• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1991 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • Ciphertext-auditable public key encryption

    Hada, S. & Sakurai, K., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 308-321 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Classification on attacks in wireless ad hoc networks: A game theoretic view

    Liao, X., Hao, D. & Sakurai, K., 2011, Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011. p. 144-149 6 p. 5967534. (Proceedings - 7th International Conference on Networked Computing and Advanced Information Management, NCM 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • Collaborative behavior visualization and its detection by observing darknet traffic

    Akimoto, S., Hori, Y. & Sakurai, K., Dec 26 2012, Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings. p. 212-226 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7672 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings

    Dutta, S., Sardar, M. K., Adhikari, A., Ruj, S. & Sakurai, K., 2020, Information Systems Security - 16th International Conference, ICISS 2020, Proceedings. Kanhere, S., Patil, V. T., Sural, S. & Gaur, M. S. (eds.). Springer Science and Business Media Deutschland GmbH, p. 198-217 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12553 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Combating cyber terrorism: Countering cyber terrorist advantages of surprise and anonymity

    David, M. W. & Sakurai, K., 2003, Proceedings - 17th International Conference on Advanced Information Networking and Applications, AINA 2003. Institute of Electrical and Electronics Engineers Inc., p. 716-721 6 p. 1192973. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2003-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

    Alizadeh, M., Tadayon, M. H., Sakurai, K., Baharun, S., Anada, H., Zamani, M., Zeki, A., Chaudhry, S. A. & Khan, M. K., Apr 13 2017, Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017. Secci, S., Crespi, N. & Manzalini, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 112-116 5 p. 7899399. (Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

    You, I., Sakurai, K. & Hori, Y., Dec 1 2009, 4th International Conference on Frontier of Computer Science and Technology, FCST 2009. p. 351-355 5 p. 5392894. (4th International Conference on Frontier of Computer Science and Technology, FCST 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Communication-efficient anonymous routing protocol for wireless sensor networks using single path tree topology

    Nakamura, S., Hori, Y. & Sakurai, K., May 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 766-771 6 p. 6185487. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide

    Syalim, A., Hori, Y. & Sakurai, K., Oct 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 726-731 6 p. 5066554. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    34 Citations (Scopus)
  • Computational soundness of uniformity properties for multi-party computation based on LSSS

    Zhao, H. & Sakurai, K., 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (eds.). Springer Verlag, p. 99-113 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9565).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

    Yasuda, T., Takagi, T. & Sakurai, K., Mar 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Cooperatively securing network coding against pollution attacks with incentive mechanism

    Xu, Y. & Sakurai, K., May 8 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 52

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Cross-group secret sharing for secure cloud storage service

    Ke, C., Anada, H., Kawamoto, J., Morozov, K. & Sakurai, K., Jan 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a63. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Cryptanalysis of randomized arithmetic codes based on markov model

    Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., Nov 5 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Cryptanalysis of randomized arithmetic codes based on markov model

    Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. Wu, C-K., Lin, D. & Yung, M. (eds.). Springer Verlag, p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cryptanalysis on an image scrambling encryption scheme based on pixel bit

    Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Springer Verlag, p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6526 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis

    Sakurai, K. & Zheng, Y., 1996, Algorithms and Computation - 7th International Symposium, ISAAC 1996, Proceedings. Asano, T., Igarashi, Y., Nagamochi, H., Miyano, S. & Suri, S. (eds.). Springer Verlag, p. 376-385 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1178).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Customized program protection for a user customized data protection framework

    Takahashi, K., Matsuzaki, T., Mine, T. & Sakurai, K., Aug 25 2011, Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011. p. 643-649 7 p. 5953301. (Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011; vol. 1).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Cyberbullying detection using parent-child relationship between comments

    Li, Z., Kawamoto, J., Feng, Y. & Sakurai, K., Nov 28 2016, 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Indrawan-Santiago, M., Anderst-Kotsis, G., Steinbauer, M. & Khalil, I. (eds.). Association for Computing Machinery, p. 325-334 10 p. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Darknet monitoring on real-operated networks

    Mizoguchi, S., Fukushima, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2010, Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010. p. 278-285 8 p. 5633172

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Deniable Secret Handshake Protocol - Revisited

    Panja, S., Dutta, S. & Sakurai, K., 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Barolli, L., Takizawa, M., Enokido, T. & Xhafa, F. (eds.). Springer Verlag, p. 1266-1278 13 p. (Advances in Intelligent Systems and Computing; vol. 926).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring

    Nishioka, M., Satoh, H. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 81-102 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Design and implementation of a forced encryption kernel module

    Furukawa, J., Sakai, A., Nishide, T., Hori, Y. & Sakurai, K., Sep 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 607-611 5 p. 5976283. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of an extended reference monitor for trusted operating systems

    Kim, H. C., Shin, W., Ramakrishna, R. S. & Sakurai, K., 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. Springer Verlag, p. 235-247 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Design and implementation of document access control model based on role and security policy

    Mao, L., Yao, S., Zhang, K. & Sakurai, K., Nov 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 26-36 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6802 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design and implementation of security mechanisms for a hierarchical community-based multi-agent system

    Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K. & Amamiya, M., Jul 17 2009, Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers. p. 134-145 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5044 LNAI).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Design and object-oriented implementation of an intelligence entity sharing pool

    Huang, R., Ma, J., Takahashi, K. & Sakurai, K., 2009, Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009. p. 583-587 5 p. 5209359. (Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009; vol. 2).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n

    Sakai, Y. & Sakurai, K., 1998, Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Ohta, K. & Pei, D. (eds.). Springer Verlag, p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1514).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    23 Citations (Scopus)
  • Detecting distributed cyber attacks in SDN based on automatic thresholding

    Komiya, R., Feng, Y. & Sakurai, K., Dec 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 417-423 7 p. 8590937. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM

    Yamauchi, K., Hori, Y. & Sakurai, K., Jan 1 2013, Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 63-68 6 p. 6621653. (Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Detection of Android ad library focusing on HTTP connections and view object redraw behaviors

    Kajiwara, N., Kawamoto, J., Matsumoto, S., Hori, Y. & Sakurai, K., Mar 10 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, p. 104-109 6 p. 7057865. (International Conference on Information Networking; vol. 2015-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Detection of android API call using logging mechanism within android framework

    Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y. & Sakurai, K., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 393-404 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Detection of illegal players in massively multiplayer online role playing game by classification algorithms

    Zhang, Z., Anada, H., Kawamoto, J. & Sakurai, K., Apr 29 2015, Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications, AINA 2015. Barolli, L., Takizawa, M., Xhafa, F., Enokido, T. & Park, J. H. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 406-413 8 p. 7097999. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2015-April).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Differential fault analysis of full lblock

    Zhao, L., Nishide, T. & Sakurai, K., Jun 15 2012, Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Proceedings. p. 135-150 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7275 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    14 Citations (Scopus)
  • Distributed Paillier cryptosystem without trusted dealer

    Nishide, T. & Sakurai, K., 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. Springer Verlag, p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6513 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • Distributing security-mediated PKI revisited

    Yang, J. P., Sakurai, K. & Rhee, K. H., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 31-44 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Economic-inspired truthful reputation feedback mechanism in P2P networks

    Wang, Y., Hori, Y. & Sakurai, K., Aug 2 2007, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. p. 80-85 6 p. 4144617. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

    Yu, S., Vargas, D. V. & Sakurai, K., Apr 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., p. 533-536 4 p. (Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017; vol. 2018-January).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

    Yu, S., Vargas, D. V. & Sakurai, K., 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR). p. 533-536 4 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient algorithms for the construction of hyperelliptic cryptosystems

    Okamoto, T. & Sakurai, K., 1992, Advances in Cryptology — CRYPTO 1991, Proceedings. Feigenbaum, J. (ed.). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 576 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 Citations (Scopus)
  • Efficient computing over GF(216) using graphics processing unit

    Tanaka, S., Yasuda, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., Oct 17 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 843-846 4 p. 6603790

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a montgomery-form elliptic curve

    Okeya, K. & Sakurai, K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001 - 3rd International Workshop, Proceedings. Koc, C. K., Naccache, D., Paar, C. & Paar, C. (eds.). Springer Verlag, p. 126-141 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2162).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    54 Citations (Scopus)
  • Efficient implementation of evaluating multivariate quadratic system with GPUs

    Tanaka, S., Nishide, T. & Sakurai, K., Oct 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 660-664 5 p. 6296933. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Efficient intrusion detection based on static analysis and stack walks

    Hua, J., Li, M., Sakurai, K. & Ren, Y., 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 158-173 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

    Tanaka, S., Chou, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., Jan 1 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 28-42 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

    Kwon, J. O., Sakurai, K. & Lee, D. H., Jan 1 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance

    Sakai, Y. & Sakurai, K., Jan 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Efficient shortest path routing algorithms for distributed XML processing

    Longjian, Y., Koide, H., Cavendish, D. & Sakurai, K., Jan 1 2019, WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies. Bozzon, A., Mayo, F. J. D. & Filipe, J. (eds.). SciTePress, p. 265-272 8 p. (WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient threshold secret sharing schemes secure against rushing cheaters

    Adhikari, A., Morozov, K., Obana, S., Roy, P. S., Sakurai, K. & Xu, R., 2016, Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers. Barreto, P. & Nascimento, A. C. A. (eds.). Springer Verlag, p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10015 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    11 Citations (Scopus)
  • Efficient variant of rainbow without triangular matrix representation

    Yasuda, T., Takagi, T. & Sakurai, K., 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 532-541 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)