If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
2005
4 Citations (Scopus)

A framework for protecting private information through user-trusted-program and its realizability

Takahashi, K., Sakurai, K. & Amamiya, M., Dec 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 433-442 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Private Information
Realizability
Ubiquitous computing
Internet
Mobile Technology
3 Citations (Scopus)

An evenhanded certified email system for contract signing

Imamoto, K., Zhou, J. & Sakurai, K., Dec 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Electronic Mail
Transactions
Receiver
Gambling
2 Citations (Scopus)

Generic, optimistic, and efficient schemes for fair certified email delivery

Wang, G., Bao, F., Imamoto, K. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Vol. 3783 LNCS. p. 40-52 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Electronic Mail
Receiver
Flavors
144 Citations (Scopus)

Grouping proof for RFID tags

Saito, J. & Sakurai, K., Dec 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. p. 621-624 4 p. 1423764. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio frequency identification (RFID)
Radio communication
Antennas
Costs

Group key distribution scheme for reducing required rekey message size

Nishi, R. & Sakurai, K., Sep 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). p. 280-284 5 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Forward error correction
Communication
Bandwidth
10 Citations (Scopus)

Program obfuscation scheme using random numbers to complicate control flow

Toyofuku, T., Tabata, T. & Sakurai, K., Dec 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 916-925 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Obfuscation
Random number
Flow Control
Flow control
Software
1 Citation (Scopus)

Query forwarding algorithm supporting initiator anonymity in GNUnet

Tatara, K., Hori, Y. & Sakurai, K., Sep 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). Vol. 2. p. 235-239 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routing protocols
Peer to peer networks
Communication
41 Citations (Scopus)

Reassignment scheme of an RFID tag's key for owner transfer

Saito, J., Imamoto, K. & Sakurai, K., Dec 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 1303-1312 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radio Frequency Identification
Radio frequency identification (RFID)
Bar codes
Privacy Protection
Radio communication
4 Citations (Scopus)

Simple power analysis on fast modular reduction with NIST recommended elliptic curves

Sakai, Y. & Sakurai, K., Dec 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 169-180 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Power Analysis
Elliptic Curves
Mersenne prime
Montgomery multiplication
Side Channel Attacks
1 Citation (Scopus)

Some remarks on security of receipt-free E-auction

Her, Y. S., Imamoto, K. & Sakurai, K., 2005, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. Vol. II. p. 560-563 4 p. 1489023

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tea
3 Citations (Scopus)

Trends and issues for security of home-network based on power line communication

Nishi, R., Morioka, H. & Sakurai, K., Dec 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. Vol. 2. p. 655-660 6 p. 1423770

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Home networks
Local area networks
Communication
2004
8 Citations (Scopus)

A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model

Imamoto, K. & Sakurai, K., Jul 6 2004, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 Volume 1 (Regional Papers). Barolli, L. (ed.). p. 327-332 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Denial-of-service attack
9 Citations (Scopus)

A merging method of certification authorities without using cross-certifications

Koga, S. & Sakurai, K., Jul 7 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 174-177 4 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Merging
Electronic commerce
Mergers and acquisitions
Processing
Communication

Protecting the electric power infrastructure with a mobile agent monitoring and analysis system

David, M. W. & Sakurai, K., Jun 28 2004, Proceedings - 2004 Iternational Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004. p. 497-498 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Monitoring
Communication systems
Internet
2003
9 Citations (Scopus)

A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks

Okeya, K. & Sakurai, K., 2003, Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 1216723

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side channel attack
2 Citations (Scopus)

Certified e-mail systems using public notice board

Imamoto, K. & Sakurai, K., Jan 1 2003, Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003. Institute of Electrical and Electronics Engineers Inc., p. 460-464 5 p. 1232065. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA; vol. 2003-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
7 Citations (Scopus)

Combating cyber terrorism: Countering cyber terrorist advantages of surprise and anonymity

David, M. W. & Sakurai, K., Jan 1 2003, Proceedings - 17th International Conference on Advanced Information Networking and Applications, AINA 2003. Institute of Electrical and Electronics Engineers Inc., p. 716-721 6 p. 1192973. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2003-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Terrorism
Internet
1 Citation (Scopus)

Evaluation of anti-spam method combining Bayesian filtering and strong challenge and response

Iwanaga, M., Tabata, T. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 214-219 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods

Fukushima, K., Tabata, T. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 108-113 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encapsulation
1 Citation (Scopus)

Mobile agent based security monitoring and analysis for the electric power infrastructure

David, M. W. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 159-164 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile agents
Monitoring
Intrusion detection
Power transmission
Failure analysis
1 Citation (Scopus)

On the security of SELinux with a simplified policy

Sueyasu, K., Tabata, T. & Sakurai, K., Dec 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 79-84 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Macros
Linux
Computer operating systems
Servers
2002
20 Citations (Scopus)

A certified E-mail system with receiver’s selective usage of delivery authority

Imamoto, K. & Sakurai, K., Jan 1 2002, Progress in Cryptology - INDOCRYPT 2002 - 3rd International Conference on Cryptology in India, Proceedings. Sarkar, P. & Menezes, A. (eds.). Springer Verlag, p. 326-338 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2551).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
Electronic Mail
Receiver
Costs
Choose
23 Citations (Scopus)

A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks

Okeya, K., Miyazaki, K. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Springer Verlag, Vol. 2288. p. 428-439 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalar multiplication
Side Channel Attacks
Elliptic Curves
Smart cards
Mobile devices
6 Citations (Scopus)

Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint hamming weight representation of scalars

Sakai, Y. & Sakurai, K., Jan 1 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 484-499 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hamming Weight
Scalar multiplication
Elliptic Curves
Scalar
Network protocols
4 Citations (Scopus)

An IND-CCA2 public-key cryptosystem with fast decryption

Buchmann, J., Sakurai, K. & Takagi, T., Jan 1 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 51-71 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Cryptography
Cryptosystem
kernel
Hash Function
24 Citations (Scopus)

A second-order DPA attack breaks a window-method based countermeasure against side channel attacks

Okeya, K. & Sakurai, K., 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Springer Verlag, Vol. 2433. p. 389-401 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side Channel Attacks
Countermeasures
Attack
Scalar
Electronic crime countermeasures
10 Citations (Scopus)

Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring

Nishioka, M., Satoh, H. & Sakurai, K., Jan 1 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Springer Verlag, Vol. 2288. p. 81-102 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Cryptography
Hardness
Public Key Encryption
Design
13 Citations (Scopus)

New semantically secure public-key cryptosystems from the rsa-primitive

Sakurai, K. & Takagi, T., Jan 1 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naccache, D. & Paillier, P. (eds.). Springer Verlag, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Cryptography
Cryptosystem
Semantic Security
Semantics
36 Citations (Scopus)

On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling

Okeya, K. & Sakurai, K., Jan 1 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 420-435 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Side Channel Attacks
Subtraction
Countermeasures
Doubling
Electronic crime countermeasures
3 Citations (Scopus)

On the security of a modified paillier public-key primitive

Sakurai, K. & Takagi, T., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Springer Verlag, Vol. 2384. p. 436-448 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public key
Cryptosystem
Cryptography
Modulus
Factoring
3 Citations (Scopus)

Risks with raw-key masking – The security evaluation of 2-key XCBC

Furuya, S. & Sakurai, K., Jan 1 2002, Information and Communications Security - 4th International Conference, ICICS 2002, Proceedings. Qing, S., Deng, R., Bao, F. & Zhou, J. (eds.). Springer Verlag, p. 327-341 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Masking
Evaluation
Provable Security
Block Ciphers
Violate
2001
45 Citations (Scopus)

Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a montgomery-form elliptic curve

Okeya, K. & Sakurai, K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001 - 3rd International Workshop, Proceedings. Springer Verlag, Vol. 2162. p. 126-141 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2162).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Elliptic Curve Cryptosystem
Scalar multiplication
Elliptic Curves
Cryptography
Recovery
6 Citations (Scopus)

English vs. sealed bid in anonymous electronic auction protocols

Hirakiuchi, D. & Sakurait, K., Jan 1 2001, Proceedings - 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001. IEEE Computer Society, p. 171-176 6 p. 953409. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2001-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Servers
1 Citation (Scopus)

On the power of multidoubling in speeding up elliptic scalar multiplication

Sakai, Y. & Sakurai, K., Jan 1 2001, Selected Areas in Cryptography - 8th Annual International Workshop, SAC 2001, Revised Papers. Vaudenay, S. & Youssef, A. M. (eds.). Springer Verlag, p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2259).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalar multiplication
Elliptic Curves
Galois field
Computational complexity
Doubling
2000

A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

Tamura, T., Sakurai, K. & Matsumoto, T., Jan 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 221-235 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hyperelliptic Curves
Cryptosystem
Hardware Implementation
Cryptography
Genus
43 Citations (Scopus)

An anonymous electronic bidding protocol Based on a new convertible group signature scheme-on the importance of hiding the winner’s identity against bid-rigging-

Sakurai, K. & Miyazaki, S., Jan 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 385-399 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Group Signature
Group Scheme
Bidding
Auctions
Signature Scheme
7 Citations (Scopus)

Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance

Sakai, Y. & Sakurai, K., Jan 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scalar multiplication
Doubling
Elliptic Curves
Computational complexity
Computational Complexity
56 Citations (Scopus)

Elliptic curves with the montgomery-form and their cryptographic applications

Okeya, K., Kurumatani, H. & Sakurai, K., 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Springer Verlag, Vol. 1751. p. 238-257 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Elliptic Curves
Factorization
Cryptography
Cofactor
Timing Attack
1 Citation (Scopus)

Making hash functions from block ciphers secure and efficient by using convolutional codes

Inoue, T. & Sakurai, K., Jan 1 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 391-404 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Convolutional Codes
Block Ciphers
Hash functions
Convolutional codes
Block Codes
4 Citations (Scopus)

On threshold RSA-signing with no dealer

Miyazaki, S., Sakurai, K. & Yung, M., Jan 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 197-207 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Distributed Computation
Attack
Demonstrate
5 Citations (Scopus)

On zero-knowledge proofs: "From membership to decision" (extended abstract)

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 2000, Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 255-264 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Over Fp vs. Over F2n and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems

Sakai, Y. & Sakurai, K., Jan 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 82-101 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hyperelliptic Curves
Cryptosystem
Cryptography
Software
Program processors
74 Citations (Scopus)

Power analysis breaks elliptic curve cryptosystems even secure against the timing attack

Okeya, K. & Sakurai, K., Jan 1 2000, Progress in Cryptology - INDOCRYPT 2000 - 1st International Conference in Cryptology in India, Proceedings. Roy, B. & Okamoto, E. (eds.). Springer Verlag, p. 178-190 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Timing Attack
Elliptic Curve Cryptosystem
Scalar multiplication
Power Analysis
Cryptography
1999
1 Citation (Scopus)

Toward fair international key escrow: An attempt by distributed trusted third agencies with threshold cryptography

Miyazaki, S., Kuroda, I. & Sakurai, K., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Springer Verlag, Vol. 1560. p. 171-187 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Threshold Cryptography
Cryptography
Communication
Law Enforcement
Key Distribution
1998
7 Citations (Scopus)

A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem

Miyazaki, S. & Sakurai, K., Jan 1 1998, Financial Cryptography - 2nd International Conference, FC 1998, Proceedings. Hirschfeld, R. (ed.). Springer Verlag, p. 295-308 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1465).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Blind Signature
Discrete Logarithm Problem
Security of data
Information Security
Tracing
1 Citation (Scopus)

Checking programs discreetly: Demonstrating result-correctness efficiently while concealing it

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 1998, Algorithms and Computation - 9th International Symposium, ISAAC'98, Proceedings. p. 59-71 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1533 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-knowledge
Correctness
Zero-knowledge Proof
Alike
Requirements
20 Citations (Scopus)

Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n

Sakai, Y. & Sakurai, K., Jan 1 1998, Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Ohta, K. & Pei, D. (eds.). Springer Verlag, p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1514).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Hyperelliptic Curves
Cryptosystem
Cryptography
Discrete Logarithm Problem
Public-key Cryptosystem

Result-indistinguishable zero-knowledge proofs: Increased power and constant-round protocols

Di Crescenzo, G., Sakurai, K. & Yung, M., Dec 1 1998, STACS 98 - 15th Annual Symposium on Theoretical Aspects of Computer Science, Proceedings. p. 511-521 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1373 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-knowledge Proof
Proof System
Chemical analysis
Graph Isomorphism
Language
20 Citations (Scopus)

Secure hyperelliptic cryptosystems and their performance

Sakai, Y., Sakurai, K. & Ishizuka, H., Jan 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 164-181 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Cryptography
Curve
Jacobian Varieties
Discrete Logarithm Problem
3 Citations (Scopus)

Security issues for contactless smart cards

David, M. W. & Sakurai, K., Jan 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 247-252 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Smart cards
Smart Card
Standardization
Encryption
Cryptography