | |
8 | Kouichi Sakurai, Toshiya Itoh: On Bit Correlations Among Preimages of "Many to One" One-Way Functions. AUSCRYPT 1992: 435-446 | |
7 | EE | Kouichi Sakurai, Toshiya Itoh: On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract). CRYPTO 1992: 246-259 |
6 | EE | Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya: How Intractable Is the Discrete Logarithm for a General Finite Group? EUROCRYPT 1992: 420-428 |
1991 | ||
5 | Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai: 4 Move Perfect ZKIP of Knowledge with No Assumption. ASIACRYPT 1991: 321-330 | |
4 | Toshiya Itoh, Kouichi Sakurai: On the Complexity of Constant Round ZKIP of Possession of Knowledge. ASIACRYPT 1991: 331-345 | |
3 | Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya: Any Language in IP Has a Divertable ZKIP. ASIACRYPT 1991: 382-396 | |
2 | EE | Tatsuaki Okamoto, Kouichi Sakurai: Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems. CRYPTO 1991: 267-278 |
1 | EE | Hiroki Shizuya, Toshiya Itoh, Kouichi Sakurai: On the Complexity of Hyperelliptic Discrete Logarithm Problem. EUROCRYPT 1991: 337-351 |