Pureに変更を加えた場合、すぐここに表示されます。

研究成果 1991 2020

フィルター
会議での発言
1998
20 引用 (Scopus)

Secure hyperelliptic cryptosystems and their performance

Sakai, Y., Sakurai, K. & Ishizuka, H., 1 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (版). Springer Verlag, p. 164-181 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1431).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptosystem
Cryptography
Curve
Jacobian Varieties
Discrete Logarithm Problem
3 引用 (Scopus)

Security issues for contactless smart cards

David, M. W. & Sakurai, K., 1 1 1998, Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings. Zheng, Y. & Imai, H. (版). Springer Verlag, p. 247-252 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1431).

研究成果: 著書/レポートタイプへの貢献会議での発言

Smart cards
Smart Card
Standardization
Encryption
Cryptography
1997
3 引用 (Scopus)

Improving linear cryptanalysis of LOKI91 by probabilistic counting method

Sakurai, K. & Furuya, S., 1 1 1997, Fast Software Encryption - 4th International Workshop, FSE 1997, Proceedings. Biham, E. (版). Springer Verlag, p. 114-133 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1267).

研究成果: 著書/レポートタイプへの貢献会議での発言

Linear Cryptanalysis
Counting
Attack
S-box
Maximum likelihood

On-line versus off-line in money-making strategies with brokerage

Dannoura, E. & Sakurai, K., 1 1 1997, Algorithms and Computation - 8th International Symposium, ISAAC 1997, Proceedings. Leong, H. W., Jain, S. & Imai, H. (版). Springer Verlag, p. 173-182 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1350).

研究成果: 著書/レポートタイプへの貢献会議での発言

Line
Competitive Ratio
Strategy
Money
Lower bound

Protection of data and delegated keys in digital distribution

Mambo, M., Okamoto, E. & Sakurai, K., 1 1 1997, Information Security and Privacy -2nd Australasian Conference, ACISP 1997, Proceedings. Pieprzyk, J., Varadharajan, V. & Mu, Y. (版). Springer Verlag, p. 271-282 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1270).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Encryption
Information Systems
Distribution System
Cryptosystem
1996

A hidden cryptographic assumption in no-transferable indentification schemes

Sakurai, K., 1 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Springer Verlag, p. 159-172 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1163).

研究成果: 著書/レポートタイプへの貢献会議での発言

Soundness
Zero-knowledge
Identification Scheme
Restriction
9 引用 (Scopus)

A progress report on subliminal-free channels

Burmester, M., Desraedt, Y. G., Itoh, T., Sakurai, K., Shizuya, H. & Yung, M., 1 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (版). Springer Verlag, p. 157-168 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1174).

研究成果: 著書/レポートタイプへの貢献会議での発言

Authentication
Cryptography
Randomness
Communication
Zero-knowledge
19 引用 (Scopus)

Blind decoding, blind undeniable signatures, and their applications to privacy protection

Sakurai, K. & Yamane, Y., 1 1 1996, Information Hiding - 1st International Workshop, Proceedings. Anderson, R. (版). Springer Verlag, p. 257-264 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1174).

研究成果: 著書/レポートタイプへの貢献会議での発言

Undeniable Signature
Blind Signature
Privacy Protection
Decoding
Servers

Cryptographic weaknesses in the round transformation used in a block cipher with provable immunity against linear cryptanalysis

Sakurai, K. & Zheng, Y., 1 1 1996, Algorithms and Computation - 7th International Symposium, ISAAC 1996, Proceedings. Nagamochi, H., Miyano, S., Asano, T., Igarashi, Y. & Suri, S. (版). Springer Verlag, p. 376-385 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1178).

研究成果: 著書/レポートタイプへの貢献会議での発言

Linear Cryptanalysis
Block Cipher
Immunity
Cryptography
Transform
9 引用 (Scopus)

How to utilize the transformability of digital signatures for solving the oracle problem

Mambo, M., Sakurai, K. & Okamoto, E., 1 1 1996, Advances in Cryptology ─ ASIACRYPT 1996 - International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings. Kim, K. & Matsumoto, T. (版). Springer Verlag, p. 322-333 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1163).

研究成果: 著書/レポートタイプへの貢献会議での発言

Electronic document identification systems
Digital Signature
Decoding
Blind Signature
Signature

On the complexity of computational problems associated with simple stochastic games: Extended abstract of COCOON'96

Yanbe, A. & Sakurai, K., 1 1 1996, Computing and Combinatorics - 2nd Annual International Conference, COCOON 1996, Proceedings. Wong, C. K., Wong, C. K. & Cai, J-Y. (版). Springer Verlag, p. 310-322 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 1090).

研究成果: 著書/レポートタイプへの貢献会議での発言

Simple Game
Stochastic Games
Computational complexity
Optimal Strategy
Two-person Games
1995
1 引用 (Scopus)

On separating proofs of knowledge from proofs of membership of languages and its application to secure identification schemes

Sakurai, K., 1 1 1995, Computing and Combinatorics - 1st Annual International Conference, COCOON 1995, Proceedings. Du, D-Z., Li, M. & Du, D-Z. (版). Springer Verlag, p. 496-509 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 959).

研究成果: 著書/レポートタイプへの貢献会議での発言

Identification Scheme
Soundness
Knowledge
Language
1993
4 引用 (Scopus)

4 move perfect ZKIP of knowledge with no assumption

Saito, T., Kurosawa, K. & Sakurai, K., 1 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (版). Springer Verlag, p. 321-330 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 739 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Networks (circuits)
Tail
Knowledge
Language
6 引用 (Scopus)

Any language in IP has a divertible ZKIP

Itoh, T., Sakurai, K. & Shizuya, H., 1 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (版). Springer Verlag, p. 382-396 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 739 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Interactive Proof Systems
Zero-knowledge Proof
Cryptography
Homomorphisms
Encryption
3 引用 (Scopus)

How intractable is the discrete logarithm for a general finite group?

Okamoto, T., Sakurai, K. & Shizuya, H., 1 1 1993, Advances in Cryptology – EUROCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Rueppel, R. A. (版). Springer Verlag, p. 420-428 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 658 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Discrete Logarithm
Polynomial time
Finite Group
Polynomials
Computational complexity

On bit correlations among preimages of “many to one” one-way functions: — A new approach to study on randomness and hardness of one-way functions —

Sakurai, K. & Itoh, T., 1 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (版). Springer Verlag, p. 435-446 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 718 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Many to one
One-way Function
Hardness
Randomness
Discrete Logarithm
5 引用 (Scopus)

On the complexity of constant round ZKIP of possession of knowledge

Itoh, T. & Sakurai, K., 1 1 1993, Advances in Cryptology ─ ASIACRYPT 1991 - International Conference on the Theory and Application of Cryptology, Proceedings. Imai, H., Matsumoto, T. & Rivest, R. L. (版). Springer Verlag, p. 331-345 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 739 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Interactive Proof Systems
Zero-knowledge Proof
Black Box
Perfect Simulation
L'Hôpital's Rule
6 引用 (Scopus)

On the discrepancy between serial and parallel of zero-knowledge protocols

Sakurai, K. & Itoh, T., 1 1 1993, Advances in Cryptology — CRYPTO 1992 - 12th Annual International Cryptology Conference, Proceedings. Brickell, E. F. (版). Springer Verlag, p. 246-259 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 740 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Zero-knowledge
Discrepancy
2 引用 (Scopus)

Subliminal channels for signature transfer and their application to signature distribution schemes

Sakurai, K. & Itoh, T., 1 1 1993, Advances in Cryptology ― AUSCRYPT 1992 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Seberry, J. & Zheng, Y. (版). Springer Verlag, p. 231-243 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 718 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Signature Verification
Identification Scheme
Signature
Network protocols
One-way Function
1992
5 引用 (Scopus)

Efficient algorithms for the construction of hyperelliptic cryptosystems

Okamoto, T. & Sakurai, K., 1 1 1992, Advances in Cryptology — CRYPTO 1991, Proceedings. Feigenbaum, J. (版). Springer Verlag, p. 267-278 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 576 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptosystem
Discrete Logarithm
Cryptography
Efficient Algorithms
Multiplicative
1991
5 引用 (Scopus)

On the complexity of hyperelliptic discrete logarithm problem

Shizuya, H., Itoh, T. & Sakurai, K., 1 1 1991, Advances in Cryptology—EUROCRYPT 1991 - Workshop on the Theory and Application of Cryptographic Techniques, Proceedings. Davies, D. W. (版). Springer Verlag, p. 337-351 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 547 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Discrete Logarithm Problem
Computational complexity
Complexity Theory
Elliptic Curves
Galois field