• 2737 引用
  • 24 h指数
1991 …2020

Research output per year

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
会議での発言
会議での発言

Collaborative behavior visualization and its detection by observing darknet traffic

Akimoto, S., Hori, Y. & Sakurai, K., 12 26 2012, Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings. p. 212-226 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7672 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Combating cyber terrorism: Countering cyber terrorist advantages of surprise and anonymity

David, M. W. & Sakurai, K., 1 1 2003, Proceedings - 17th International Conference on Advanced Information Networking and Applications, AINA 2003. Institute of Electrical and Electronics Engineers Inc., p. 716-721 6 p. 1192973. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; 巻数 2003-January).

研究成果: 著書/レポートタイプへの貢献会議での発言

7 引用 (Scopus)

Comments and improvements of 'HOTA: Handover optimized ticket-based authentication in network-based mobility management'

Alizadeh, M., Tadayon, M. H., Sakurai, K., Baharun, S., Anada, H., Zamani, M., Zeki, A., Chaudhry, S. A. & Khan, M. K., 4 13 2017, Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017. Secci, S., Crespi, N. & Manzalini, A. (版). Institute of Electrical and Electronics Engineers Inc., p. 112-116 5 p. 7899399. (Proceedings of the 2017 20th Conference on Innovations in Clouds, Internet and Networks, ICIN 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

Comments on Kang-Park's security scheme for fast handover in hierarchical mobile IPv6

You, I., Sakurai, K. & Hori, Y., 12 1 2009, 4th International Conference on Frontier of Computer Science and Technology, FCST 2009. p. 351-355 5 p. 5392894. (4th International Conference on Frontier of Computer Science and Technology, FCST 2009).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Communication-efficient anonymous routing protocol for wireless sensor networks using single path tree topology

Nakamura, S., Hori, Y. & Sakurai, K., 5 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 766-771 6 p. 6185487. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Comparison of risk analysis methods: Mehari, magerit, NIST800-30 and microsoft's security management guide

Syalim, A., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 726-731 6 p. 5066554. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

研究成果: 著書/レポートタイプへの貢献会議での発言

25 引用 (Scopus)

Computational soundness of uniformity properties for multi-party computation based on LSSS

Zhao, H. & Sakurai, K., 1 1 2016, Trusted Systems - 7th International Conference, INTRUST 2015, Revised Selected Papers. Yung, M., Zhang, J. & Yang, Z. (版). Springer Verlag, p. 99-113 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9565).

研究成果: 著書/レポートタイプへの貢献会議での発言

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

Yasuda, T., Takagi, T. & Sakurai, K., 3 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Cooperatively securing network coding against pollution attacks with incentive mechanism

Xu, Y. & Sakurai, K., 5 8 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 52

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

Cross-group secret sharing for secure cloud storage service

Ke, C., Anada, H., Kawamoto, J., Morozov, K. & Sakurai, K., 1 4 2016, ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication. Association for Computing Machinery, Inc, a63. (ACM IMCOM 2016: Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Cryptanalysis of randomized arithmetic codes based on markov model

Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., 11 5 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7537 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Cryptanalysis on an image scrambling encryption scheme based on pixel bit

Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., 2 1 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6526 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit

Zhao, L., Adhikari, A., Xiao, D. & Sakurai, K., 1 1 2011, Digital Watermarking - 9th International Workshop, IWDW 2010, Revised Selected Papers. Kim, H-J., Shi, Y. Q. & Barni, M. (版). Springer Verlag, p. 45-59 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6526 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis

Sakurai, K. & Zheng, Y., 1 1 1996, Algorithms and Computation - 7th International Symposium, ISAAC 1996, Proceedings. Nagamochi, H., Miyano, S., Asano, T., Igarashi, Y. & Suri, S. (版). Springer Verlag, p. 376-385 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1178).

研究成果: 著書/レポートタイプへの貢献会議での発言

Customized program protection for a user customized data protection framework

Takahashi, K., Matsuzaki, T., Mine, T. & Sakurai, K., 8 25 2011, Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011. p. 643-649 7 p. 5953301. (Proceedings - 2011 IEEE International Conference on Computer Science and Automation Engineering, CSAE 2011; 巻数 1).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cyberbullying detection using parent-child relationship between comments

Li, Z., Kawamoto, J., Feng, Y. & Sakurai, K., 11 28 2016, 18th International Conference on Information Integration and Web-Based Applications and Services, iiWAS 2016 - Proceedings. Indrawan-Santiago, M., Anderst-Kotsis, G., Steinbauer, M. & Khalil, I. (版). Association for Computing Machinery, p. 325-334 10 p. (ACM International Conference Proceeding Series).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Darknet monitoring on real-operated networks

Mizoguchi, S., Fukushima, Y., Kasahara, Y., Hori, Y. & Sakurai, K., 2010, Proceedings - 2010 International Conference on Broadband, Wireless Computing Communication and Applications, BWCCA 2010. p. 278-285 8 p. 5633172

研究成果: 著書/レポートタイプへの貢献会議での発言

Deniable Secret Handshake Protocol - Revisited

Panja, S., Dutta, S. & Sakurai, K., 1 1 2020, Advanced Information Networking and Applications - Proceedings of the 33rd International Conference on Advanced Information Networking and Applications AINA-2019. Barolli, L., Takizawa, M., Enokido, T. & Xhafa, F. (版). Springer Verlag, p. 1266-1278 13 p. (Advances in Intelligent Systems and Computing; 巻数 926).

研究成果: 著書/レポートタイプへの貢献会議での発言

Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring

Nishioka, M., Satoh, H. & Sakurai, K., 1 1 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Springer Verlag, 巻 2288. p. 81-102 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 2288).

研究成果: 著書/レポートタイプへの貢献会議での発言

11 引用 (Scopus)

Design and implementation of a forced encryption kernel module

Furukawa, J., Sakai, A., Nishide, T., Hori, Y. & Sakurai, K., 9 8 2011, Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011. p. 607-611 5 p. 5976283. (Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011).

研究成果: 著書/レポートタイプへの貢献会議での発言

Design and implementation of an extended reference monitor for trusted operating systems

Kim, H. C., Shin, W., Ramakrishna, R. S. & Sakurai, K., 7 10 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. p. 235-247 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 3903 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Design and implementation of document access control model based on role and security policy

Mao, L., Yao, S., Zhang, K. & Sakurai, K., 11 29 2011, Trusted Systems - Second International Conference, INTRUST 2010, Revised Selected Papers. p. 26-36 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6802 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Design and implementation of security mechanisms for a hierarchical community-based multi-agent system

Takahashi, K., Mitsuyuki, Y., Mine, T., Sakurai, K. & Amamiya, M., 7 17 2009, Agent Computing and Multi-Agent Systems - 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Revised Papers. p. 134-145 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 5044 LNAI).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Design and object-oriented implementation of an intelligence entity sharing pool

Huang, R., Ma, J., Takahashi, K. & Sakurai, K., 11 17 2009, Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009. p. 583-587 5 p. 5209359. (Proceedings of the 2009 WRI Global Congress on Intelligent Systems, GCIS 2009; 巻数 2).

研究成果: 著書/レポートタイプへの貢献会議での発言

Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n

Sakai, Y. & Sakurai, K., 1 1 1998, Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Ohta, K. & Pei, D. (版). Springer Verlag, p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1514).

研究成果: 著書/レポートタイプへの貢献会議での発言

20 引用 (Scopus)

Detecting distributed cyber attacks in SDN based on automatic thresholding

Komiya, R., Feng, Y. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 417-423 7 p. 8590937. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM

Yamauchi, K., Hori, Y. & Sakurai, K., 1 1 2013, Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 63-68 6 p. 6621653. (Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

Detection of Android ad library focusing on HTTP connections and view object redraw behaviors

Kajiwara, N., Kawamoto, J., Matsumoto, S., Hori, Y. & Sakurai, K., 3 10 2015, 2015 International Conference on Information Networking, ICOIN 2015. IEEE Computer Society, 巻 2015-January. p. 104-109 6 p. 7057865

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Detection of android API call using logging mechanism within android framework

Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y. & Sakurai, K., 1 1 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Mao, M., Zomaya, A. & Varadharajan, V. (版). Springer Verlag, p. 393-404 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; 巻数 127 LNICST).

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

Detection of illegal players in massively multiplayer online role playing game by classification algorithms

Zhang, Z., Anada, H., Kawamoto, J. & Sakurai, K., 4 29 2015, Proceedings - IEEE 29th International Conference on Advanced Information Networking and Applications, AINA 2015. Institute of Electrical and Electronics Engineers Inc., 巻 2015-April. p. 406-413 8 p. 7097999

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Differential fault analysis of full lblock

Zhao, L., Nishide, T. & Sakurai, K., 6 15 2012, Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Proceedings. p. 135-150 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7275 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

13 引用 (Scopus)

Distributed Paillier cryptosystem without trusted dealer

Nishide, T. & Sakurai, K., 2 1 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6513 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

16 引用 (Scopus)

Distributed Paillier Cryptosystem without Trusted Dealer

Nishide, T. & Sakurai, K., 1 1 2011, Information Security Applications - 11th International Workshop, WISA 2010, Revised Selected Papers. Chung, Y. & Yung, M. (版). Springer Verlag, p. 44-60 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6513 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Distributing security-mediated PKI revisited

Yang, J. P., Sakurai, K. & Rhee, K. H., 1 1 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 31-44 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4043 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Economic-inspired truthful reputation feedback mechanism in P2P networks

Wang, Y., Hori, Y. & Sakurai, K., 8 2 2007, Proceedings - FTDCS 2007: 11th IEEE International Workshop on Future Trends of Distributed Computing Systems. p. 80-85 6 p. 4144617. (Proceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems).

研究成果: 著書/レポートタイプへの貢献会議での発言

7 引用 (Scopus)

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., 4 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., p. 533-536 4 p. (Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017; 巻数 2018-January).

研究成果: 著書/レポートタイプへの貢献会議での発言

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking

Yu, S., Vargas, D. V. & Sakurai, K., 2017, 2017 Fifth International Symposium on Computing and Networking (CANDAR). p. 533-536 4 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Efficient algorithms for the construction of hyperelliptic cryptosystems

Okamoto, T. & Sakurai, K., 1 1 1992, Advances in Cryptology — CRYPTO 1991, Proceedings. Feigenbaum, J. (版). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 576 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

Efficient computing over GF(216) using graphics processing unit

Tanaka, S., Yasuda, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 10 17 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 843-846 4 p. 6603790

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a montgomery-form elliptic curve

Okeya, K. & Sakurai, K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001 - 3rd International Workshop, Proceedings. Springer Verlag, 巻 2162. p. 126-141 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 2162).

研究成果: 著書/レポートタイプへの貢献会議での発言

45 引用 (Scopus)

Efficient implementation of evaluating multivariate quadratic system with GPUs

Tanaka, S., Nishide, T. & Sakurai, K., 10 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 660-664 5 p. 6296933. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Efficient intrusion detection based on static analysis and stack walks

Hua, J., Li, M., Sakurai, K. & Ren, Y., 12 1 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 158-173 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 5824 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

Tanaka, S., Chou, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 1 1 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (版). Springer Verlag, p. 28-42 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7690 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

Kwon, J. O., Sakurai, K. & Lee, D. H., 1 1 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 3991 LNCS - I).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance

Sakai, Y. & Sakurai, K., 1 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (版). Springer Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1841).

研究成果: 著書/レポートタイプへの貢献会議での発言

7 引用 (Scopus)

Efficient shortest path routing algorithms for distributed XML processing

Longjian, Y., Koide, H., Cavendish, D. & Sakurai, K., 1 1 2019, WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies. Bozzon, A., Mayo, F. J. D. & Filipe, J. (版). SciTePress, p. 265-272 8 p. (WEBIST 2019 - Proceedings of the 15th International Conference on Web Information Systems and Technologies).

研究成果: 著書/レポートタイプへの貢献会議での発言

Efficient threshold secret sharing schemes secure against rushing cheaters

Adhikari, A., Morozov, K., Obana, S., Roy, P. S., Sakurai, K. & Xu, R., 1 1 2016, Information Theoretic Security - 9th International Conference, ICITS 2016, Revised Selected Papers. Barreto, P. & Nascimento, A. C. A. (版). Springer Verlag, p. 3-23 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10015 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

8 引用 (Scopus)

Efficient variant of rainbow without triangular matrix representation

Yasuda, T., Takagi, T. & Sakurai, K., 1 1 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 532-541 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 8407 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

8 引用 (Scopus)

Elliptic curves with the montgomery-form and their cryptographic applications

Okeya, K., Kurumatani, H. & Sakurai, K., 1 1 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (版). Springer Verlag, p. 238-257 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1751).

研究成果: 著書/レポートタイプへの貢献会議での発言

56 引用 (Scopus)

Empirical evaluation on robustness of deep convolutional neural networks activation functions against adversarial perturbation

Su, J., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 223-227 5 p. 8590903. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言