Research Output per year

## Research Output 1991 2020

- 1 - 50 out of 319 results
- Publication Year, Title (ascending)

### On the complexity of hyperelliptic discrete logarithm problem

Shizuya, H., Itoh, T. & Sakurai, K., Jan 1 1991,*Advances in Cryptology—EUROCRYPT 1991 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings.*Davies, D. W. (ed.). Springer Verlag, p. 337-351 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 547 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Efficient algorithms for the construction of hyperelliptic cryptosystems

Okamoto, T. & Sakurai, K., Jan 1 1992,*Advances in Cryptology — CRYPTO 1991, Proceedings.*Feigenbaum, J. (ed.). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 576 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### 4 move perfect ZKIP of knowledge with no assumption

Saito, T., Kurosawa, K. & Sakurai, K., Jan 1 1993,*Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings.*Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Any language in IP has a divertible ZKIP

Itoh, T., Sakurai, K. & Shizuya, H., Jan 1 1993,*Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings.*Springer Verlag, Vol. 739 LNCS. p. 382-396 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### How intractable is the discrete logarithm for a general finite group?

Okamoto, T., Sakurai, K. & Shizuya, H., Jan 1 1993,*Advances in Cryptology – EUROCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings.*Rueppel, R. A. (ed.). Springer Verlag, p. 420-428 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 658 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On bit correlations among preimages of “many to one” one-way functions: — A new approach to study on randomness and hardness of one-way functions —

Sakurai, K. & Itoh, T., Jan 1 1993,*Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings.*Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 435-446 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On the complexity of constant round ZKIP of possession of knowledge

Itoh, T. & Sakurai, K., Jan 1 1993,*Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings.*Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 331-345 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On the discrepancy between serial and parallel of zero-knowledge protocols

Sakurai, K. & Itoh, T., Jan 1 1993,*Advances in Cryptology — CRYPTO 1992 - 12th Annual International Cryptology Conference, Proceedings.*Brickell, E. F. (ed.). Springer Verlag, p. 246-259 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 740 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Subliminal channels for signature transfer and their application to signature distribution schemes

Sakurai, K. & Itoh, T., Jan 1 1993,*Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings.*Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 231-243 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes

Sakurai, K., Jan 1 1995,*Computing and Combinatorics - 1st Annual International Conference, COCOON 1995, Proceedings.*Du, D-Z., Li, M. & Du, D-Z. (eds.). Springer Verlag, p. 496-509 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 959).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### A hidden cryptographic assumption in no-transferable indentification schemes

Sakurai, K., Jan 1 1996,*Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings.*Springer Verlag, p. 159-172 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### A progress report on subliminal-free channels

Burmester, M., Desraedt, Y. G., Itoh, T., Sakurai, K., Shizuya, H. & Yung, M., Jan 1 1996,*Information Hiding - 1st International Workshop, Proceedings.*Anderson, R. (ed.). Springer Verlag, p. 157-168 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Blind decoding, blind undeniable signatures, and their applications to privacy protection

Sakurai, K. & Yamane, Y., Jan 1 1996,*Information Hiding - 1st International Workshop, Proceedings.*Anderson, R. (ed.). Springer Verlag, p. 257-264 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis

Sakurai, K. & Zheng, Y., Jan 1 1996,*Algorithms and Computation - 7th International Symposium, ISAAC 1996, Proceedings.*Nagamochi, H., Miyano, S., Asano, T., Igarashi, Y. & Suri, S. (eds.). Springer Verlag, p. 376-385 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1178).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### How to utilize the transformability of digital signatures for solving the oracle problem

Mambo, M., Sakurai, K. & Okamoto, E., Jan 1 1996,*Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings.*Kim, K. & Matsumoto, T. (eds.). Springer Verlag, p. 322-333 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On the complexity of computational problems associated with simple stochastic games: Extended abstract of COCOON'96

Yanbe, A. & Sakurai, K., Jan 1 1996,*Computing and Combinatorics - 2nd Annual International Conference, COCOON 1996, Proceedings.*Wong, C. K., Wong, C. K. & Cai, J-Y. (eds.). Springer Verlag, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1090).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Improving linear cryptanalysis of LOKI91 by probabilistic counting method

Sakurai, K. & Furuya, S., Jan 1 1997,*Fast Software Encryption - 4th International Workshop, FSE 1997, Proceedings.*Biham, E. (ed.). Springer Verlag, p. 114-133 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1267).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On-line versus off-line in money-making strategies with brokerage

Dannoura, E. & Sakurai, K., Jan 1 1997,*Algorithms and Computation - 8th International Symposium, ISAAC 1997, Proceedings.*Leong, H. W., Jain, S. & Imai, H. (eds.). Springer Verlag, p. 173-182 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1350).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Protection of data and delegated keys in digital distribution

Mambo, M., Okamoto, E. & Sakurai, K., Jan 1 1997,*Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings.*Pieprzyk, J., Varadharajan, V. & Mu, Y. (eds.). Springer Verlag, p. 271-282 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1270).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem

Miyazaki, S. & Sakurai, K., Jan 1 1998,*Financial Cryptography - 2nd International Conference, FC 1998, Proceedings.*Hirschfeld, R. (ed.). Springer Verlag, p. 295-308 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1465).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Checking programs discreetly: Demonstrating result-correctness efficiently while concealing it

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 1998,*Algorithms and Computation - 9th International Symposium, ISAAC'98, Proceedings.*p. 59-71 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1533 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F_{2}^{n}

Sakai, Y. & Sakurai, K., Jan 1 1998, *Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings.*Ohta, K. & Pei, D. (eds.). Springer Verlag, p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1514).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Result-indistinguishable zero-knowledge proofs: Increased power and constant-round protocols

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 1998,*STACS 98 - 15th Annual Symposium on Theoretical Aspects of Computer Science, Proceedings.*p. 511-521 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1373 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Secure hyperelliptic cryptosystems and their performance

Sakai, Y., Sakurai, K. & Ishizuka, H., Jan 1 1998,*Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings.*Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 164-181 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Security issues for contactless smart cards

David, M. W. & Sakurai, K., Jan 1 1998,*Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings.*Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 247-252 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Toward fair international key escrow: An attempt by distributed trusted third agencies with threshold cryptography

Miyazaki, S., Kuroda, I. & Sakurai, K., 1999,*Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings.*Springer Verlag, Vol. 1560. p. 171-187 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

Tamura, T., Sakurai, K. & Matsumoto, T., Jan 1 2000,*Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings.*Song, J. (ed.). Springer Verlag, p. 221-235 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### An anonymous electronic bidding protocol Based on a new convertible group signature scheme-on the importance of hiding the winner’s identity against bid-rigging-

Sakurai, K. & Miyazaki, S., Jan 1 2000,*Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings.*Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 385-399 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance

Sakai, Y. & Sakurai, K., Jan 1 2000,*Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings.*Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Elliptic curves with the montgomery-form and their cryptographic applications

Okeya, K., Kurumatani, H. & Sakurai, K., 2000,*Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings.*Springer Verlag, Vol. 1751. p. 238-257 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Making hash functions from block ciphers secure and efficient by using convolutional codes

Inoue, T. & Sakurai, K., Jan 1 2000,*Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings.*Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 391-404 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On threshold RSA-signing with no dealer

Miyazaki, S., Sakurai, K. & Yung, M., Jan 1 2000,*Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings.*Song, J. (ed.). Springer Verlag, p. 197-207 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On zero-knowledge proofs: "From membership to decision" (extended abstract)

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 2000,*Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000.*p. 255-264 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Over F_{p} vs. Over F^{2n} and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems

Sakai, Y. & Sakurai, K., Jan 1 2000, *Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings.*Song, J. (ed.). Springer Verlag, p. 82-101 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Power analysis breaks elliptic curve cryptosystems even secure against the timing attack

Okeya, K. & Sakurai, K., Jan 1 2000,*Progress in Cryptology - INDOCRYPT 2000 - 1st International Conference in Cryptology in India, Proceedings.*Roy, B. & Okamoto, E. (eds.). Springer Verlag, p. 178-190 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a montgomery-form elliptic curve

Okeya, K. & Sakurai, K., 2001,*Cryptographic Hardware and Embedded Systems - CHES 2001 - 3rd International Workshop, Proceedings.*Springer Verlag, Vol. 2162. p. 126-141 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2162).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### English vs. sealed bid in anonymous electronic auction protocols

Hirakiuchi, D. & Sakurait, K., Jan 1 2001,*Proceedings - 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001.*IEEE Computer Society, p. 171-176 6 p. 953409. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2001-January).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On the power of multidoubling in speeding up elliptic scalar multiplication

Sakai, Y. & Sakurai, K., Jan 1 2001,*Selected Areas in Cryptography - 8th Annual International Workshop, SAC 2001, Revised Papers.*Vaudenay, S. & Youssef, A. M. (eds.). Springer Verlag, p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2259).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### A certified E-mail system with receiver’s selective usage of delivery authority

Imamoto, K. & Sakurai, K., Jan 1 2002,*Progress in Cryptology - INDOCRYPT 2002 - 3rd International Conference on Cryptology in India, Proceedings.*Sarkar, P. & Menezes, A. (eds.). Springer Verlag, p. 326-338 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2551).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks

Okeya, K., Miyazaki, K. & Sakurai, K., 2002,*Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings.*Springer Verlag, Vol. 2288. p. 428-439 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint hamming weight representation of scalars

Sakai, Y. & Sakurai, K., Jan 1 2002,*Information Security - 5th International Conference, ISC 2002, Proceedings.*Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 484-499 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### An IND-CCA2 public-key cryptosystem with fast decryption

Buchmann, J., Sakurai, K. & Takagi, T., Jan 1 2002,*Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings.*Kim, K. (ed.). Springer Verlag, p. 51-71 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### A second-order DPA attack breaks a window-method based countermeasure against side channel attacks

Okeya, K. & Sakurai, K., 2002,*Information Security - 5th International Conference, ISC 2002, Proceedings.*Springer Verlag, Vol. 2433. p. 389-401 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring

Nishioka, M., Satoh, H. & Sakurai, K., Jan 1 2002,*Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings.*Springer Verlag, Vol. 2288. p. 81-102 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### New semantically secure public-key cryptosystems from the rsa-primitive

Sakurai, K. & Takagi, T., Jan 1 2002,*Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).*Naccache, D. & Paillier, P. (eds.). Springer Verlag, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling

Okeya, K. & Sakurai, K., Jan 1 2002,*Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings.*Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 420-435 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### On the security of a modified paillier public-key primitive

Sakurai, K. & Takagi, T., 2002,*Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings.*Springer Verlag, Vol. 2384. p. 436-448 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Risks with raw-key masking – The security evaluation of 2-key XCBC

Furuya, S. & Sakurai, K., Jan 1 2002,*Information and Communications Security - 4th International Conference, ICICS 2002, Proceedings.*Qing, S., Deng, R., Bao, F. & Zhou, J. (eds.). Springer Verlag, p. 327-341 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks

Okeya, K. & Sakurai, K., 2003,*Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003.*Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 1216723

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

### Certified e-mail systems using public notice board

Imamoto, K. & Sakurai, K., Jan 1 2003,*Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003.*Institute of Electrical and Electronics Engineers Inc., p. 460-464 5 p. 1232065. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA; vol. 2003-January).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution