If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
1991
5 Citations (Scopus)

On the complexity of hyperelliptic discrete logarithm problem

Shizuya, H., Itoh, T. & Sakurai, K., Jan 1 1991, Advances in Cryptology—EUROCRYPT 1991 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Davies, D. W. (ed.). Springer Verlag, p. 337-351 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 547 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Logarithm Problem
Computational complexity
Complexity Theory
Elliptic Curves
Galois field
1992
5 Citations (Scopus)

Efficient algorithms for the construction of hyperelliptic cryptosystems

Okamoto, T. & Sakurai, K., Jan 1 1992, Advances in Cryptology — CRYPTO 1991, Proceedings. Feigenbaum, J. (ed.). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Discrete Logarithm
Cryptography
Efficient Algorithms
Multiplicative
1993
4 Citations (Scopus)

4 move perfect ZKIP of knowledge with no assumption

Saito, T., Kurosawa, K. & Sakurai, K., Jan 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
Tail
Knowledge
Language
6 Citations (Scopus)

Any language in IP has a divertible ZKIP

Itoh, T., Sakurai, K. & Shizuya, H., Jan 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Springer Verlag, Vol. 739 LNCS. p. 382-396 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interactive Proof Systems
Zero-knowledge Proof
Cryptography
Homomorphisms
Encryption
3 Citations (Scopus)

How intractable is the discrete logarithm for a general finite group?

Okamoto, T., Sakurai, K. & Shizuya, H., Jan 1 1993, Advances in Cryptology – EUROCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Rueppel, R. A. (ed.). Springer Verlag, p. 420-428 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 658 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Logarithm
Polynomial time
Finite Group
Polynomials
Computational complexity

On bit correlations among preimages of “many to one” one-way functions: — A new approach to study on randomness and hardness of one-way functions —

Sakurai, K. & Itoh, T., Jan 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 435-446 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Many to one
One-way Function
Hardness
Randomness
Discrete Logarithm
5 Citations (Scopus)

On the complexity of constant round ZKIP of possession of knowledge

Itoh, T. & Sakurai, K., Jan 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 331-345 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interactive Proof Systems
Zero-knowledge Proof
Black Box
Perfect Simulation
L'Hôpital's Rule
6 Citations (Scopus)

On the discrepancy between serial and parallel of zero-knowledge protocols

Sakurai, K. & Itoh, T., Jan 1 1993, Advances in Cryptology — CRYPTO 1992 - 12th Annual International Cryptology Conference, Proceedings. Brickell, E. F. (ed.). Springer Verlag, p. 246-259 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-knowledge
Discrepancy
2 Citations (Scopus)

Subliminal channels for signature transfer and their application to signature distribution schemes

Sakurai, K. & Itoh, T., Jan 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 231-243 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature Verification
Identification Scheme
Signature
Network protocols
One-way Function
1995
1 Citation (Scopus)

On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes

Sakurai, K., Jan 1 1995, Computing and Combinatorics - 1st Annual International Conference, COCOON 1995, Proceedings. Du, D-Z., Li, M. & Du, D-Z. (eds.). Springer Verlag, p. 496-509 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 959).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identification Scheme
Soundness
Knowledge
Language
1996

A hidden cryptographic assumption in no-transferable indentification schemes

Sakurai, K., Jan 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer Verlag, p. 159-172 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Soundness
Zero-knowledge
Identification Scheme
Restriction
9 Citations (Scopus)

A progress report on subliminal-free channels

Burmester, M., Desraedt, Y. G., Itoh, T., Sakurai, K., Shizuya, H. & Yung, M., Jan 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 157-168 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cryptography
Randomness
Communication
Zero-knowledge
18 Citations (Scopus)

Blind decoding, blind undeniable signatures, and their applications to privacy protection

Sakurai, K. & Yamane, Y., Jan 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 257-264 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Undeniable Signature
Blind Signature
Privacy Protection
Decoding
Servers

Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis

Sakurai, K. & Zheng, Y., Jan 1 1996, Algorithms and Computation - 7th International Symposium, ISAAC 1996, Proceedings. Nagamochi, H., Miyano, S., Asano, T., Igarashi, Y. & Suri, S. (eds.). Springer Verlag, p. 376-385 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1178).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear Cryptanalysis
Block Cipher
Immunity
Cryptography
Transform
9 Citations (Scopus)

How to utilize the transformability of digital signatures for solving the oracle problem

Mambo, M., Sakurai, K. & Okamoto, E., Jan 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (eds.). Springer Verlag, p. 322-333 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
Digital Signature
Decoding
Blind Signature
Signature

On the complexity of computational problems associated with simple stochastic games: Extended abstract of COCOON'96

Yanbe, A. & Sakurai, K., Jan 1 1996, Computing and Combinatorics - 2nd Annual International Conference, COCOON 1996, Proceedings. Wong, C. K., Wong, C. K. & Cai, J-Y. (eds.). Springer Verlag, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1090).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Simple Game
Stochastic Games
Computational complexity
Optimal Strategy
Two-person Games
1997
3 Citations (Scopus)

Improving linear cryptanalysis of LOKI91 by probabilistic counting method

Sakurai, K. & Furuya, S., Jan 1 1997, Fast Software Encryption - 4th International Workshop, FSE 1997, Proceedings. Biham, E. (ed.). Springer Verlag, p. 114-133 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1267).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear Cryptanalysis
Counting
Attack
S-box
Maximum likelihood

On-line versus off-line in money-making strategies with brokerage

Dannoura, E. & Sakurai, K., Jan 1 1997, Algorithms and Computation - 8th International Symposium, ISAAC 1997, Proceedings. Leong, H. W., Jain, S. & Imai, H. (eds.). Springer Verlag, p. 173-182 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1350).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Line
Competitive Ratio
Strategy
Money
Lower bound

Protection of data and delegated keys in digital distribution

Mambo, M., Okamoto, E. & Sakurai, K., Jan 1 1997, Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings. Pieprzyk, J., Varadharajan, V. & Mu, Y. (eds.). Springer Verlag, p. 271-282 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1270).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Encryption
Information Systems
Distribution System
Cryptosystem
1998
7 Citations (Scopus)

A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem

Miyazaki, S. & Sakurai, K., Jan 1 1998, Financial Cryptography - 2nd International Conference, FC 1998, Proceedings. Hirschfeld, R. (ed.). Springer Verlag, p. 295-308 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1465).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blind Signature
Discrete Logarithm Problem
Security of data
Information Security
Tracing
1 Citation (Scopus)

Checking programs discreetly: Demonstrating result-correctness efficiently while concealing it

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 1998, Algorithms and Computation - 9th International Symposium, ISAAC'98, Proceedings. p. 59-71 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1533 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-knowledge
Correctness
Zero-knowledge Proof
Alike
Requirements
20 Citations (Scopus)

Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n

Sakai, Y. & Sakurai, K., Jan 1 1998, Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Ohta, K. & Pei, D. (eds.). Springer Verlag, p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1514).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hyperelliptic Curves
Cryptosystem
Cryptography
Discrete Logarithm Problem
Public-key Cryptosystem

Result-indistinguishable zero-knowledge proofs: Increased power and constant-round protocols

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 1998, STACS 98 - 15th Annual Symposium on Theoretical Aspects of Computer Science, Proceedings. p. 511-521 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1373 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-knowledge Proof
Proof System
Chemical analysis
Graph Isomorphism
Language
20 Citations (Scopus)

Secure hyperelliptic cryptosystems and their performance

Sakai, Y., Sakurai, K. & Ishizuka, H., Jan 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 164-181 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Cryptography
Curve
Jacobian Varieties
Discrete Logarithm Problem
3 Citations (Scopus)

Security issues for contactless smart cards

David, M. W. & Sakurai, K., Jan 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 247-252 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart cards
Smart Card
Standardization
Encryption
Cryptography
1999
1 Citation (Scopus)

Toward fair international key escrow: An attempt by distributed trusted third agencies with threshold cryptography

Miyazaki, S., Kuroda, I. & Sakurai, K., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Springer Verlag, Vol. 1560. p. 171-187 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threshold Cryptography
Cryptography
Communication
Law Enforcement
Key Distribution
2000

A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

Tamura, T., Sakurai, K. & Matsumoto, T., Jan 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 221-235 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hyperelliptic Curves
Cryptosystem
Hardware Implementation
Cryptography
Genus
43 Citations (Scopus)

An anonymous electronic bidding protocol Based on a new convertible group signature scheme-on the importance of hiding the winner’s identity against bid-rigging-

Sakurai, K. & Miyazaki, S., Jan 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 385-399 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Group Signature
Group Scheme
Bidding
Auctions
Signature Scheme
7 Citations (Scopus)

Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance

Sakai, Y. & Sakurai, K., Jan 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalar multiplication
Doubling
Elliptic Curves
Computational complexity
Computational Complexity
56 Citations (Scopus)

Elliptic curves with the montgomery-form and their cryptographic applications

Okeya, K., Kurumatani, H. & Sakurai, K., 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Springer Verlag, Vol. 1751. p. 238-257 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Elliptic Curves
Factorization
Cryptography
Cofactor
Timing Attack
1 Citation (Scopus)

Making hash functions from block ciphers secure and efficient by using convolutional codes

Inoue, T. & Sakurai, K., Jan 1 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 391-404 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Convolutional Codes
Block Ciphers
Hash functions
Convolutional codes
Block Codes
4 Citations (Scopus)

On threshold RSA-signing with no dealer

Miyazaki, S., Sakurai, K. & Yung, M., Jan 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 197-207 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed Computation
Attack
Demonstrate
5 Citations (Scopus)

On zero-knowledge proofs: "From membership to decision" (extended abstract)

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 2000, Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 255-264 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Over Fp vs. Over F2n and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems

Sakai, Y. & Sakurai, K., Jan 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 82-101 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hyperelliptic Curves
Cryptosystem
Cryptography
Software
Program processors
74 Citations (Scopus)

Power analysis breaks elliptic curve cryptosystems even secure against the timing attack

Okeya, K. & Sakurai, K., Jan 1 2000, Progress in Cryptology - INDOCRYPT 2000 - 1st International Conference in Cryptology in India, Proceedings. Roy, B. & Okamoto, E. (eds.). Springer Verlag, p. 178-190 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Timing Attack
Elliptic Curve Cryptosystem
Scalar multiplication
Power Analysis
Cryptography
2001
45 Citations (Scopus)

Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a montgomery-form elliptic curve

Okeya, K. & Sakurai, K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001 - 3rd International Workshop, Proceedings. Springer Verlag, Vol. 2162. p. 126-141 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2162).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Elliptic Curve Cryptosystem
Scalar multiplication
Elliptic Curves
Cryptography
Recovery
6 Citations (Scopus)

English vs. sealed bid in anonymous electronic auction protocols

Hirakiuchi, D. & Sakurait, K., Jan 1 2001, Proceedings - 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001. IEEE Computer Society, p. 171-176 6 p. 953409. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2001-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Servers
1 Citation (Scopus)

On the power of multidoubling in speeding up elliptic scalar multiplication

Sakai, Y. & Sakurai, K., Jan 1 2001, Selected Areas in Cryptography - 8th Annual International Workshop, SAC 2001, Revised Papers. Vaudenay, S. & Youssef, A. M. (eds.). Springer Verlag, p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2259).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalar multiplication
Elliptic Curves
Galois field
Computational complexity
Doubling
2002
20 Citations (Scopus)

A certified E-mail system with receiver’s selective usage of delivery authority

Imamoto, K. & Sakurai, K., Jan 1 2002, Progress in Cryptology - INDOCRYPT 2002 - 3rd International Conference on Cryptology in India, Proceedings. Sarkar, P. & Menezes, A. (eds.). Springer Verlag, p. 326-338 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2551).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Electronic Mail
Receiver
Costs
Choose
23 Citations (Scopus)

A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks

Okeya, K., Miyazaki, K. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Springer Verlag, Vol. 2288. p. 428-439 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalar multiplication
Side Channel Attacks
Elliptic Curves
Smart cards
Mobile devices
6 Citations (Scopus)

Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint hamming weight representation of scalars

Sakai, Y. & Sakurai, K., Jan 1 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 484-499 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hamming Weight
Scalar multiplication
Elliptic Curves
Scalar
Network protocols
4 Citations (Scopus)

An IND-CCA2 public-key cryptosystem with fast decryption

Buchmann, J., Sakurai, K. & Takagi, T., Jan 1 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 51-71 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Cryptography
Cryptosystem
kernel
Hash Function
24 Citations (Scopus)

A second-order DPA attack breaks a window-method based countermeasure against side channel attacks

Okeya, K. & Sakurai, K., 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Springer Verlag, Vol. 2433. p. 389-401 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side Channel Attacks
Countermeasures
Attack
Scalar
Electronic crime countermeasures
10 Citations (Scopus)

Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring

Nishioka, M., Satoh, H. & Sakurai, K., Jan 1 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Springer Verlag, Vol. 2288. p. 81-102 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Cryptography
Hardness
Public Key Encryption
Design
13 Citations (Scopus)

New semantically secure public-key cryptosystems from the rsa-primitive

Sakurai, K. & Takagi, T., Jan 1 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naccache, D. & Paillier, P. (eds.). Springer Verlag, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Cryptography
Cryptosystem
Semantic Security
Semantics
36 Citations (Scopus)

On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling

Okeya, K. & Sakurai, K., Jan 1 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 420-435 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side Channel Attacks
Subtraction
Countermeasures
Doubling
Electronic crime countermeasures
3 Citations (Scopus)

On the security of a modified paillier public-key primitive

Sakurai, K. & Takagi, T., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Springer Verlag, Vol. 2384. p. 436-448 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public key
Cryptosystem
Cryptography
Modulus
Factoring
3 Citations (Scopus)

Risks with raw-key masking – The security evaluation of 2-key XCBC

Furuya, S. & Sakurai, K., Jan 1 2002, Information and Communications Security - 4th International Conference, ICICS 2002, Proceedings. Qing, S., Deng, R., Bao, F. & Zhou, J. (eds.). Springer Verlag, p. 327-341 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Masking
Evaluation
Provable Security
Block Ciphers
Violate
2003
9 Citations (Scopus)

A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks

Okeya, K. & Sakurai, K., 2003, Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 1216723

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side channel attack
2 Citations (Scopus)

Certified e-mail systems using public notice board

Imamoto, K. & Sakurai, K., Jan 1 2003, Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003. Institute of Electrical and Electronics Engineers Inc., p. 460-464 5 p. 1232065. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA; vol. 2003-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail