Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2023

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
会議への寄与

検索結果

  • 2015

    Hybrid encryption scheme using terminal fingerprint and its application to attribute-based encryption without key misuse

    Chen, C., Anada, H., Kawamoto, J. & Sakurai, K., 2015, Information and Communication Technology - 3rd IFIP TC 5/8 International Conference, ICT-EurAsia 2015 and 9th IFIP WG 8.9 Working Conference, CONFENIS 2015 Held as Part of WCC 2015, Proceedings. You, I., Xu, L. D., Neuhold, E., Tjoa, A. M. & Khalil, I. (eds.). Springer Verlag, p. 255-264 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9357).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Identity-embedding method for decentralized public-key infrastructure

    Anada, H., Kawamoto, J., Weng, J. & Sakurai, K., 2015, Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers. Yung, M., Zhu, L. & Yang, Y. (eds.). Springer Verlag, p. 1-14 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9473).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Parallelization of QUAD stream cipher using linear recurring sequences on graphics processing units

    Tanaka, S., Cheng, C. M., Yasuda, T. & Sakurai, K., 2月 27 2015, Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014. Institute of Electrical and Electronics Engineers Inc., p. 543-548 6 p. 7052243. (Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Privacy-aware cloud-based input method editor

    Kawamoto, J. & Sakurai, K., 1月 12 2015, 2014 IEEE/CIC International Conference on Communications in China, ICCC 2014. Institute of Electrical and Electronics Engineers Inc., p. 209-213 5 p. 7008273. (2014 IEEE/CIC International Conference on Communications in China, ICCC 2014).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones

    Teraura, N. & Sakurai, K., 9月 14 2015, 2015 7th International Conference on New Technologies, Mobility and Security - Proceedings of NTMS 2015 Conference and Workshops. Institute of Electrical and Electronics Engineers Inc., 7266514

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    7 被引用数 (Scopus)
  • Reconstructing and visualizing evidence of artifact from firefox sessionstorage

    Matsumoto, S., Onitsuka, Y., Kawamoto, J. & Sakurai, K., 2015, Information Security Applications - 15th International Workshop, WISA 2014, Revised Selected Papers. Rhee, K-H. & Yi, J. H. (eds.). Springer Verlag, p. 83-94 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8909).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Securing sensor networks by moderating frequencies

    Sarkar, P., Mahish, P., Chowdhury, M. U. & Sakurai, K., 2015, International Conference on Security and Privacy in Communication Networks - 10th International ICST Conference, SecureComm 2014, Revised Selected Papers. Srivatsa, M., Tian, J. & Jing, J. (eds.). Springer Verlag, p. 173-185 13 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 153).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • 2014

    Acquisition of evidence of web storage in HTML5 web browsers from memory image

    Matsumoto, S. & Sakurai, K., 1月 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 148-155 8 p. 7023253. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    8 被引用数 (Scopus)
  • An efficient robust secret sharing scheme with optimal cheater resiliency

    Roy, P. S., Adhikari, A., Xu, R., Morozov, K. & Sakurai, K., 2014, Security, Privacy, and Applied Cryptography Engineering - 4th International Conference, SPACE 2014, Proceedings. Chakraborty, R. S., Matyas, V. & Schaumont, P. (eds.). Springer Verlag, p. 47-58 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8804).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    7 被引用数 (Scopus)
  • A parameterless learning algorithm for behavior-based detection

    Wang, C., Feng, Y., Kawamoto, J., Hori, Y. & Sakurai, K., 1月 26 2014, Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014. Institute of Electrical and Electronics Engineers Inc., p. 11-18 8 p. 7023233. (Proceedings - 2014 9th Asia Joint Conference on Information Security, AsiaJCIS 2014).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Attribute-based signatures without pairings via the Fiat-Shamir paradigm

    Anada, H., Arita, S. & Sakurai, K., 1月 1 2014, ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography. Association for Computing Machinery, p. 49-58 10 p. (ASIAPKC 2014 - Proceedings of the 2nd ACM Workshop on ASIA Public-Key Cryptography).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    10 被引用数 (Scopus)
  • A zero-watermarking-like steganography and potential applications

    Ishizuka, H., Echizen, I., Iwamura, K. & Sakurai, K., 12月 24 2014, Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014. Watada, J., Ito, A., Pan, J-S., Chao, H-C. & Chen, C-M. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 459-462 4 p. 6998367. (Proceedings - 2014 10th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2014).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    8 被引用数 (Scopus)
  • Efficient variant of rainbow without triangular matrix representation

    Yasuda, T., Takagi, T. & Sakurai, K., 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 532-541 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    8 被引用数 (Scopus)
  • Evaluation of the identity and compatibility of multi-valued cells in two-dimensional codes using smartphones

    Teraura, N. & Sakurai, K., 12月 5 2014, Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014. Institute of Electrical and Electronics Engineers Inc., p. 252-259 8 p. 6978618. (Proceedings - IEEE 7th International Conference on Service-Oriented Computing and Applications, SOCA 2014).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • Fine-grained conditional proxy re-encryption and application

    Yang, Y., Lu, H., Weng, J., Zhang, Y. & Sakurai, K., 2014, Provable Security - 8th International Conference, ProvSec 2014, Proceedings. Chow, S. S. M., Liu, J. K., Hui, L. C. K. & Yiu, S. M. (eds.). Springer Verlag, p. 206-222 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8782).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    23 被引用数 (Scopus)
  • Implementation of efficient operations over GF(232) using graphics processing units

    Tanaka, S., Yasuda, T. & Sakurai, K., 2014, Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Proceedings. Springer Verlag, p. 602-611 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8407 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Security model and analysis of fhmqv, Revisited

    Liu, S., Sakurai, K., Weng, J., Zhang, F., Zhao, Y. & Zhao, Y., 1月 1 2014, Information Security and Cryptology - 9th International Conference, Inscrypt 2013, Revised Selected Papers. Yung, M., Lin, D., Xu, S. & Yung, M. (eds.). Springer Verlag, p. 255-269 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8567).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • Survey and new idea for attribute-based identification scheme secure against reset attacks

    Chin, J. J., Anada, H., Arita, S., Sakurai, K., Heng, S. H. & Phan, R., 2014, Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014. Wahab, A. W. A., Haili, H. K., Chin, J-J., Mohamad, M. S., Latip, S. F. A., Ang, M. H., Za'ba, M. R., Ariffin, M. R. K., Yunos, F., Heng, S-H., Goi, B. M., Ahmad, R., Pan, Y. & Said, M. R. M. (eds.). Institute for Mathematical Research (INSPEM), p. 39-47 9 p. (Conference Proceedings - Cryptology 2014: Proceedings of the 4th International Cryptology and Information Security Conference 2014).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Towards "receipt-freeness" in remote biometric authentication

    Ueshige, Y. & Sakurai, K., 12月 11 2014, Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014. Institute of Electrical and Electronics Engineers Inc., p. 8-12 5 p. 6982766. (Proceedings - 2014 International Conference on Emerging Security Technologies, EST 2014).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • 2013

    Analysis of methods for detecting compromised nodes and its countermeasures

    Zhao, F., Nishide, T., Hori, Y. & Sakurai, K., 2013, IT Convergence and Security 2012. p. 53-60 8 p. (Lecture Notes in Electrical Engineering; vol. 215 LNEE).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • A proposal for the privacy leakage verification tool for android application developers

    Matsumoto, S. & Sakurai, K., 4月 10 2013, Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013. 54. (Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, ICUIMC 2013).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    9 被引用数 (Scopus)
  • A variant of rainbow with shorter secret key and faster signature generation

    Yasuda, T., Ding, J., Takagi, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 57-62 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    10 被引用数 (Scopus)
  • Detecting HTTP-based botnet based on characteristic of the C&C session using by SVM

    Yamauchi, K., Hori, Y. & Sakurai, K., 1月 1 2013, Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013. IEEE Computer Society, p. 63-68 6 p. 6621653. (Proceedings - 2013 8th Asia Joint Conference on Information Security, AsiaJCIS 2013).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • Detection of android API call using logging mechanism within android framework

    Nishimoto, Y., Kajiwara, N., Matsumoto, S., Hori, Y. & Sakurai, K., 2013, Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Springer Verlag, p. 393-404 12 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 127 LNICST).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    11 被引用数 (Scopus)
  • Efficient computing over GF(216) using graphics processing unit

    Tanaka, S., Yasuda, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 10月 17 2013, Proceedings - 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2013. p. 843-846 4 p. 6603790

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Image splicing verification based on pixel-based alignment method

    Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 9月 3 2013, Digital Forensics and Watermaking - 11th International Workshop, IWDW 2012, Revised Selected Papers. p. 198-212 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7809 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud

    Zhao, L. & Sakurai, K., 1月 1 2013, Cloud Computing and Services Science - 2nd International Conference, CLOSER 2012, Revised Selected Papers. Springer Verlag, p. 23-38 16 p. (Communications in Computer and Information Science; vol. 367 CCIS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Multivariate signature scheme using quadratic forms

    Yasuda, T., Takagi, T. & Sakurai, K., 2013, Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Proceedings. p. 243-258 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7932 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    12 被引用数 (Scopus)
  • Performance evaluation of information theoretic secure multi-channel transmission on multihop wireless network

    Tsuda, W., Hori, Y. & Sakurai, K., 2013, Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013. p. 570-574 5 p. 6690949. (Proceedings - 2013 8th International Conference on Broadband, Wireless Computing, Communication and Applications, BWCCA 2013).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Secure and privacy preserving hierarchical wireless sensor networks using hybrid key management technique

    Ruj, S. & Sakurai, K., 2013, 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., p. 402-407 6 p. 6831104. (GLOBECOM - IEEE Global Telecommunications Conference).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    5 被引用数 (Scopus)
  • Supporting secure provenance update by keeping "provenance" of the provenance

    Syalim, A., Nishide, T. & Sakurai, K., 2013, Information and Communication Technology - International Conference, ICT-EurAsia 2013, Proceedings. p. 363-372 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7804 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    Open Access
  • The development of radiation-resistant rf TAGS for use at nuclear power plants

    Teraura, N., Ito, K., Takahashi, N. & Sakurai, K., 1月 1 2013, Plant Operations, Maintenance, Engineering, Modifications, Life Cycle and Balance of Plant; Nuclear Fuel and Materials; Radiation Protection and Nuclear Technology Applications. American Society of Mechanical Engineers (ASME), V001T01A043. (International Conference on Nuclear Engineering, Proceedings, ICONE; vol. 1).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    4 被引用数 (Scopus)
  • Upper bound of the length of information embedd in RSA public key efficiently

    Kitahara, M., Yasuda, T., Nishide, T. & Sakurai, K., 2013, AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography. p. 33-38 6 p. (AsiaPKC 2013 - Proceedings of the 1st ACM Workshop on Asia Public-Key Cryptography).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • 2012

    A behavior-based detection method for outbreaks of low-rate attacks

    Feng, Y., Hori, Y., Sakurai, K. & Takeuchi, J., 2012, Proceedings - 2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet, SAINT 2012. p. 267-272 6 p. 6305296

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    7 被引用数 (Scopus)
  • Adaptive and composable non-interactive string-commitment protocols

    Zhu, H., Araragi, T., Nishide, T. & Sakurai, K., 3月 2 2012, e-Business and Telecommunications - 7th International Joint Conference, ICETE 2010, Revised Selected Papers. p. 233-242 10 p. (Communications in Computer and Information Science; vol. 222 CCIS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • A differential game approach to mitigating primary user emulation attacks in cognitive radio networks

    Hao, D. & Sakurai, K., 5月 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications, AINA 2012. p. 495-502 8 p. 6184911. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    23 被引用数 (Scopus)
  • A method for embedding secret key information in RSA public key and its application

    Kitahara, M., Nishide, T. & Sakurai, K., 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 665-670 6 p. 6296934. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    4 被引用数 (Scopus)
  • Analysis and improvement of privacy-preserving frequent item protocol for accountable computation framework

    Su, C., Wang, G. & Sakurai, K., 11月 5 2012, Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012. p. 1012-1017 6 p. 6296084. (Proc. of the 11th IEEE Int. Conference on Trust, Security and Privacy in Computing and Communications, TrustCom-2012 - 11th IEEE Int. Conference on Ubiquitous Computing and Communications, IUCC-2012).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • An image splicing detection based on interpolation analysis

    Ciptasari, R. W., Rhee, K. H. & Sakurai, K., 12月 27 2012, Advances in Multimedia Information Processing, PCM 2012 - 13th Pacific-Rim Conference on Multimedia, Proceedings. p. 390-401 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7674 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • Application of scalar multiplication of edwards curves to pairing-based cryptography

    Yasuda, T., Takagi, T. & Sakurai, K., 2012, Advances in Information and Computer Security - 7th International Workshop on Security, IWSEC 2012, Proceedings. Vol. 7631 LNCS. p. 19-36 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7631 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Barrier: A lightweight hypervisor for protecting kernel integrity via memory isolation

    Hua, J. & Sakurai, K., 2012, 27th Annual ACM Symposium on Applied Computing, SAC 2012. p. 1470-1477 8 p. (Proceedings of the ACM Symposium on Applied Computing).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    9 被引用数 (Scopus)
  • Collaborative behavior visualization and its detection by observing darknet traffic

    Akimoto, S., Hori, Y. & Sakurai, K., 12月 26 2012, Cyberspace Safety and Security - 4th International Symposium, CSS 2012, Proceedings. p. 212-226 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7672 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • Communication-efficient anonymous routing protocol for wireless sensor networks using single path tree topology

    Nakamura, S., Hori, Y. & Sakurai, K., 5月 14 2012, Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012. p. 766-771 6 p. 6185487. (Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    3 被引用数 (Scopus)
  • Cooperatively securing network coding against pollution attacks with incentive mechanism

    Xu, Y. & Sakurai, K., 5月 8 2012, Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, ICUIMC'12. 52

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    4 被引用数 (Scopus)
  • Cryptanalysis of randomized arithmetic codes based on markov model

    Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. Wu, C-K., Lin, D. & Yung, M. (eds.). Springer Verlag, p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

  • Cryptanalysis of randomized arithmetic codes based on markov model

    Zhao, L., Nishide, T., Adhikari, A., Rhee, K. H. & Sakurai, K., 11月 5 2012, Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Revised Selected Papers. p. 341-362 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7537 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Differential fault analysis of full lblock

    Zhao, L., Nishide, T. & Sakurai, K., 6月 15 2012, Constructive Side-Channel Analysis and Secure Design - Third International Workshop, COSADE 2012, Proceedings. p. 135-150 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7275 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    17 被引用数 (Scopus)
  • Efficient implementation of evaluating multivariate quadratic system with GPUs

    Tanaka, S., Nishide, T. & Sakurai, K., 10月 26 2012, Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012. p. 660-664 5 p. 6296933. (Proceedings - 6th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2012).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    2 被引用数 (Scopus)
  • Efficient parallel evaluation of multivariate quadratic polynomials on GPUs

    Tanaka, S., Chou, T., Yang, B. Y., Cheng, C. M. & Sakurai, K., 1月 1 2012, Information Security Applications - 13th International Workshop, WISA 2012, Revised Selected Papers. Lee, D. H. & Yung, M. (eds.). Springer Verlag, p. 28-42 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7690 LNCS).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    1 被引用数 (Scopus)
  • Information hiding in subcells of a two-dimensional code

    Teraura, N. & Sakurai, K., 12月 1 2012, 1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012. p. 652-656 5 p. 6379943. (1st IEEE Global Conference on Consumer Electronics 2012, GCCE 2012).

    研究成果: 書籍/レポート タイプへの寄稿会議への寄与

    8 被引用数 (Scopus)