• 2736 引用
  • 24 h指数
1991 …2020

Research output per year

Pureに変更を加えた場合、すぐここに表示されます。

研究成果

フィルター
会議での発言
会議での発言

Information hiding in subcells of a two-dimensional code

Teraura, N. & Sakurai, K., 12 1 2012, 1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012. p. 652-656 5 p. 6379943. (1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012).

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

Information hiding of two-dimensional code by multi-layer optical

Teraura, N. & Sakurai, K., 10 15 2012, Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012. p. 770-777 8 p. 6280373. (Proceedings of the 2012 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2012).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Integrity for the In-flight web page based on a fragile watermarking chain scheme

Gao, P., Nishide, T., Hori, Y. & Sakurai, K., 5 20 2011, Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011. 86. (Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2011).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

Interactively combining 2D and 3D visualization for network traffic monitoring

Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 12 1 2006, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 123-127 5 p. 1179600. (Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

研究成果: 著書/レポートタイプへの貢献会議での発言

13 引用 (Scopus)

Invalidation of mailing list address to block spam mails

Takahashi, K., Sakai, A. & Sakurai, K., 1 1 2008, Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008. IEEE Computer Society, p. 841-846 6 p. 4780780. (Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008).

研究成果: 著書/レポートタイプへの貢献会議での発言

K2 stream cipher

Kiyomoto, S., Tanaka, T. & Sakurai, K., 12 1 2008, E-business and Telecommunications - 4th International Conference, ICETE 2007, Revised Selected Papers. p. 214-226 13 p. (Communications in Computer and Information Science; 巻数 23 CCIS).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Key distribution scheme using matched filter resistant against DoS attack

Nishi, R., Hori, Y. & Sakurai, K., 9 1 2008, Proceedings - 22nd International Conference on Advanced Information Networking and Applications Workshops/Symposia, AINA 2008. p. 1534-1539 6 p. 4483138. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Lightweight classification of IoT malware based on image recognition

Su, J., Vasconcellos, V. D., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC). 巻 2. p. 664-669 6 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

Lightweight Classification of IoT Malware Based on Image Recognition

Su, J., Danilo Vasconcellos, V., Prasad, S., Daniele, S., Feng, Y. & Sakurai, K., 6 8 2018, Proceedings - 2018 IEEE 42nd Annual Computer Software and Applications Conference, COMPSAC 2018. Demartini, C., Reisman, S., Liu, L., Tovar, E., Takakura, H., Yang, J-J., Lung, C-H., Ahamed, S. I., Hasan, K., Conte, T., Nakamura, M., Zhang, Z., Akiyama, T., Claycomb, W. & Cimato, S. (版). IEEE Computer Society, p. 664-669 6 p. 8377943. (Proceedings - International Computer Software and Applications Conference; 巻数 2).

研究成果: 著書/レポートタイプへの貢献会議での発言

26 引用 (Scopus)

Making hash functions from block ciphers secure and efficient by using convolutional codes

Inoue, T. & Sakurai, K., 1 1 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (版). Springer Verlag, p. 391-404 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1751).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Methodology for evaluating information security countermeasures of a system

Shigematsu, T., Chou, B. H., Hori, Y. & Sakurai, K., 2008, Proceedings of the 2nd International Conference on Information Security and Assurance, ISA 2008. p. 433-438 6 p. 4511606

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Mixed-strategy game based trust management for clustered wireless sensor networks

Hao, D., Adhikari, A. & Sakurai, K., 9 7 2012, Trusted Systems - Third International Conference, INTRUST 2011, Revised Selected Papers. p. 239-257 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7222 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Mobile agent based security monitoring and analysis for the electric power infrastructure

David, M. W. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (版). p. 159-164 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Model-based intrusion detection by abstract interpretation

Hua, J., Nishide, T. & Sakurai, K., 11 29 2010, Proceedings - 2010 10th Annual International Symposium on Applications and the Internet, SAINT 2010. p. 359-362 4 p. 5598041

研究成果: 著書/レポートタイプへの貢献会議での発言

Modeling and containment of search worms targeting web applications

Hua, J. & Sakurai, K., 8 3 2010, Detection of Intrusions and Malware, and Vulnerability Assessment - 7th International Conference, DIMVA 2010, Proceedings. p. 183-199 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 6201 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Monitoring unused IP addresses on segments managed by DHCP

Mizoguchi, S., Hori, Y. & Sakurai, K., 12 26 2008, Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008. p. 510-515 6 p. 4624060. (Proceedings - 4th International Conference on Networked Computing and Advanced Information Management, NCM 2008; 巻数 1).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Multi-user keyword search scheme for secure data sharing with fine-grained access control

Zhao, F., Nishide, T. & Sakurai, K., 8 13 2012, Information Security and Cryptology, ICISC 2011 - 14th International Conference, Revised Selected Papers. p. 406-418 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7259 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

42 引用 (Scopus)

Multivariate signature scheme using quadratic forms

Yasuda, T., Takagi, T. & Sakurai, K., 9 26 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 243-258 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 7932 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

10 引用 (Scopus)

Neural cryptography based on the topology evolving neural networks

Zhu, Y., Vargas, D. V. & Sakurai, K., 12 26 2018, Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018. Institute of Electrical and Electronics Engineers Inc., p. 472-478 7 p. 8590945. (Proceedings - 2018 6th International Symposium on Computing and Networking Workshops, CANDARW 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Neural Cryptography Based on the Topology Evolving Neural Networks

Zhu, Y., Vargas, D. V. & Sakurai, K., 2018, 2018 Sixth International Symposium on Computing and Networking Workshops (CANDARW). p. 472-478 7 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

New semantically secure public-key cryptosystems from the rsa-primitive

Sakurai, K. & Takagi, T., 1 1 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naccache, D. & Paillier, P. (版). Springer Verlag, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 2274).

研究成果: 著書/レポートタイプへの貢献会議での発言

13 引用 (Scopus)

On bit correlations among preimages of “many to one” one-way functions: — A new approach to study on randomness and hardness of one-way functions —

Sakurai, K. & Itoh, T., 1 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (版). Springer Verlag, p. 435-446 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 718 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

On characterizing economic-based incentive-compatible mechanisms to solving hidden information and hidden action in ad hoc network

Wang, Y., Hori, Y. & Sakurai, K., 12 1 2007, Ubiquitous Intelligence and Computing - 4th International Conference, UIC 2007, Proceedings. p. 382-391 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4611 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

One-round protocol for two-party verifier-based password-authenticated key exchange

Kwon, J. O., Sakurai, K. & Lee, D. H., 1 1 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (版). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4237 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling

Okeya, K. & Sakurai, K., 1 1 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (版). Springer Verlag, p. 420-435 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 2384).

研究成果: 著書/レポートタイプへの貢献会議での発言

36 引用 (Scopus)

On-line versus off-line in money-making strategies with brokerage

Dannoura, E. & Sakurai, K., 1 1 1997, Algorithms and Computation - 8th International Symposium, ISAAC 1997, Proceedings. Leong, H. W., Jain, S. & Imai, H. (版). Springer Verlag, p. 173-182 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1350).

研究成果: 著書/レポートタイプへの貢献会議での発言

On revenue driven server management incloud

Zhao, L. & Sakurai, K., 8 16 2012, CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science. p. 295-305 11 p. (CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes

Sakurai, K., 1 1 1995, Computing and Combinatorics - 1st Annual International Conference, COCOON 1995, Proceedings. Du, D-Z., Li, M. & Du, D-Z. (版). Springer Verlag, p. 496-509 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 959).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

On studying front-peer attack-resistant trust and reputation mechanisms based on enhanced spreading activation model in P2P environments

Wang, Y., Hori, Y. & Sakurai, K., 12 1 2007, Advances in Web and Network Technologies, and Information Management - APWeb/WAIM 2007 International Workshops DBMAN 2007, WebETrends 2007, PAIS 2007 and ASWAN 2007, Proceedings. p. 211-216 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4537 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

On studying P2P topology construction based on virtual regions and its effect on search performance

Wang, Y., Wang, W., Sakurai, K. & Hori, Y., 1 1 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1008-1018 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 4159 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

On the application of clique problem for proof-of-work in cryptocurrencies

Bag, S., Ruj, S. & Sakurai, K., 1 1 2016, Information Security and Cryptology - 11th International Conference, Inscrypt 2015, Revised Selected Papers. Lin, D., Wang, X. F. & Yung, M. (版). Springer Verlag, p. 260-279 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9589).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

On the complexity of computational problems associated with simple stochastic games: Extended abstract of COCOON'96

Yanbe, A. & Sakurai, K., 1 1 1996, Computing and Combinatorics - 2nd Annual International Conference, COCOON 1996, Proceedings. Wong, C. K., Wong, C. K. & Cai, J-Y. (版). Springer Verlag, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1090).

研究成果: 著書/レポートタイプへの貢献会議での発言

On the complexity of constant round ZKIP of possession of knowledge

Itoh, T. & Sakurai, K., 1 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (版). Springer Verlag, p. 331-345 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 739 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

On the complexity of hyperelliptic discrete logarithm problem

Shizuya, H., Itoh, T. & Sakurai, K., 1 1 1991, Advances in Cryptology—EUROCRYPT 1991 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Davies, D. W. (版). Springer Verlag, p. 337-351 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 547 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

On the discrepancy between serial and parallel of zero-knowledge protocols

Sakurai, K. & Itoh, T., 1 1 1993, Advances in Cryptology — CRYPTO 1992 - 12th Annual International Cryptology Conference, Proceedings. Brickell, E. F. (版). Springer Verlag, p. 246-259 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 740 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

6 引用 (Scopus)

On the power of multidoubling in speeding up elliptic scalar multiplication

Sakai, Y. & Sakurai, K., 1 1 2001, Selected Areas in Cryptography - 8th Annual International Workshop, SAC 2001, Revised Papers. Vaudenay, S. & Youssef, A. M. (版). Springer Verlag, p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 2259).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

On the robustness of visual cryptographic schemes

Dutta, S., Roy, P. S., Adhikari, A. & Sakurai, K., 1 1 2017, Digital Forensics and Watermarking - 15th International Workshop, IWDW 2016, Revised Selected Papers. Kim, H. J., Liu, F., Perez-Gonzalez, F. & Shi, Y. Q. (版). Springer Verlag, p. 251-262 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10082 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

On the security of a modified paillier public-key primitive

Sakurai, K. & Takagi, T., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Springer Verlag, 巻 2384. p. 436-448 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 2384).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

On the security of SELinux with a simplified policy

Sueyasu, K., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (版). p. 79-84 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

On threshold RSA-signing with no dealer

Miyazaki, S., Sakurai, K. & Yung, M., 1 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (版). Springer Verlag, p. 197-207 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1787).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

On unconditionally binding code-based commitment schemes

Morozov, K., Roy, P. S. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 101. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

2 引用 (Scopus)

On zero-knowledge proofs: "From membership to decision" (extended abstract)

Di Crescenzo, G., Sakurai, K. & Yung, M., 12 1 2000, Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 255-264 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

Over Fp vs. Over F2n and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems

Sakai, Y. & Sakurai, K., 1 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (版). Springer Verlag, p. 82-101 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1787).

研究成果: 著書/レポートタイプへの貢献会議での発言

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow

You, X., Feng, Y. & Sakurai, K., 4 23 2018, Proceedings - 2017 5th International Symposium on Computing and Networking, CANDAR 2017. Institute of Electrical and Electronics Engineers Inc., 巻 2018-January. p. 522-528 7 p.

研究成果: 著書/レポートタイプへの貢献会議での発言

5 引用 (Scopus)

Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units

Tanaka, S., Cheng, C. M., Yasuda, T. & Sakurai, K., 2 27 2015, Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014. Institute of Electrical and Electronics Engineers Inc., p. 543-548 6 p. 7052243. (Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014).

研究成果: 著書/レポートタイプへの貢献会議での発言

Parameter manipulation attack prevention and detection by using web application deception proxy

Ishikawa, T. & Sakurai, K., 1 5 2017, Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017. Association for Computing Machinery, Inc, 74. (Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, IMCOM 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

4 引用 (Scopus)

Performance analysis of key management schemes in wireless sensor network using analytic hierarchy process

Ruan, N., Ren, Y., Hori, Y. & Sakurai, K., 12 1 2011, Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. FCST 2011. p. 1739-1744 6 p. 6121040. (Proc. 10th IEEE Int. Conf. on Trust, Security and Privacy in Computing and Communications, TrustCom 2011, 8th IEEE Int. Conf. on Embedded Software and Systems, ICESS 2011, 6th Int. Conf. on FCST 2011).

研究成果: 著書/レポートタイプへの貢献会議での発言

3 引用 (Scopus)

Performance evaluation of information theoretic secure multi-channel transmission on multihop wireless network

Tsuda, W., Hori, Y. & Sakurai, K., 12 1 2013, Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013. p. 570-574 5 p. 6690949. (Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013).

研究成果: 著書/レポートタイプへの貢献会議での発言

1 引用 (Scopus)

Polymorphic worm detection by analyzing maximum length of instruction sequence in network packets

Tatara, K., Hori, Y. & Sakurai, K., 10 12 2009, Proceedings - International Conference on Availability, Reliability and Security, ARES 2009. p. 972-977 6 p. 5066596. (Proceedings - International Conference on Availability, Reliability and Security, ARES 2009).

研究成果: 著書/レポートタイプへの貢献会議での発言

Power analysis breaks elliptic curve cryptosystems even secure against the timing attack

Okeya, K. & Sakurai, K., 1 1 2000, Progress in Cryptology - INDOCRYPT 2000 - 1st International Conference in Cryptology in India, Proceedings. Roy, B. & Okamoto, E. (版). Springer Verlag, p. 178-190 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1977).

研究成果: 著書/レポートタイプへの貢献会議での発言

74 引用 (Scopus)