If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
Conference contribution
7 Citations (Scopus)

Combating cyber terrorism: Countering cyber terrorist advantages of surprise and anonymity

David, M. W. & Sakurai, K., Jan 1 2003, Proceedings - 17th International Conference on Advanced Information Networking and Applications, AINA 2003. Institute of Electrical and Electronics Engineers Inc., p. 716-721 6 p. 1192973. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2003-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Terrorism
Internet

Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

Alizadeh, M., Tadayon, M. H., Sakurai, K., Baharun, S., Anada, H., Zamani, M., Zeki, A., Chaudhry, S. A. & Khan, M. K., Apr 13 2017, Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017. Secci, S., Crespi, N. & Manzalini, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 112-116 5 p. 7899399. (Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Network protocols
Mobile devices
Synchronization
Internet
2 Citations (Scopus)

Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

You, I., Sakurai, K. & Hori, Y., Dec 1 2009, 4th International Conference on Frontier of Computer Science and Technology, FCST 2009. p. 351-355 5 p. 5392894. (4th International Conference on Frontier of Computer Science and Technology, FCST 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
3 Citations (Scopus)

Communication-efficient anonymous routing protocol for wireless sensor networks using single path tree topology

Nakamura, S., Hori, Y. & Sakurai, K., May 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 766-771 6 p. 6185487. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing protocols
Wireless sensor networks
Topology
Network protocols
Communication
24 Citations (Scopus)

Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide

Syalim, A., Hori, Y. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 726-731 6 p. 5066554. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Risk analysis
Risk management
Risk assessment
Information technology
Information systems

Computational soundness of uniformity properties for multi-party computation based on LSSS

Zhao, H. & Sakurai, K., Jan 1 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 99-113 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multiparty Computation
Soundness
Uniformity
Attack
Secret Sharing Scheme
1 Citation (Scopus)

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

Yasuda, T., Takagi, T. & Sakurai, K., Mar 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Number theory
Cryptography
4 Citations (Scopus)

Cooperatively securing network coding against pollution attacks with incentive mechanism

Xu, Y. & Sakurai, K., May 8 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 52

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network coding
Pollution
Ions
1 Citation (Scopus)

Cross-group secret sharing for secure cloud storage service

Ke, C., Anada, H., Kawamoto, J., Morozov, K. & Sakurai, K., Jan 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a63. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Data privacy
Mobile phones
Mobile devices
Availability
1 Citation (Scopus)

Cryptanalysis of randomized arithmetic codes based on markov model

Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., Nov 5 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptanalysis
Encryption
Markov Model
Cryptography
Attack
5 Citations (Scopus)

Cryptanalysis on an image scrambling encryption scheme based on pixel bit

Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., Feb 1 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image Encryption
Cryptanalysis
Cryptography
Pixel
Pixels

Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit

Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., Jan 1 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Kim, H-J., Shi, Y. Q. & Barni, M. (eds.). Springer Verlag, p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Image Encryption
Cryptanalysis
Cryptography
Pixel
Pixels

Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis

Sakurai, K. & Zheng, Y., Jan 1 1996, Algorithms and Computation - 7th International Symposium, ISAAC 1996, Proceedings. Nagamochi, H., Miyano, S., Asano, T., Igarashi, Y. & Suri, S. (eds.). Springer Verlag, p. 376-385 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1178).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear Cryptanalysis
Block Cipher
Immunity
Cryptography
Transform

Customized program protection for a user customized data protection framework

Takahashi, K., Matsuzaki, T., Mine, T. & Sakurai, K., Aug 25 2011, Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011. p. 643-649 7 p. 5953301. (Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data privacy
Internet
3 Citations (Scopus)

Cyberbullying detection using parent-child relationship between comments

Li, Z., Kawamoto, J., Feng, Y. & Sakurai, K., Nov 28 2016, 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Indrawan-Santiago, M., Anderst-Kotsis, G., Steinbauer, M. & Khalil, I. (eds.). Association for Computing Machinery, p. 325-334 10 p. (ACM International Conference Proceeding Series).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Health

Darknet monitoring on real-operated networks

Mizoguchi, S., Fukushima, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2010, Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010. p. 278-285 8 p. 5633172

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Monitoring
Sensors
Sensor networks
Servers
Internet

Deniable Secret Handshake Protocol - Revisited

Panja, S., Dutta, S. & Sakurai, K., Jan 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Barolli, L., Takizawa, M., Enokido, T. & Xhafa, F. (eds.). Springer Verlag, p. 1266-1278 13 p. (Advances in Intelligent Systems and Computing; vol. 926).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defects
11 Citations (Scopus)

Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring

Nishioka, M., Satoh, H. & Sakurai, K., Jan 1 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Springer Verlag, Vol. 2288. p. 81-102 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Cryptography
Hardness
Public Key Encryption
Design

Design and implementation of a forced encryption kernel module

Furukawa, J., Sakai, A., Nishide, T., Hori, Y. & Sakurai, K., Sep 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 607-611 5 p. 5976283. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Cryptography
Chemical activation
Defects
2 Citations (Scopus)

Design and implementation of an extended reference monitor for trusted operating systems

Kim, H. C., Shin, W., Ramakrishna, R. S. & Sakurai, K., Jul 10 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. p. 235-247 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Organizational Policy
Behavior Control
Confidentiality
Semantics
Access control

Design and implementation of document access control model based on role and security policy

Mao, L., Yao, S., Zhang, K. & Sakurai, K., Nov 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 26-36 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security Policy
Access Control
Access control
Model-based
Role-based Access Control
1 Citation (Scopus)

Design and implementation of security mechanisms for a hierarchical community-based multi-agent system

Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K. & Amamiya, M., Jul 17 2009, Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers. p. 134-145 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5044 LNAI).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multi agent systems
Multi-agent Systems
Servers
Server
Security systems

Design and object-oriented implementation of an intelligence entity sharing pool

Huang, R., Ma, J., Takahashi, K. & Sakurai, K., Nov 17 2009, Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009. p. 583-587 5 p. 5209359. (Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Processing
Decomposition
Chemical analysis
20 Citations (Scopus)

Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n

Sakai, Y. & Sakurai, K., Jan 1 1998, Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Ohta, K. & Pei, D. (eds.). Springer Verlag, p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1514).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hyperelliptic Curves
Cryptosystem
Cryptography
Discrete Logarithm Problem
Public-key Cryptosystem

Detecting distributed cyber attacks in SDN based on automatic thresholding

Komiya, R., Feng, Y. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 417-423 7 p. 8590937. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Thresholding
Networking
Attack
Software
Historical Data
4 Citations (Scopus)

Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM

Yamauchi, K., Hori, Y. & Sakurai, K., Jan 1 2013, Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 63-68 6 p. 6621653. (Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HTTP
Remote control
Support vector machines
Botnet
1 Citation (Scopus)

Detection of Android ad library focusing on HTTP connections and view object redraw behaviors

Kajiwara, N., Kawamoto, J., Matsumoto, S., Hori, Y. & Sakurai, K., Mar 10 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, Vol. 2015-January. p. 104-109 6 p. 7057865

Research output: Chapter in Book/Report/Conference proceedingConference contribution

HTTP
Marketing
Image acquisition
Fourier transforms
Servers
6 Citations (Scopus)

Detection of android API call using logging mechanism within android framework

Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y. & Sakurai, K., Jan 1 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Mao, M., Zomaya, A. & Varadharajan, V. (eds.). Springer Verlag, p. 393-404 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programming interfaces (API)
Smartphones
Availability
Android (operating system)
Malware
3 Citations (Scopus)

Detection of illegal players in massively multiplayer online role playing game by classification algorithms

Zhang, Z., Anada, H., Kawamoto, J. & Sakurai, K., Apr 29 2015, Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications, AINA 2015. Institute of Electrical and Electronics Engineers Inc., Vol. 2015-April. p. 406-413 8 p. 7097999

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
13 Citations (Scopus)

Differential fault analysis of full lblock

Zhao, L., Nishide, T. & Sakurai, K., Jun 15 2012, Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Proceedings. p. 135-150 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7275 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fault Analysis
Fault
S-box
Attack
Countermeasures
16 Citations (Scopus)

Distributed Paillier cryptosystem without trusted dealer

Nishide, T. & Sakurai, K., Feb 1 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6513 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Cryptography
Multiparty Computation
Eliminate
Attack
2 Citations (Scopus)

Distributed Paillier Cryptosystem without Trusted Dealer

Nishide, T. & Sakurai, K., Jan 1 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. Chung, Y. & Yung, M. (eds.). Springer Verlag, p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6513 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Cryptography
Multiparty Computation
Eliminate
Attack

Distributing security-mediated PKI revisited

Yang, J. P., Sakurai, K. & Rhee, K. H., Jan 1 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 31-44 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Denial of Service
Threshold Cryptography
Attack
Revocation
Scanning electron microscopy
7 Citations (Scopus)

Economic-inspired truthful reputation feedback mechanism in P2P networks

Wang, Y., Hori, Y. & Sakurai, K., Aug 2 2007, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. p. 80-85 6 p. 4144617. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Economics
Security of data

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., p. 533-536 4 p. (Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Websites
Blood
Internet

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR). p. 533-536 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Efficient algorithms for the construction of hyperelliptic cryptosystems

Okamoto, T. & Sakurai, K., Jan 1 1992, Advances in Cryptology — CRYPTO 1991, Proceedings. Feigenbaum, J. (ed.). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Discrete Logarithm
Cryptography
Efficient Algorithms
Multiplicative
2 Citations (Scopus)

Efficient computing over GF(216) using graphics processing unit

Tanaka, S., Yasuda, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., Oct 17 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 843-846 4 p. 6603790

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Polynomials
Subroutines
Graphics processing unit
45 Citations (Scopus)

Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a montgomery-form elliptic curve

Okeya, K. & Sakurai, K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001 - 3rd International Workshop, Proceedings. Springer Verlag, Vol. 2162. p. 126-141 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2162).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Elliptic Curve Cryptosystem
Scalar multiplication
Elliptic Curves
Cryptography
Recovery
2 Citations (Scopus)

Efficient implementation of evaluating multivariate quadratic system with GPUs

Tanaka, S., Nishide, T. & Sakurai, K., Oct 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 660-664 5 p. 6296933. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Hardness
Polynomials
commodity
Computational complexity
1 Citation (Scopus)

Efficient intrusion detection based on static analysis and stack walks

Hua, J., Li, M., Sakurai, K. & Ren, Y., Dec 1 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 158-173 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Static analysis
Intrusion detection
Intrusion Detection
Static Analysis
Walk
1 Citation (Scopus)

Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

Tanaka, S., Chou, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., Jan 1 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 28-42 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stream Cipher
Quadratic Systems
Quadratic Polynomial
Multivariate Polynomials
Polynomial Systems
5 Citations (Scopus)

Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

Kwon, J. O., Sakurai, K. & Lee, D. H., Jan 1 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authenticated Key Exchange
Password
Glossaries
Attack
Network protocols
7 Citations (Scopus)

Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance

Sakai, Y. & Sakurai, K., Jan 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalar multiplication
Doubling
Elliptic Curves
Computational complexity
Computational Complexity

Efficient shortest path routing algorithms for distributed XML processing

Longjian, Y., Koide, H., Cavendish, D. & Sakurai, K., Jan 1 2019, WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies. Bozzon, A., Mayo, F. J. D. & Filipe, J. (eds.). SciTePress, p. 265-272 8 p. (WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing algorithms
XML
Processing
Internet
8 Citations (Scopus)

Efficient threshold secret sharing schemes secure against rushing cheaters

Adhikari, A., Morozov, K., Obana, S., Roy, P. S., Sakurai, K. & Xu, R., Jan 1 2016, Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers. Barreto, P. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10015 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threshold Scheme
Secret Sharing Scheme
Denote
Linearly
Flexibility
8 Citations (Scopus)

Efficient variant of rainbow without triangular matrix representation

Yasuda, T., Takagi, T. & Sakurai, K., Jan 1 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 532-541 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Triangular matrix
Matrix Representation
Cryptography
Public-key Cryptosystem
Signature
56 Citations (Scopus)

Elliptic curves with the montgomery-form and their cryptographic applications

Okeya, K., Kurumatani, H. & Sakurai, K., 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Springer Verlag, Vol. 1751. p. 238-257 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Elliptic Curves
Factorization
Cryptography
Cofactor
Timing Attack

Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

Su, J., Vargas, D. V. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 223-227 5 p. 8590903. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Activation Function
Chemical activation
Neural Networks
Robustness
Neural networks

Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation

Su, J., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 223-227 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution