• 出典: Scopus
  • Pureの文献数とScopusの被引用数に基づいて算出されます
1991 …2021

年別の研究成果

Pureに変更を加えた場合、すぐここに表示されます。
フィルター
Conference contribution

検索結果

  • 2000

    An anonymous electronic bidding protocol Based on a new convertible group signature scheme-on the importance of hiding the winner’s identity against bid-rigging-

    Sakurai, K. & Miyazaki, S., 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 385-399 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    48 被引用数 (Scopus)
  • Efficient scalar multiplications on elliptic curves without repeated doublings and their practical performance

    Sakai, Y. & Sakurai, K., 1 1 2000, Information Security and Privacy - 5th Australasian Conference, ACISP 2000, Proceedings. Dawson, E., Clark, A. & Boyd, C. (eds.). Springer Verlag, p. 59-73 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1841).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    8 被引用数 (Scopus)
  • Elliptic curves with the montgomery-form and their cryptographic applications

    Okeya, K., Kurumatani, H. & Sakurai, K., 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 238-257 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    56 被引用数 (Scopus)
  • Making hash functions from block ciphers secure and efficient by using convolutional codes

    Inoue, T. & Sakurai, K., 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 391-404 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 被引用数 (Scopus)
  • On threshold RSA-signing with no dealer

    Miyazaki, S., Sakurai, K. & Yung, M., 1 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 197-207 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • On zero-knowledge proofs: "From membership to decision" (extended abstract)

    Di Crescenzo, G., Sakurai, K. & Yung, M., 12 1 2000, Proceedings of the 32nd Annual ACM Symposium on Theory of Computing, STOC 2000. p. 255-264 10 p. (Proceedings of the Annual ACM Symposium on Theory of Computing).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • Over Fp vs. Over F2n and on pentium vs. on alpha in software implementation of hyperelliptic curve cryptosystems

    Sakai, Y. & Sakurai, K., 1 1 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Song, J. (ed.). Springer Verlag, p. 82-101 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Power analysis breaks elliptic curve cryptosystems even secure against the timing attack

    Okeya, K. & Sakurai, K., 2000, Progress in Cryptology - INDOCRYPT 2000 - 1st International Conference in Cryptology in India, Proceedings. Roy, B. & Okamoto, E. (eds.). Springer Verlag, p. 178-190 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1977).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    79 被引用数 (Scopus)
  • 1999

    Toward fair international key escrow: An attempt by distributed trusted third agencies with threshold cryptography

    Miyazaki, S., Kuroda, I. & Sakurai, K., 1999, Public Key Cryptography - 2nd International Workshop on Practice and Theory in Public Key Cryptography, PKC 1999, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 171-187 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1560).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • 1998

    A more efficient untraceable e-cash system with partially blind signatures based on the discrete logarithm problem

    Miyazaki, S. & Sakurai, K., 1998, Financial Cryptography - 2nd International Conference, FC 1998, Proceedings. Hirschfeld, R. (ed.). Springer Verlag, p. 295-308 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1465).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    7 被引用数 (Scopus)
  • Checking programs discreetly: Demonstrating result-correctness efficiently while concealing it

    Di Crescenzo, G., Sakurai, K. & Yung, M., 1998, Algorithms and Computation - 9th International Symposium, ISAAC'98, Proceedings. Springer Verlag, p. 59-71 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1533 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n

    Sakai, Y. & Sakurai, K., 1998, Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Ohta, K. & Pei, D. (eds.). Springer Verlag, p. 80-94 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1514).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    20 被引用数 (Scopus)
  • Result-indistinguishable zero-knowledge proofs: Increased power and constant-round protocols

    Di Crescenzo, G., Sakurai, K. & Yung, M., 1998, STACS 98 - 15th Annual Symposium on Theoretical Aspects of Computer Science, Proceedings. p. 511-521 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1373 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure hyperelliptic cryptosystems and their performance

    Sakai, Y., Sakurai, K. & Ishizuka, H., 1 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 164-181 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    20 被引用数 (Scopus)
  • Security issues for contactless smart cards

    David, M. W. & Sakurai, K., 1 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (eds.). Springer Verlag, p. 247-252 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1431).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • 1997

    Improving linear cryptanalysis of LOKI91 by probabilistic counting method

    Sakurai, K. & Furuya, S., 1997, Fast Software Encryption - 4th International Workshop, FSE 1997, Proceedings. Biham, E. (ed.). Springer Verlag, p. 114-133 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1267).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 被引用数 (Scopus)
  • On-line versus off-line in money-making strategies with brokerage

    Dannoura, E. & Sakurai, K., 1 1 1997, Algorithms and Computation - 8th International Symposium, ISAAC 1997, Proceedings. Leong, H. W., Jain, S. & Imai, H. (eds.). Springer Verlag, p. 173-182 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1350).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • Protection of data and delegated keys in digital distribution

    Mambo, M., Okamoto, E. & Sakurai, K., 1 1 1997, Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings. Pieprzyk, J., Varadharajan, V. & Mu, Y. (eds.). Springer Verlag, p. 271-282 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1270).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • 1996

    A hidden cryptographic assumption in no-transferable indentification schemes

    Sakurai, K., 1 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (eds.). Springer Verlag, p. 159-172 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • A progress report on subliminal-free channels

    Burmester, M., Desraedt, Y. G., Itoh, T., Sakurai, K., Shizuya, H. & Yung, M., 1 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 157-168 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    11 被引用数 (Scopus)
  • Blind decoding, blind undeniable signatures, and their applications to privacy protection

    Sakurai, K. & Yamane, Y., 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (ed.). Springer Verlag, p. 257-264 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1174).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    22 被引用数 (Scopus)
  • Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis

    Sakurai, K. & Zheng, Y., 1996, Algorithms and Computation - 7th International Symposium, ISAAC 1996, Proceedings. Asano, T., Igarashi, Y., Nagamochi, H., Miyano, S. & Suri, S. (eds.). Springer Verlag, p. 376-385 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1178).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • How to utilize the transformability of digital signatures for solving the oracle problem

    Mambo, M., Sakurai, K. & Okamoto, E., 1 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (eds.). Springer Verlag, p. 322-333 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1163).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    9 被引用数 (Scopus)
  • On the complexity of computational problems associated with simple stochastic games: Extended abstract of COCOON'96

    Yanbe, A. & Sakurai, K., 1996, Computing and Combinatorics - 2nd Annual International Conference, COCOON 1996, Proceedings. Cai, J-Y., Wong, C. K. & Wong, C. K. (eds.). Springer Verlag, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1090).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • 1995

    On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes

    Sakurai, K., 1 1 1995, Computing and Combinatorics - 1st Annual International Conference, COCOON 1995, Proceedings. Du, D-Z., Li, M. & Du, D-Z. (eds.). Springer Verlag, p. 496-509 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 959).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    1 被引用数 (Scopus)
  • 1993

    4 move perfect ZKIP of knowledge with no assumption

    Saito, T., Kurosawa, K. & Sakurai, K., 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    4 被引用数 (Scopus)
  • Any language in IP has a divertible ZKIP

    Itoh, T., Sakurai, K. & Shizuya, H., 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 382-396 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    6 被引用数 (Scopus)
  • How intractable is the discrete logarithm for a general finite group?

    Okamoto, T., Sakurai, K. & Shizuya, H., 1 1 1993, Advances in Cryptology – EUROCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Rueppel, R. A. (ed.). Springer Verlag, p. 420-428 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 658 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    3 被引用数 (Scopus)
  • On bit correlations among preimages of “many to one” one-way functions: — A new approach to study on randomness and hardness of one-way functions —

    Sakurai, K. & Itoh, T., 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 435-446 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

  • On the complexity of constant round ZKIP of possession of knowledge

    Itoh, T. & Sakurai, K., 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (eds.). Springer Verlag, p. 331-345 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 739 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)
  • On the discrepancy between serial and parallel of zero-knowledge protocols

    Sakurai, K. & Itoh, T., 1993, Advances in Cryptology — CRYPTO 1992 - 12th Annual International Cryptology Conference, Proceedings. Brickell, E. F. (ed.). Springer Verlag, p. 246-259 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 740 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    6 被引用数 (Scopus)
  • Subliminal channels for signature transfer and their application to signature distribution schemes

    Sakurai, K. & Itoh, T., 1 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (eds.). Springer Verlag, p. 231-243 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 718 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    2 被引用数 (Scopus)
  • 1992

    Efficient algorithms for the construction of hyperelliptic cryptosystems

    Okamoto, T. & Sakurai, K., 1992, Advances in Cryptology — CRYPTO 1991, Proceedings. Feigenbaum, J. (ed.). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 576 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 被引用数 (Scopus)
  • 1991

    On the complexity of hyperelliptic discrete logarithm problem

    Shizuya, H., Itoh, T. & Sakurai, K., 1991, Advances in Cryptology—EUROCRYPT 1991 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Davies, D. W. (ed.). Springer Verlag, p. 337-351 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 547 LNCS).

    研究成果: Chapter in Book/Report/Conference proceedingConference contribution

    5 被引用数 (Scopus)