If you made any changes in Pure these will be visible here soon.

Research Output 1991 2020

Filter
Article
1993
1 Citation (Scopus)
Interactive Proofs
Zero-knowledge Proof
Factorization
Integer
Simulation

Constant round perfect ZKIP of computational ability

Itoh, T. & Sakurai, K., Jul 1993, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E76-A, 7, p. 1225-1233 9 p.

Research output: Contribution to journalArticle

Interactive Proof Systems
Perfect Simulation
Zero-knowledge Proof
Black Box
Factorization
7 Citations (Scopus)
Interactive Proof Systems
Zero-knowledge Proof
Polynomials
Black Box
Perfect Simulation
1 Citation (Scopus)
Zero-knowledge
Discrepancy
1994
Electronic document identification systems
Signature
Identification Scheme
Digital Signature
One-way Function
1996
1 Citation (Scopus)

A short certificate of the number of universal optimal strategies for stopping simple stochastic games

Yanbe, A. & Sakurai, K., Jan 15 1996, In : Information Processing Letters. 57, 1, p. 17-24 8 p.

Research output: Contribution to journalArticle

Simple Game
Stochastic Games
Game theory
Certificate
Game Theory

On the complexity of the discrete logarithm for a general finite group

Okamoto, T., Sakurai, K. & Shizuya, H., 1996, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E79-A, 1, p. 61-65 5 p.

Research output: Contribution to journalArticle

Discrete Logarithm
Polynomial time
Finite Group
Polynomials
Discrete Logarithm Problem
1997
23 Citations (Scopus)
Linear Cryptanalysis
Block Ciphers
Immunity
Cryptography
Transform
1 Citation (Scopus)

Practical proofs of knowledge without relying on theoretical proofs of membership on languages

Sakurai, K., Jul 30 1997, In : Theoretical Computer Science. 181, 2, p. 317-335 19 p.

Research output: Contribution to journalArticle

Identification Scheme
Soundness
Formulation
Knowledge
Language
1998
8 Citations (Scopus)

An improvement on El-Yaniv-Fiat-Karp-Turpin's money-making bi-directional trading strategy

Dannoura, E. & Sakurai, K., Apr 15 1998, In : Information Processing Letters. 66, 1, p. 27-33 7 p.

Research output: Contribution to journalArticle

Competitive Analysis
Trading Strategies
Money
17 Citations (Scopus)

A structural comparison of the computational difficulty of breaking discrete log cryptosystems

Sakurai, K. & Shizuya, H., Jan 1 1998, In : Journal of Cryptology. 11, 1, p. 29-43 15 p.

Research output: Contribution to journalArticle

Cryptosystem
Cryptography
Reducibility
Many to one
Oblivious Transfer
1999
4 Citations (Scopus)

Divertible and subliminal-free zero-knowledge proofs for languages

Burmester, M., Desmedt, Y. G., Itoh, T., Sakurai, K. & Shizuya, H., Jan 1 1999, In : Journal of Cryptology. 12, 3, p. 197-223 27 p.

Research output: Contribution to journalArticle

Zero-knowledge Proof
Language
2000
2 Citations (Scopus)
Blind Signature
Discrete Logarithm Problem
Line
Certificate
Electronics
1 Citation (Scopus)
Cryptography
18 Citations (Scopus)
Hyperelliptic Curves
Cryptosystem
Cryptography
Software
Program processors
2001

A theory of demonstrating program result-correctness with cryptographic applications

Sakuralt, K., Jan 1 2001, In : IEICE Transactions on Information and Systems. E84-D, 1, p. 4-14 11 p.

Research output: Contribution to journalArticle

Demonstrations
19 Citations (Scopus)
Scalar multiplication
Doubling
Elliptic Curves
Computational complexity
Computational Complexity
1 Citation (Scopus)
Distributed Protocol
Cryptographic Protocols
Shareholders
Key Distribution
Attack
2002
6 Citations (Scopus)
Elliptic Curve Cryptosystem
Scalar multiplication
Cryptography
Recovery
Elliptic Curves
2003
Hash functions
Security of data
Authentication
Scalar multiplication
Elliptic Curves
Scalar
Network protocols
Computational efficiency
5 Citations (Scopus)
Timing Attack
Public-key Cryptosystem
Cryptography
Modulus
Random Oracle Model
1 Citation (Scopus)
Elliptic Curve Cryptosystem
Side Channel Attacks
Subtraction
Cryptography
Countermeasures
48 Citations (Scopus)
Watermarking
Watermark
Certification
Anonymity
Fingerprinting
7 Citations (Scopus)
Scalar multiplication
Elliptic Curves
Cryptography
Simultaneous Methods
Elliptic Curve Cryptosystem

On the security of yet another reduced version of 3-pass HAVAL

Her, Y. S. & Sakurai, K., 2003, In : Unknown Journal. p. 137 1 p.

Research output: Contribution to journalArticle

collision
Authenticated Encryption
Hashing
Cryptography
Path
Encryption
Timing Attack
Modular Exponentiation
Parallel algorithms
Parallel Algorithms
Exponent
3 Citations (Scopus)
Elliptic Curve Cryptosystem
Scalar multiplication
Cryptography
Simultaneous Methods
Inversion

“A Secure Fragile Watermarking”

Iwamura, K., Hayashi, J., Sakurai, K. & Imai, H., Jan 1 2003, In : Journal of the Institute of Image Electronics Engineers of Japan. 32, 1, p. 22-28 7 p.

Research output: Contribution to journalArticle

Watermarking
2004
6 Citations (Scopus)
Electronic commerce
Public key
Certificate
Communication
Public Key Infrastructure
1 Citation (Scopus)
Cryptography
Packaging
Encryption
Digital Rights Management
Framework
1 Citation (Scopus)
Hash functions
Security Analysis
Hash Function
Black Box
Collision

Analysis and Design for Private Message Board Systems

Imamotoh, K. & Sakurai, K., Jan 1 2004, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 1, p. 204-211 8 p.

Research output: Contribution to journalArticle

Electronic mail
Confidentiality
Anonymity
Electronic Mail
Fairness
3 Citations (Scopus)
Leakage
Cryptography
Exponent
Attack
Side Channel Attacks
5 Citations (Scopus)
Obfuscation
Fingerprinting
Watermarking
Java
Watermark
51 Citations (Scopus)

Enhancing privacy of universal re-encryption scheme for RFID tags

Saito, J., Ryou, J. C. & Sakurai, K., 2004, In : Lecture Notes in Computer Science. 3207, p. 879-890 12 p.

Research output: Contribution to journalArticle

Radio Frequency Identification Device
Privacy
Radio Frequency Identification
Radio frequency identification (RFID)
Encryption
2 Citations (Scopus)
Power Analysis
Countermeasures
Attack
Side Channel Attacks
Electronic crime countermeasures
4 Citations (Scopus)

On security of XTR public key cryptosystems against side channel attacks

Han, D. G., Lim, J. & Sakurai, K., 2004, In : Lecture Notes in Computer Science. 3108, p. 454-465 12 p.

Research output: Contribution to journalArticle

Side Channel Attacks
Public-key Cryptosystem
Exponentiation
Cryptography
Differential Power Analysis
2005
2 Citations (Scopus)
Role-based Access Control
Distributed Environment
Access control
Operating Systems
Scalability
1 Citation (Scopus)

Analysis and comparison of cryptographic techniques in e-voting and e-auction

Her, Y. S., Imamoto, K. & Sakurai, K., Sep 1 2005, In : Research Reports on Information Science and Electrical Engineering of Kyushu University. 10, 2, p. 91-96 6 p.

Research output: Contribution to journalArticle

Costs
1 Citation (Scopus)

Experimental analysis of guess-and-determine attacks on clock-controlled stream ciphers

Kiyomoto, S., Tanaka, T. & Sakurai, K., Oct 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 10, p. 2778-2791 14 p.

Research output: Contribution to journalArticle

Stream Ciphers
Guess
Experimental Analysis
Clocks
Attack

On the pseudorandomness of a modification of KASUMI type permutations

Lee, W., Sakurai, K., Hong, S. & Lee, S., 2005, In : Lecture Notes in Computer Science. 3506, p. 313-329 17 p.

Research output: Contribution to journalArticle

Pseudorandomness
Permutation
Upper bound
Arbitrary
Side Channel Attacks
Exponentiation
Vulnerability
Exponent
Cryptography
3 Citations (Scopus)

PGV-style block-cipher-based hash families and black-box analysis

Lee, W., Nandi, M., Sarkar, P., Chang, D., Lee, S. & Sakurai, K., Jan 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 1, p. 39-48 10 p.

Research output: Contribution to journalArticle

Hash functions
Block Cipher
Black Box
Hash Function
Collision
1 Citation (Scopus)

Procedural constraints in the extended RBAC and the coloured Petri net modeling

Shin, W., Lee, J. G., Klm, H. K. & Sakurai, K., Jan 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 1, p. 327-330 4 p.

Research output: Contribution to journalArticle

Role-based Access Control
Colored Petri Nets
Security Analysis
Petri nets
Access control
1 Citation (Scopus)
Communication Cost
Electronic commerce
Certificate
Communication
Public key
3 Citations (Scopus)

Side channel cryptanalysis on XTR public key cryptosystem

Han, D. G., Izu, T., Lim, J. & Sakurai, K., Jan 1 2005, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E88-A, 5, p. 1214-1223 10 p.

Research output: Contribution to journalArticle

Smart cards
Public-key Cryptosystem
Exponentiation
Cryptanalysis
Cryptography

The improved risk analysis mechanism in the practical risk analysis system

Hwang, S., Lee, N., Sakurai, K., Park, G. & Ryou, J., 2005, In : Unknown Journal. 3391, p. 835-842 8 p.

Research output: Contribution to journalArticle

Risk analysis
genetic algorithm
vulnerability
Genetic algorithms
risk analysis