If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Conference contribution
1997
3 Citations (Scopus)

Improving linear cryptanalysis of LOKI91 by probabilistic counting method

Sakurai, K. & Furuya, S., Jan 1 1997, Fast Software Encryption - 4th International Workshop, FSE 1997, Proceedings. Biham, E. (ed.). Springer Verlag, p. 114-133 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1267).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear Cryptanalysis
Counting
Attack
S-box
Maximum likelihood

On-line versus off-line in money-making strategies with brokerage

Dannoura, E. & Sakurai, K., Jan 1 1997, Algorithms and Computation - 8th International Symposium, ISAAC 1997, Proceedings. Leong, H. W., Jain, S. & Imai, H. (eds.). Springer Verlag, p. 173-182 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1350).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Line
Competitive Ratio
Strategy
Money
Lower bound

Protection of data and delegated keys in digital distribution

Mambo, M., Okamoto, E. & Sakurai, K., Jan 1 1997, Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings. Pieprzyk, J., Varadharajan, V. & Mu, Y. (eds.). Springer Verlag, p. 271-282 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1270).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Encryption
Information Systems
Distribution System
Cryptosystem
1996

A hidden cryptographic assumption in no-transferable indentification schemes

Sakurai, K., Jan 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer Verlag, p. 159-172 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Soundness
Zero-knowledge
Identification Scheme
Restriction
9 Citations (Scopus)

A progress report on subliminal-free channels

Burmester, M., Desraedt, Y. G., Itoh, T., Sakurai, K., Shizuya, H. & Yung, M., Jan 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 157-168 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Cryptography
Randomness
Communication
Zero-knowledge
18 Citations (Scopus)

Blind decoding, blind undeniable signatures, and their applications to privacy protection

Sakurai, K. & Yamane, Y., Jan 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 257-264 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Undeniable Signature
Blind Signature
Privacy Protection
Decoding
Servers

Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis

Sakurai, K. & Zheng, Y., Jan 1 1996, Algorithms and Computation - 7th International Symposium, ISAAC 1996, Proceedings. Nagamochi, H., Miyano, S., Asano, T., Igarashi, Y. & Suri, S. (eds.). Springer Verlag, p. 376-385 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1178).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear Cryptanalysis
Block Cipher
Immunity
Cryptography
Transform
9 Citations (Scopus)

How to utilize the transformability of digital signatures for solving the oracle problem

Mambo, M., Sakurai, K. & Okamoto, E., Jan 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (eds.). Springer Verlag, p. 322-333 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic document identification systems
Digital Signature
Decoding
Blind Signature
Signature

On the complexity of computational problems associated with simple stochastic games: Extended abstract of COCOON'96

Yanbe, A. & Sakurai, K., Jan 1 1996, Computing and Combinatorics - 2nd Annual International Conference, COCOON 1996, Proceedings. Wong, C. K., Wong, C. K. & Cai, J-Y. (eds.). Springer Verlag, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1090).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Simple Game
Stochastic Games
Computational complexity
Optimal Strategy
Two-person Games
1995
1 Citation (Scopus)

On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes

Sakurai, K., Jan 1 1995, Computing and Combinatorics - 1st Annual International Conference, COCOON 1995, Proceedings. Du, D-Z., Li, M. & Du, D-Z. (eds.). Springer Verlag, p. 496-509 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 959).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identification Scheme
Soundness
Knowledge
Language
1993
4 Citations (Scopus)

4 move perfect ZKIP of knowledge with no assumption

Saito, T., Kurosawa, K. & Sakurai, K., Jan 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Networks (circuits)
Tail
Knowledge
Language
6 Citations (Scopus)

Any language in IP has a divertible ZKIP

Itoh, T., Sakurai, K. & Shizuya, H., Jan 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Springer Verlag, Vol. 739 LNCS. p. 382-396 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interactive Proof Systems
Zero-knowledge Proof
Cryptography
Homomorphisms
Encryption
3 Citations (Scopus)

How intractable is the discrete logarithm for a general finite group?

Okamoto, T., Sakurai, K. & Shizuya, H., Jan 1 1993, Advances in Cryptology – EUROCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Rueppel, R. A. (ed.). Springer Verlag, p. 420-428 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 658 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Logarithm
Polynomial time
Finite Group
Polynomials
Computational complexity

On bit correlations among preimages of “many to one” one-way functions: — A new approach to study on randomness and hardness of one-way functions —

Sakurai, K. & Itoh, T., Jan 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 435-446 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Many to one
One-way Function
Hardness
Randomness
Discrete Logarithm
5 Citations (Scopus)

On the complexity of constant round ZKIP of possession of knowledge

Itoh, T. & Sakurai, K., Jan 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 331-345 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Interactive Proof Systems
Zero-knowledge Proof
Black Box
Perfect Simulation
L'Hôpital's Rule
6 Citations (Scopus)

On the discrepancy between serial and parallel of zero-knowledge protocols

Sakurai, K. & Itoh, T., Jan 1 1993, Advances in Cryptology — CRYPTO 1992 - 12th Annual International Cryptology Conference, Proceedings. Brickell, E. F. (ed.). Springer Verlag, p. 246-259 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 740 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-knowledge
Discrepancy
2 Citations (Scopus)

Subliminal channels for signature transfer and their application to signature distribution schemes

Sakurai, K. & Itoh, T., Jan 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 231-243 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature Verification
Identification Scheme
Signature
Network protocols
One-way Function
1992
5 Citations (Scopus)

Efficient algorithms for the construction of hyperelliptic cryptosystems

Okamoto, T. & Sakurai, K., Jan 1 1992, Advances in Cryptology — CRYPTO 1991, Proceedings. Feigenbaum, J. (ed.). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 576 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptosystem
Discrete Logarithm
Cryptography
Efficient Algorithms
Multiplicative
1991
5 Citations (Scopus)

On the complexity of hyperelliptic discrete logarithm problem

Shizuya, H., Itoh, T. & Sakurai, K., Jan 1 1991, Advances in Cryptology—EUROCRYPT 1991 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Davies, D. W. (ed.). Springer Verlag, p. 337-351 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 547 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Logarithm Problem
Computational complexity
Complexity Theory
Elliptic Curves
Galois field