• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • 2006

    An RFID system based MCLT system with improved privacy

    Kwak, J., Rhee, K., Park, N., Kim, H., Kim, S., Sakurai, K. & Won, D., 2006, Emerging Directions in Embedded and Ubiquitous Computing - EUC 2006 Workshops: NCUS, SecUbiq, USN, TRUST, ESO, and MSA, Proceedings. Zhou, X., Sokolsky, O., Yan, L., Yan, L., Jung, E-S., Shao, Z., Mu, Y., Lee, D-C., Kim, D., Jeong, Y-S. & Xu, C-Z. (eds.). Springer Verlag, p. 579-590 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4097 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 被引用数 (Scopus)
  • Application and evaluation of Bayesian filter for Chinese spam

    Zhan, W., Hori, Y. & Sakurai, K., 2006, Information Security and Cryptology - Second SKLOIS Conference, Inscrypt 2006, Proceedings. Springer Verlag, Vol. 4318 LNCS. p. 253-263 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4318 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • A proactive secret sharing for server assisted threshold signatures

    Yang, J. P., Rhee, K. H. & Sakurai, K., 1 1 2006, High Performance Computing and Communications - Second International Conference, HPCC 2006, Proceedings. Springer Verlag, p. 250-259 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4208 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    10 被引用数 (Scopus)
  • A proposal of one-time biometric authentication

    Ueshige, Y. & Sakurai, K., 12 1 2006, Proceedings of The 2006 International Conference on Security and Management, SAM'06. (Proceedings of The 2006 International Conference on Security and Management, SAM'06).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • Ciphertext-auditable public key encryption

    Hada, S. & Sakurai, K., 2006, Advances in Information and Computer Security - First International Workshop on Security, IWSEC 2006, Proceedings. Springer Verlag, p. 308-321 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4266 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Design and implementation of an extended reference monitor for trusted operating systems

    Kim, H. C., Shin, W., Ramakrishna, R. S. & Sakurai, K., 2006, Information Security Practice and Experience - Second International Conference, ISPEC 2006, Proceedings. Springer Verlag, p. 235-247 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3903 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Distributing security-mediated PKI revisited

    Yang, J. P., Sakurai, K. & Rhee, K. H., 2006, Public Key Infrastructure: Third European PKI Workshop - Theory and Practice, EuroPKI 2006, Proceedings. Springer Verlag, p. 31-44 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4043 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient password-authenticated key exchange for three-party secure against undetectable on-line dictionary attacks

    Kwon, J. O., Sakurai, K. & Lee, D. H., 1 1 2006, Computational Science - ICCS 2006: 6th International Conference, Proceedings. Springer Verlag, p. 977-980 4 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3991 LNCS - I).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Enhanced privacy in key-exchange protocols by one-time ID

    Imamoto, K. & Sakurai, K., 12 1 2006, Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006. p. 63-68 6 p. 1644279. (Proceedings - Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006; vol. 2006).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Grid based network address space browsing for network traffic visualization

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 1 1 2006, Proceedings of the 2006 IEEE Workshop on Information Assurance. IEEE Computer Society, p. 261-267 7 p. 1652104. (Proceedings of the 2006 IEEE Workshop on Information Assurance; vol. 2006).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Interactively combining 2D and 3D visualization for network traffic monitoring

    Le Malécot, E., Kohara, M., Hori, Y. & Sakurai, K., 12 1 2006, Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 123-127 5 p. 1179600. (Proceedings of the 3rd International Workshop on Visualization for Computer Security, VizSEC'06. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    15 被引用数 (Scopus)
  • One-round protocol for two-party verifier-based password-authenticated key exchange

    Kwon, J. O., Sakurai, K. & Lee, D. H., 1 1 2006, Communications and Multimedia Security - 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Proceedings. Leitold, H. & Markatos, E. (eds.). Springer Verlag, p. 87-96 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4237 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 被引用数 (Scopus)
  • On studying P2P topology construction based on virtual regions and its effect on search performance

    Wang, Y., Wang, W., Sakurai, K. & Hori, Y., 2006, Ubiquitous Intelligence and Computing - Third International Conference, UIC 2006, Proceedings. Springer Verlag, p. 1008-1018 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4159 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

    Hori, Y. & Sakurai, K., 12 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems. 11. (ACM International Conference Proceeding Series; vol. 270).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i

    Hori, Y. & Sakurai, K., 12 1 2006, Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06. 1292344. (Proceedings of the 3rd International Conference on Mobile Technology, Applications and Systems, Mobility '06; vol. 270).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • 2005

    A framework for protecting private information through user-trusted-program and its realizability

    Takahashi, K., Sakurai, K. & Amamiya, M., 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 433-442 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • An evenhanded certified email system for contract signing

    Imamoto, K., Zhou, J. & Sakurai, K., 12 1 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 1-13 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Generic, optimistic, and efficient schemes for fair certified email delivery

    Wang, G., Bao, F., Imamoto, K. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. Springer Verlag, p. 40-52 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Grouping proof for RFID tags

    Saito, J. & Sakurai, K., 12 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. p. 621-624 4 p. 1423764. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    144 被引用数 (Scopus)
  • Group key distribution scheme for reducing required rekey message size

    Nishi, R. & Sakurai, K., 9 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). p. 280-284 5 p. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Program obfuscation scheme using random numbers to complicate control flow

    Toyofuku, T., Tabata, T. & Sakurai, K., 12 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 916-925 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    12 被引用数 (Scopus)
  • Query forwarding algorithm supporting initiator anonymity in GNUnet

    Tatara, K., Hori, Y. & Sakurai, K., 9 1 2005, Proceedings - 11th International Conference on Parallel and Distributed Systems Workshops, ICPADS 2005. Ma, J. & Yang, L. T. (eds.). Vol. 2. p. 235-239 5 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Reassignment scheme of an RFID tag's key for owner transfer

    Saito, J., Imamoto, K. & Sakurai, K., 12 1 2005, Embedded and Ubiquitous Computing - EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Proceedings. p. 1303-1312 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3823 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    43 被引用数 (Scopus)
  • Simple power analysis on fast modular reduction with NIST recommended elliptic curves

    Sakai, Y. & Sakurai, K., 2005, Information and Communications Security - 7th International Conference, ICICS 2005, Proceedings. p. 169-180 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3783 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • Some remarks on security of receipt-free E-auction

    Her, Y. S., Imamoto, K. & Sakurai, K., 2005, Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005. p. 560-563 4 p. 1489023. (Proceedings - 3rd International Conference on Information Technology and Applications, ICITA 2005; vol. II).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Trends and issues for security of home-network based on power line communication

    Nishi, R., Morioka, H. & Sakurai, K., 12 1 2005, Proceedings - 19th International Conference on Advanced Information Networking and Applications, AINA 2005. Vol. 2. p. 655-660 6 p. 1423770

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • 2004

    A design of Diffie-Hellman based key exchange using one-time ID in pre-shared key model

    Imamoto, K. & Sakurai, K., 7 6 2004, Proceedings - 18th International Conference on Advanced Information Networking and Applications, AINA 2004 Volume 1 (Regional Papers). Barolli, L. (ed.). p. 327-332 6 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 1).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • A merging method of certification authorities without using cross-certifications

    Koga, S. & Sakurai, K., 7 7 2004, Proceedings - 18th International conference on Advanced Information Networking and Applications, AINA 2004 Volume 2 (Regional Papers). Barolli, L. (ed.). p. 174-177 4 p. (Proceedings - International Conference on Advanced Information Networking and Application (AINA); vol. 2).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • Protecting the electric power infrastructure with a mobile agent monitoring and analysis system

    David, M. W. & Sakurai, K., 2004, Proceedings - 2004 Iternational Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004. p. 497-498 2 p. (Proceedings - 2004 International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA 2004).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • 2003

    A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks

    Okeya, K. & Sakurai, K., 2003, Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003. Institute of Electrical and Electronics Engineers Inc., p. 175-178 4 p. 1216723. (Proceedings - 2003 IEEE Information Theory Workshop, ITW 2003).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • Certified e-mail systems using public notice board

    Imamoto, K. & Sakurai, K., 1 1 2003, Proceedings - 14th International Workshop on Database and Expert Systems Applications, DEXA 2003. Institute of Electrical and Electronics Engineers Inc., p. 460-464 5 p. 1232065. (Proceedings - International Workshop on Database and Expert Systems Applications, DEXA; vol. 2003-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • Combating cyber terrorism: Countering cyber terrorist advantages of surprise and anonymity

    David, M. W. & Sakurai, K., 2003, Proceedings - 17th International Conference on Advanced Information Networking and Applications, AINA 2003. Institute of Electrical and Electronics Engineers Inc., p. 716-721 6 p. 1192973. (Proceedings - International Conference on Advanced Information Networking and Applications, AINA; vol. 2003-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Evaluation of anti-spam method combining Bayesian filtering and strong challenge and response

    Iwanaga, M., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 214-219 6 p.

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Evaluation of obfuscation scheme focusing on calling relationships of fields and methods in methods

    Fukushima, K., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 108-113 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Mobile agent based security monitoring and analysis for the electric power infrastructure

    David, M. W. & Sakurai, K., 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 159-164 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • On the security of SELinux with a simplified policy

    Sueyasu, K., Tabata, T. & Sakurai, K., 12 1 2003, Proceedings of the IASTED International Conference on Communication, Network, and Information Security. Hamza, M. H. (ed.). p. 79-84 6 p. (Proceedings of the IASTED International Conference on Communication, Network, and Information Security).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • 2002

    A certified E-mail system with receiver’s selective usage of delivery authority

    Imamoto, K. & Sakurai, K., 2002, Progress in Cryptology - INDOCRYPT 2002 - 3rd International Conference on Cryptology in India, Proceedings. Menezes, A. & Sarkar, P. (eds.). Springer Verlag, p. 326-338 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2551).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    22 被引用数 (Scopus)
  • A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks

    Okeya, K., Miyazaki, K. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 428-439 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    26 被引用数 (Scopus)
  • Algorithms for efficient simultaneous elliptic scalar multiplication with reduced joint hamming weight representation of scalars

    Sakai, Y. & Sakurai, K., 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 484-499 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • An IND-CCA2 public-key cryptosystem with fast decryption

    Buchmann, J., Sakurai, K. & Takagi, T., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 51-71 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • A second-order DPA attack breaks a window-method based countermeasure against side channel attacks

    Okeya, K. & Sakurai, K., 1 1 2002, Information Security - 5th International Conference, ISC 2002, Proceedings. Chan, A. H. & Gligor, V. (eds.). Springer Verlag, p. 389-401 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2433).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    26 被引用数 (Scopus)
  • Design and analysis of fast provably secure public-key cryptosystems based on a modular squaring

    Nishioka, M., Satoh, H. & Sakurai, K., 2002, Information Security and Cryptology - ICISC 2001 - 4th International Conference, Proceedings. Kim, K. (ed.). Springer Verlag, p. 81-102 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2288).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    12 被引用数 (Scopus)
  • New semantically secure public-key cryptosystems from the rsa-primitive

    Sakurai, K. & Takagi, T., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Naccache, D. & Paillier, P. (eds.). Springer Verlag, p. 1-16 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    14 被引用数 (Scopus)
  • On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling

    Okeya, K. & Sakurai, K., 1 1 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 420-435 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    37 被引用数 (Scopus)
  • On the security of a modified paillier public-key primitive

    Sakurai, K. & Takagi, T., 2002, Information Security and Privacy - 7th Australasian Conference, ACISP 2002, Proceedings. Batten, L. & Seberry, J. (eds.). Springer Verlag, p. 436-448 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2384).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • Risks with raw-key masking – The security evaluation of 2-key XCBC

    Furuya, S. & Sakurai, K., 2002, Information and Communications Security - 4th International Conference, ICICS 2002, Proceedings. Deng, R., Bao, F., Zhou, J. & Qing, S. (eds.). Springer Verlag, p. 327-341 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2513).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • 2001

    Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the y-coordinate on a montgomery-form elliptic curve

    Okeya, K. & Sakurai, K., 2001, Cryptographic Hardware and Embedded Systems - CHES 2001 - 3rd International Workshop, Proceedings. Koc, C. K., Naccache, D., Paar, C. & Paar, C. (eds.). Springer Verlag, p. 126-141 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2162).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    48 被引用数 (Scopus)
  • English vs. sealed bid in anonymous electronic auction protocols

    Hirakiuchi, D. & Sakurait, K., 1 1 2001, Proceedings - 10th IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WET ICE 2001. IEEE Computer Society, p. 171-176 6 p. 953409. (Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE; vol. 2001-January).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • On the power of multidoubling in speeding up elliptic scalar multiplication

    Sakai, Y. & Sakurai, K., 2001, Selected Areas in Cryptography - 8th Annual International Workshop, SAC 2001, Revised Papers. Vaudenay, S. & Youssef, A. M. (eds.). Springer Verlag, p. 268-283 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2259).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 被引用数 (Scopus)
  • 2000

    A hardware-oriented algorithm for computing in Jacobians and its implementation for hyperelliptic curve cryptosystems

    Tamura, T., Sakurai, K. & Matsumoto, T., 1 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 221-235 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution