default search action
BibTeX records: Kaoru Kurosawa
@inproceedings{DBLP:conf/eurocrypt/EriguchiKN24, author = {Reo Eriguchi and Kaoru Kurosawa and Koji Nuida}, editor = {Marc Joye and Gregor Leander}, title = {Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}}, series = {Lecture Notes in Computer Science}, volume = {14655}, pages = {92--121}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-58740-5\_4}, doi = {10.1007/978-3-031-58740-5\_4}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/EriguchiKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EriguchiKN24, author = {Reo Eriguchi and Kaoru Kurosawa and Koji Nuida}, title = {Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2024}, url = {https://eprint.iacr.org/2024/375}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EriguchiKN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EriguchiKN23, author = {Reo Eriguchi and Kaoru Kurosawa and Koji Nuida}, title = {New Generic Constructions of Error-Correcting {PIR} and Efficient Instantiations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {210}, year = {2023}, url = {https://eprint.iacr.org/2023/210}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/EriguchiKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/TomitaOK22, author = {Toi Tomita and Wakaha Ogata and Kaoru Kurosawa}, title = {Boosting {CPA} to {CCA2} for Leakage-Resilient Attribute-Based Encryption by Using New {QA-NIZK}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {3}, pages = {143--159}, year = {2022}, url = {https://doi.org/10.1587/transfun.2021cip0003}, doi = {10.1587/TRANSFUN.2021CIP0003}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/TomitaOK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/EriguchiKN22, author = {Reo Eriguchi and Kaoru Kurosawa and Koji Nuida}, editor = {Dana Dachman{-}Soled}, title = {Multi-Server {PIR} with Full Error Detection and Limited Error Correction}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {1:1--1:20}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.1}, doi = {10.4230/LIPICS.ITC.2022.1}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/EriguchiKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/EriguchiKN22, author = {Reo Eriguchi and Kaoru Kurosawa and Koji Nuida}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {On the Optimal Communication Complexity of Error-Correcting Multi-server {PIR}}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13749}, pages = {60--88}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22368-6\_3}, doi = {10.1007/978-3-031-22368-6\_3}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tcc/EriguchiKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EriguchiKN22, author = {Reo Eriguchi and Kaoru Kurosawa and Koji Nuida}, title = {Multi-Server {PIR} with Full Error Detection and Limited Error Correction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2022}, url = {https://eprint.iacr.org/2022/500}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EriguchiKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EriguchiKN22a, author = {Reo Eriguchi and Kaoru Kurosawa and Koji Nuida}, title = {On the Optimal Communication Complexity of Error-Correcting Multi-Server {PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1206}, year = {2022}, url = {https://eprint.iacr.org/2022/1206}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EriguchiKN22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DaizaK21, author = {Takanori Daiza and Kaoru Kurosawa}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Optimum Attack on 3-Round Feistel-2 Structure}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {175--192}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_10}, doi = {10.1007/978-3-030-85987-9\_10}, timestamp = {Fri, 03 Sep 2021 14:25:23 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DaizaK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/TomitaOKK20, author = {Toi Tomita and Wakaha Ogata and Kaoru Kurosawa and Ryo Kuwayama}, title = {CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type Assumptions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {10}, pages = {1157--1166}, year = {2020}, url = {https://doi.org/10.1587/transfun.2019DMP0013}, doi = {10.1587/TRANSFUN.2019DMP0013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/TomitaOKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/LohHTK20, author = {Jia{-}Ch'ng Loh and Swee{-}Huay Heng and Syh{-}Yuan Tan and Kaoru Kurosawa}, title = {On the Invisibility and Anonymity of Undeniable Signature Schemes}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {11}, number = {1}, pages = {18--34}, year = {2020}, url = {https://doi.org/10.22667/JOWUA.2020.03.31.018}, doi = {10.22667/JOWUA.2020.03.31.018}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/LohHTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OgataK19, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {No-Dictionary Searchable Symmetric Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {1}, pages = {114--124}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.114}, doi = {10.1587/TRANSFUN.E102.A.114}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OgataK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Kurosawa19, author = {Kaoru Kurosawa}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {How to Correct Errors in Multi-server {PIR}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, pages = {564--574}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8\_20}, doi = {10.1007/978-3-030-34621-8\_20}, timestamp = {Fri, 22 Nov 2019 13:52:52 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/Kurosawa19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TomitaOK19, author = {Toi Tomita and Wakaha Ogata and Kaoru Kurosawa}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not {\textbackslash}mathtt q -type) Assumptions}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {3--22}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_1}, doi = {10.1007/978-3-030-26834-3\_1}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TomitaOK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KurosawaUMS19, author = {Kaoru Kurosawa and Akinaga Ueda and Hayato Matsuhashi and Yusuke Sakagami}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {How to Solve Multiple Short-Exponent Discrete Logarithm Problem}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {53--64}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_4}, doi = {10.1007/978-3-030-26834-3\_4}, timestamp = {Wed, 07 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KurosawaUMS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LohHTK19, author = {Jia{-}Ch'ng Loh and Swee{-}Huay Heng and Syh{-}Yuan Tan and Kaoru Kurosawa}, editor = {Ilsun You}, title = {A Note on the Invisibility and Anonymity of Undeniable Signature Schemes}, booktitle = {Information Security Applications - 20th International Conference, {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11897}, pages = {112--125}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39303-8\_9}, doi = {10.1007/978-3-030-39303-8\_9}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LohHTK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kurosawa19, author = {Kaoru Kurosawa}, title = {How to Correct Errors in Multi-Server {PIR}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {531}, year = {2019}, url = {https://eprint.iacr.org/2019/531}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kurosawa19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TomitaOKK19, author = {Toi Tomita and Wakaha Ogata and Kaoru Kurosawa and Ryo Kuwayama}, title = {CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not {\textdollar}{\textbackslash}mathtt\{q\}{\textdollar}-type) Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {982}, year = {2019}, url = {https://eprint.iacr.org/2019/982}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TomitaOKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/UedaTK18, author = {Akinaga Ueda and Hayato Tada and Kaoru Kurosawa}, editor = {Atsuo Inomata and Kan Yasuda}, title = {(Short Paper) How to Solve {DLOG} Problem with Auxiliary Input}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {104--113}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_7}, doi = {10.1007/978-3-319-97916-8\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/UedaTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/TadaUK18, author = {Hayato Tada and Akinaga Ueda and Kaoru Kurosawa}, editor = {Atsuo Inomata and Kan Yasuda}, title = {How to Prove {KDM} Security of {BHHO}}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {281--296}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_18}, doi = {10.1007/978-3-319-97916-8\_18}, timestamp = {Wed, 08 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/TadaUK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KurosawaOK17, author = {Kaoru Kurosawa and Hiroyuki Ohta and Kenji Kakuta}, title = {How to make a linear network code (strongly) secure}, journal = {Des. Codes Cryptogr.}, volume = {82}, number = {3}, pages = {559--582}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0180-0}, doi = {10.1007/S10623-016-0180-0}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KurosawaOK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KurosawaP17, author = {Kaoru Kurosawa and Le Trieu Phong}, title = {Anonymous and leakage resilient {IBE} and {IPE}}, journal = {Des. Codes Cryptogr.}, volume = {85}, number = {2}, pages = {273--298}, year = {2017}, url = {https://doi.org/10.1007/s10623-016-0303-7}, doi = {10.1007/S10623-016-0303-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KurosawaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ItakuraKY17, author = {Naoto Itakura and Kaoru Kurosawa and Kazuki Yoneyama}, title = {Oblivious Polynomial Evaluation in the Exponent, Revisited}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {1}, pages = {26--33}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.26}, doi = {10.1587/TRANSFUN.E100.A.26}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ItakuraKY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/KurosawaP17, author = {Kaoru Kurosawa and Le Trieu Phong}, title = {{IBE} and function-private {IBE} under linear assumptions with shorter ciphertexts and private keys, and extensions}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {210--224}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007292}, doi = {10.1504/IJACT.2017.10007292}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/KurosawaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KurosawaH17, author = {Kaoru Kurosawa and Rie Habuka}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {More Efficient Construction of Bounded {KDM} Secure Encryption}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {354--372}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_18}, doi = {10.1007/978-3-319-61204-1\_18}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/KurosawaH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/OgataK17, author = {Wakaha Ogata and Kaoru Kurosawa}, editor = {Aggelos Kiayias}, title = {Efficient No-dictionary Verifiable Searchable Symmetric Encryption}, booktitle = {Financial Cryptography and Data Security - 21st International Conference, {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10322}, pages = {498--516}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70972-7\_28}, doi = {10.1007/978-3-319-70972-7\_28}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/OgataK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KurosawaSOY16, author = {Kaoru Kurosawa and Keisuke Sasaki and Kiyohiko Ohta and Kazuki Yoneyama}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {UC-Secure Dynamic Searchable Symmetric Encryption Scheme}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {73--90}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_5}, doi = {10.1007/978-3-319-44524-3\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KurosawaSOY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OgataK16, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Efficient No-dictionary Verifiable {SSE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {981}, year = {2016}, url = {http://eprint.iacr.org/2016/981}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OgataK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KurosawaNP15, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Generic Fully Simulatable Adaptive Oblivious Transfer}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {232--245}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.232}, doi = {10.1587/TRANSFUN.E98.A.232}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KurosawaNP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ImaiK15, author = {Shigeyoshi Imai and Kaoru Kurosawa}, title = {Improved reconstruction of {RSA} private-keys from their fraction}, journal = {Inf. Process. Lett.}, volume = {115}, number = {6-8}, pages = {630--632}, year = {2015}, url = {https://doi.org/10.1016/j.ipl.2015.02.013}, doi = {10.1016/J.IPL.2015.02.013}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ImaiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurosawaP15, author = {Kaoru Kurosawa and Le Trieu Phong}, editor = {Ernest Foo and Douglas Stebila}, title = {{IBE} Under k k -LIN with Shorter Ciphertexts and Private Keys}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {145--159}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_9}, doi = {10.1007/978-3-319-19962-7\_9}, timestamp = {Tue, 07 May 2024 20:09:57 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurosawaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/NuidaIK15, author = {Koji Nuida and Naoto Itakura and Kaoru Kurosawa}, editor = {Kaisa Nyberg}, title = {A Simple and Improved Algorithm for Integer Factorization with Implicit Hints}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {258--269}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_14}, doi = {10.1007/978-3-319-16715-2\_14}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/NuidaIK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NuidaK15, author = {Koji Nuida and Kaoru Kurosawa}, editor = {Elisabeth Oswald and Marc Fischlin}, title = {(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9056}, pages = {537--555}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-46800-5\_21}, doi = {10.1007/978-3-662-46800-5\_21}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NuidaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaO15, author = {Kaoru Kurosawa and Yasuhiro Ohtaki}, title = {How to Construct UC-Secure Searchable Symmetric Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {251}, year = {2015}, url = {http://eprint.iacr.org/2015/251}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KurosawaNP14, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {1}, pages = {215--224}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.215}, doi = {10.1587/TRANSFUN.E97.A.215}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KurosawaNP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/KurosawaP14, author = {Kaoru Kurosawa and Le Trieu Phong}, editor = {David Pointcheval and Damien Vergnaud}, title = {Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8469}, pages = {51--68}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-06734-6\_4}, doi = {10.1007/978-3-319-06734-6\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/KurosawaP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KurosawaF14, author = {Kaoru Kurosawa and Jun Furukawa}, editor = {Josh Benaloh}, title = {2-Pass Key Exchange Protocols from CPA-Secure {KEM}}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {385--401}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_20}, doi = {10.1007/978-3-319-04852-9\_20}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KurosawaF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/Kurosawa14, author = {Kaoru Kurosawa}, editor = {Nicolas Christin and Reihaneh Safavi{-}Naini}, title = {Garbled Searchable Symmetric Encryption}, booktitle = {Financial Cryptography and Data Security - 18th International Conference, {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8437}, pages = {234--251}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45472-5\_15}, doi = {10.1007/978-3-662-45472-5\_15}, timestamp = {Tue, 21 Mar 2023 20:59:40 +0100}, biburl = {https://dblp.org/rec/conf/fc/Kurosawa14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NuidaK14, author = {Koji Nuida and Kaoru Kurosawa}, title = {(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {777}, year = {2014}, url = {http://eprint.iacr.org/2014/777}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NuidaK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NuidaIK14, author = {Koji Nuida and Naoto Itakura and Kaoru Kurosawa}, title = {A Simple and Improved Algorithm for Integer Factorization with Implicit Hints}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {839}, year = {2014}, url = {http://eprint.iacr.org/2014/839}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NuidaIK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/KurosawaNP13, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {New leakage-resilient CCA-secure public key encryption}, journal = {J. Math. Cryptol.}, volume = {7}, number = {4}, pages = {297--312}, year = {2013}, url = {https://doi.org/10.1515/jmc-2013-5007}, doi = {10.1515/JMC-2013-5007}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/KurosawaNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KurosawaP13, author = {Kaoru Kurosawa and Le Trieu Phong}, editor = {Michael J. Jacobson Jr. and Michael E. Locasto and Payman Mohassel and Reihaneh Safavi{-}Naini}, title = {Leakage Resilient {IBE} and {IPE} under the {DLIN} Assumption}, booktitle = {Applied Cryptography and Network Security - 11th International Conference, {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7954}, pages = {487--501}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38980-1\_31}, doi = {10.1007/978-3-642-38980-1\_31}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/KurosawaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KurosawaO13, author = {Kaoru Kurosawa and Yasuhiro Ohtaki}, editor = {Michel Abdalla and Cristina Nita{-}Rotaru and Ricardo Dahab}, title = {How to Update Documents Verifiably in Searchable Symmetric Encryption}, booktitle = {Cryptology and Network Security - 12th International Conference, {CANS} 2013, Paraty, Brazil, November 20-22. 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8257}, pages = {309--328}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-02937-5\_17}, doi = {10.1007/978-3-319-02937-5\_17}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/KurosawaO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KurosawaOK13, author = {Kaoru Kurosawa and Hiroyuki Ohta and Kenji Kakuta}, editor = {Carles Padr{\'{o}}}, title = {How to Construct Strongly Secure Network Coding Scheme}, booktitle = {Information Theoretic Security - 7th International Conference, {ICITS} 2013, Singapore, November 28-30, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8317}, pages = {1--17}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-04268-8\_1}, doi = {10.1007/978-3-319-04268-8\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/KurosawaOK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KurosawaU13, author = {Kaoru Kurosawa and Takuma Ueda}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {How to Factor {N} 1 and {N} 2 When {\textdollar}p{\_}1=p{\_}2 {\textbackslash}bmod 2{\^{}}t{\textdollar}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {217--225}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_14}, doi = {10.1007/978-3-642-41383-4\_14}, timestamp = {Sun, 04 Aug 2024 19:41:44 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KurosawaU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pkc/2013, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7}, doi = {10.1007/978-3-642-36362-7}, isbn = {978-3-642-36361-0}, timestamp = {Fri, 01 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaNP13, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {UC-Secure Multi-Session {OT} Using Tamper-Proof Hardware}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {77}, year = {2013}, url = {http://eprint.iacr.org/2013/077}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaNP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaU13, author = {Kaoru Kurosawa and Takuma Ueda}, title = {How to Factor N\({}_{\mbox{1}}\) and N\({}_{\mbox{2}}\) When p\({}_{\mbox{1}}\)=p\({}_{\mbox{2}}\) mod 2\({}^{\mbox{t}}\)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2013}, url = {http://eprint.iacr.org/2013/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaU13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaP13, author = {Kaoru Kurosawa and Le Trieu Phong}, title = {Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {765}, year = {2013}, url = {http://eprint.iacr.org/2013/765}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kurosawa12, author = {Kaoru Kurosawa}, title = {Round-efficient perfectly secure message transmission scheme against general adversary}, journal = {Des. Codes Cryptogr.}, volume = {63}, number = {2}, pages = {199--207}, year = {2012}, url = {https://doi.org/10.1007/s10623-011-9546-5}, doi = {10.1007/S10623-011-9546-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kurosawa12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/PhongKO12, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, title = {Undeniable and Unpretendable Signatures}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {138--150}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.138}, doi = {10.1587/TRANSFUN.E95.A.138}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/PhongKO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurosawaNP12, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {235--246}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_18}, doi = {10.1007/978-3-642-31448-3\_18}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurosawaNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/KurosawaO12, author = {Kaoru Kurosawa and Yasuhiro Ohtaki}, editor = {Angelos D. Keromytis}, title = {UC-Secure Searchable Symmetric Encryption}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {285--298}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_21}, doi = {10.1007/978-3-642-32946-3\_21}, timestamp = {Tue, 30 Jul 2024 10:38:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/KurosawaO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaNP12, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {213}, year = {2012}, url = {http://eprint.iacr.org/2012/213}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaNP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaNP12a, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {New Leakage Resilient CCA-Secure Public Key Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {453}, year = {2012}, url = {http://eprint.iacr.org/2012/453}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaNP12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SakaiHKO11, author = {Yusuke Sakai and Goichiro Hanaoka and Kaoru Kurosawa and Kazuo Ohta}, title = {How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {6}, pages = {1293--1305}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1293}, doi = {10.1587/TRANSFUN.E94.A.1293}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SakaiHKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Kurosawa11, author = {Kaoru Kurosawa}, title = {General Error Decodable Secret Sharing Scheme and Its Application}, journal = {{IEEE} Trans. Inf. Theory}, volume = {57}, number = {9}, pages = {6304--6309}, year = {2011}, url = {https://doi.org/10.1109/TIT.2011.2161927}, doi = {10.1109/TIT.2011.2161927}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/Kurosawa11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KurosawaNP11, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Generic Fully Simulatable Adaptive Oblivious Transfer}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {274--291}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_16}, doi = {10.1007/978-3-642-21554-4\_16}, timestamp = {Thu, 29 Aug 2019 08:10:02 +0200}, biburl = {https://dblp.org/rec/conf/acns/KurosawaNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ChoudhuryKP11, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, editor = {Javier L{\'{o}}pez and Gene Tsudik}, title = {Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary}, booktitle = {Applied Cryptography and Network Security - 9th International Conference, {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6715}, pages = {292--308}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21554-4\_17}, doi = {10.1007/978-3-642-21554-4\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/ChoudhuryKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/ChoudhuryKP11, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, editor = {Serge Fehr}, title = {The Round Complexity of Perfectly Secure General {VSS}}, booktitle = {Information Theoretic Security - 5th International Conference, {ICITS} 2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6673}, pages = {143--162}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20728-0\_14}, doi = {10.1007/978-3-642-20728-0\_14}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/ChoudhuryKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Kurosawa11, author = {Kaoru Kurosawa}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Hybrid Encryption}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {570--572}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_321}, doi = {10.1007/978-1-4419-5906-5\_321}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Kurosawa11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryKP11, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, title = {Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2011}, url = {http://eprint.iacr.org/2011/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryKP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaNP11, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Generic Fully Simulatable Adaptive Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2011}, url = {http://eprint.iacr.org/2011/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaNP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaP11, author = {Kaoru Kurosawa and Le Trieu Phong}, title = {Maximum Leakage Resilient {IBE} and {IPE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {628}, year = {2011}, url = {http://eprint.iacr.org/2011/628}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaP11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/PhongKO10, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, title = {New RSA-Based (Selectively) Convertible Undeniable Signature Schemes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {1}, pages = {63--75}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.63}, doi = {10.1587/TRANSFUN.E93.A.63}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/PhongKO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanaokaK10, author = {Goichiro Hanaoka and Kaoru Kurosawa}, title = {Between Hashed {DH} and Computational {DH:} Compact Encryption from Weaker Assumption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {11}, pages = {1994--2006}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1994}, doi = {10.1587/TRANSFUN.E93.A.1994}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanaokaK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/DesmedtGKS10, author = {Yvo Desmedt and Rosario Gennaro and Kaoru Kurosawa and Victor Shoup}, title = {A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack}, journal = {J. Cryptol.}, volume = {23}, number = {1}, pages = {91--120}, year = {2010}, url = {https://doi.org/10.1007/s00145-009-9051-4}, doi = {10.1007/S00145-009-9051-4}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/DesmedtGKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/Kurosawa10, author = {Kaoru Kurosawa}, title = {Power of a public random permutation and its application to authenticated encryption}, journal = {{IEEE} Trans. Inf. Theory}, volume = {56}, number = {10}, pages = {5366--5374}, year = {2010}, url = {https://doi.org/10.1109/TIT.2010.2059636}, doi = {10.1109/TIT.2010.2059636}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/Kurosawa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Kurosawa10, author = {Kaoru Kurosawa}, editor = {Swee{-}Huay Heng and Rebecca N. Wright and Bok{-}Min Goi}, title = {Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk)}, booktitle = {Cryptology and Network Security - 9th International Conference, {CANS} 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6467}, pages = {43}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17619-7\_4}, doi = {10.1007/978-3-642-17619-7\_4}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/Kurosawa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SakaiHKO10, author = {Yusuke Sakai and Goichiro Hanaoka and Kaoru Kurosawa and Kazuo Ohta}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the {RO} Model}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {55--69}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_5}, doi = {10.1007/978-3-642-16825-3\_5}, timestamp = {Mon, 15 Jun 2020 17:00:57 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SakaiHKO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KurosawaNP10, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Efficiency-Improved Fully Simulatable Adaptive {OT} under the {DDH} Assumption}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {172--181}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_12}, doi = {10.1007/978-3-642-15317-4\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/KurosawaNP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/PhongKO10, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, editor = {Juan A. Garay and Roberto De Prisco}, title = {Provably Secure Convertible Undeniable Signatures with Unambiguity}, booktitle = {Security and Cryptography for Networks, 7th International Conference, {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6280}, pages = {291--308}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15317-4\_19}, doi = {10.1007/978-3-642-15317-4\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/scn/PhongKO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icits/2009, editor = {Kaoru Kurosawa}, title = {Information Theoretic Security, 4th International Conference, {ICITS} 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5973}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14496-7}, doi = {10.1007/978-3-642-14496-7}, isbn = {978-3-642-14495-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2010, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0}, doi = {10.1007/978-3-642-16280-0}, isbn = {978-3-642-16279-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanaokaK10, author = {Goichiro Hanaoka and Kaoru Kurosawa}, title = {Between Hashed {DH} and Computational {DH:} Compact Encryption from Weaker Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {35}, year = {2010}, url = {http://eprint.iacr.org/2010/035}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanaokaK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaNP10, author = {Kaoru Kurosawa and Ryo Nojima and Le Trieu Phong}, title = {Efficiency-Improved Fully Simulatable Adaptive {OT} under the {DDH} Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2010}, url = {http://eprint.iacr.org/2010/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaNP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kurosawa10, author = {Kaoru Kurosawa}, title = {Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {450}, year = {2010}, url = {http://eprint.iacr.org/2010/450}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kurosawa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChoudhuryKP10, author = {Ashish Choudhury and Kaoru Kurosawa and Arpita Patra}, title = {The Round Complexity of General {VSS}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {609}, year = {2010}, url = {http://eprint.iacr.org/2010/609}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChoudhuryKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ItohKK09, author = {Kouichi Itoh and Noboru Kunihiro and Kaoru Kurosawa}, title = {Small Secret Key Attack on a Takagi's Variant of {RSA}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {33--41}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.33}, doi = {10.1587/TRANSFUN.E92.A.33}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ItohKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AbeCIK09, author = {Masayuki Abe and Yang Cui and Hideki Imai and Kaoru Kurosawa}, title = {Tag-KEM from Set Partial Domain One-Way Permutations}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {42--52}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.42}, doi = {10.1587/TRANSFUN.E92.A.42}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AbeCIK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KurosawaS09, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, title = {Almost Secure (1-Round, \emph{n}-Channel) Message Transmission Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {105--112}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.105}, doi = {10.1587/TRANSFUN.E92.A.105}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KurosawaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KurosawaT09, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, title = {One-wayness equivalent to general factoring}, journal = {{IEEE} Trans. Inf. Theory}, volume = {55}, number = {9}, pages = {4249--4262}, year = {2009}, url = {https://doi.org/10.1109/TIT.2009.2025532}, doi = {10.1109/TIT.2009.2025532}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KurosawaT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KurosawaS09, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, title = {Truly efficient 2-round perfectly secure message transmission scheme}, journal = {{IEEE} Trans. Inf. Theory}, volume = {55}, number = {11}, pages = {5223--5232}, year = {2009}, url = {https://doi.org/10.1109/TIT.2009.2030434}, doi = {10.1109/TIT.2009.2030434}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KurosawaS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/PhongKO09, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, editor = {Bart Preneel}, title = {New RSA-Based (Selectively) Convertible Undeniable Signature Schemes}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5580}, pages = {116--134}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02384-2\_8}, doi = {10.1007/978-3-642-02384-2\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/PhongKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaN09, author = {Kaoru Kurosawa and Ryo Nojima}, editor = {Mitsuru Matsui}, title = {Simple Adaptive Oblivious Transfer without Random Oracle}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {334--346}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_20}, doi = {10.1007/978-3-642-10366-7\_20}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kurosawa09, author = {Kaoru Kurosawa}, title = {General Error Decodable Secret Sharing Scheme and Its Application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {263}, year = {2009}, url = {http://eprint.iacr.org/2009/263}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kurosawa09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaN09, author = {Kaoru Kurosawa and Ryo Nojima}, title = {Simple Adaptive Oblivious Transfer Without Random Oracle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2009}, url = {http://eprint.iacr.org/2009/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhongKO09, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, title = {Provably Secure Convertible Undeniable Signatures with Unambiguity}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2009}, url = {http://eprint.iacr.org/2009/394}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhongKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IwataYK08, author = {Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa}, title = {Security of the Five-Round Kasumi Type Permutation}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {30--38}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.30}, doi = {10.1093/IETFEC/E91-A.1.30}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IwataYK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SuzukiTKT08, author = {Kazuhiro Suzuki and Dongvu Tonien and Kaoru Kurosawa and Koji Toyota}, title = {Birthday Paradox for Multi-Collisions}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {39--45}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.39}, doi = {10.1093/IETFEC/E91-A.1.39}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SuzukiTKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KunihiroK08, author = {Noboru Kunihiro and Kaoru Kurosawa}, title = {Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's {RSA}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {9}, pages = {2356--2364}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.9.2356}, doi = {10.1093/IETFEC/E91-A.9.2356}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KunihiroK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/KurosawaH08, author = {Kaoru Kurosawa and Swee{-}Huay Heng}, title = {The power of identification schemes}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {60--69}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017050}, doi = {10.1504/IJACT.2008.017050}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/KurosawaH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbeGK08, author = {Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa}, title = {Tag-KEM/DEM: {A} New Framework for Hybrid Encryption}, journal = {J. Cryptol.}, volume = {21}, number = {1}, pages = {97--130}, year = {2008}, url = {https://doi.org/10.1007/s00145-007-9010-x}, doi = {10.1007/S00145-007-9010-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbeGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KurosawaKK08, author = {Kaoru Kurosawa and Wataru Kishimoto and Takeshi Koshiba}, title = {A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {6}, pages = {2566--2571}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.921704}, doi = {10.1109/TIT.2008.921704}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KurosawaKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HanaokaK08, author = {Goichiro Hanaoka and Kaoru Kurosawa}, editor = {Josef Pieprzyk}, title = {Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {308--325}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_19}, doi = {10.1007/978-3-540-89255-7\_19}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HanaokaK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ItohKK08, author = {Kouichi Itoh and Noboru Kunihiro and Kaoru Kurosawa}, editor = {Tal Malkin}, title = {Small Secret Key Attack on a Variant of {RSA} (Due to Takagi)}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {387--406}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_25}, doi = {10.1007/978-3-540-79263-5\_25}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ItohKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaS08, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, editor = {Nigel P. Smart}, title = {Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {324--340}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_19}, doi = {10.1007/978-3-540-78967-3\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/KurosawaF08, author = {Kaoru Kurosawa and Jun Furukawa}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {Universally Composable Undeniable Signature}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {524--535}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_43}, doi = {10.1007/978-3-540-70583-3\_43}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/KurosawaF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KurosawaK08, author = {Kaoru Kurosawa and Takeshi Koshiba}, editor = {Reihaneh Safavi{-}Naini}, title = {Simple Direct Reduction of String (1, 2)-OT to Rabin's {OT} without Privacy Amplification}, booktitle = {Information Theoretic Security, Third International Conference, {ICITS} 2008, Calgary, Canada, August 10-13, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5155}, pages = {199--209}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85093-9\_19}, doi = {10.1007/978-3-540-85093-9\_19}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/KurosawaK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/FurukawaAK08, author = {Jun Furukawa and Frederik Armknecht and Kaoru Kurosawa}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {392--408}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_26}, doi = {10.1007/978-3-540-85855-3\_26}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/FurukawaAK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaF08, author = {Kaoru Kurosawa and Jun Furukawa}, title = {Universally Composable Undeniable Signature}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2008}, url = {http://eprint.iacr.org/2008/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanaokaK08, author = {Goichiro Hanaoka and Kaoru Kurosawa}, title = {Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2008}, url = {http://eprint.iacr.org/2008/211}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanaokaK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaS08, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, title = {Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {421}, year = {2008}, url = {http://eprint.iacr.org/2008/421}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IwataK07, author = {Tetsu Iwata and Kaoru Kurosawa}, title = {How to Construct Super-Pseudorandom Permutations with Short Keys}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {2--13}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.2}, doi = {10.1093/IETFEC/E90-A.1.2}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IwataK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/HirotaK07, author = {Osamu Hirota and Kaoru Kurosawa}, title = {Immunity against Correlation Attack on Quantum Stream Cipher by Yuen 2000 Protocol}, journal = {Quantum Inf. Process.}, volume = {6}, number = {2}, pages = {81--91}, year = {2007}, url = {https://doi.org/10.1007/s11128-006-0039-9}, doi = {10.1007/S11128-006-0039-9}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/HirotaK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/BellareBKS07, author = {Mihir Bellare and Alexandra Boldyreva and Kaoru Kurosawa and Jessica Staddon}, title = {Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security}, journal = {{IEEE} Trans. Inf. Theory}, volume = {53}, number = {11}, pages = {3927--3943}, year = {2007}, url = {https://doi.org/10.1109/TIT.2007.907471}, doi = {10.1109/TIT.2007.907471}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tit/BellareBKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/KurosawaS07, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, editor = {Yvo Desmedt}, title = {Almost Secure (1-Round, n-Channel) Message Transmission Scheme}, booktitle = {Information Theoretic Security - Second International Conference, {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4883}, pages = {99--112}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-642-10230-1\_8}, doi = {10.1007/978-3-642-10230-1\_8}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/KurosawaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DesmedtK07, author = {Yvo Desmedt and Kaoru Kurosawa}, editor = {Juan A. Garay and Arjen K. Lenstra and Masahiro Mambo and Ren{\'{e}} Peralta}, title = {A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring}, booktitle = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so, Chile, October 9-12, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4779}, pages = {351--361}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75496-1\_23}, doi = {10.1007/978-3-540-75496-1\_23}, timestamp = {Fri, 03 Feb 2023 21:39:19 +0100}, biburl = {https://dblp.org/rec/conf/isw/DesmedtK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SuzukiK07, author = {Kazuhiro Suzuki and Kaoru Kurosawa}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {How to Find Many Collisions of 3-Pass {HAVAL}}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {428--443}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_29}, doi = {10.1007/978-3-540-75651-4\_29}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SuzukiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KunihiroK07, author = {Noboru Kunihiro and Kaoru Kurosawa}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {412--425}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_27}, doi = {10.1007/978-3-540-71677-8\_27}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KunihiroK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2007, editor = {Kaoru Kurosawa}, title = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2}, doi = {10.1007/978-3-540-76900-2}, isbn = {978-3-540-76899-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaK07, author = {Kaoru Kurosawa and Takeshi Koshiba}, title = {Direct Reduction of String (1, 2)-OT to Rabin's {OT}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {46}, year = {2007}, url = {http://eprint.iacr.org/2007/046}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaKK07, author = {Kaoru Kurosawa and Wataru Kishimoto and Takeshi Koshiba}, title = {How to Derive Lower Bound on Oblivious Transfer Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2007}, url = {http://eprint.iacr.org/2007/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaS07, author = {Kaoru Kurosawa and Kazuhiro Suzuki}, title = {Almost Secure (1-Round, n-Channel) Message Transmission Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {76}, year = {2007}, url = {http://eprint.iacr.org/2007/076}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SuzukiK07, author = {Kazuhiro Suzuki and Kaoru Kurosawa}, title = {How To Find Many Collisions of 3-Pass {HAVAL}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {79}, year = {2007}, url = {http://eprint.iacr.org/2007/079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SuzukiK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HengK06, author = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {\emph{k}-Resilient Identity-Based Encryption in the Standard Model}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {39--46}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.39}, doi = {10.1093/IETFEC/E89-A.1.39}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HengK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/NguyenSK06, author = {Lan Nguyen and Reihaneh Safavi{-}Naini and Kaoru Kurosawa}, title = {Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security}, journal = {Int. J. Inf. Sec.}, volume = {5}, number = {4}, pages = {241--255}, year = {2006}, url = {https://doi.org/10.1007/s10207-006-0004-8}, doi = {10.1007/S10207-006-0004-8}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/NguyenSK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamdm/OgataKS06, author = {Wakaha Ogata and Kaoru Kurosawa and Douglas R. Stinson}, title = {Optimum Secret Sharing Scheme Secure against Cheating}, journal = {{SIAM} J. Discret. Math.}, volume = {20}, number = {1}, pages = {79--95}, year = {2006}, url = {https://doi.org/10.1137/S0895480100378689}, doi = {10.1137/S0895480100378689}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamdm/OgataKS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/OgataKH06, author = {Wakaha Ogata and Kaoru Kurosawa and Swee{-}Huay Heng}, title = {The security of the {FDH} variant of Chaum's undeniable signature scheme}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {5}, pages = {2006--2017}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.872853}, doi = {10.1109/TIT.2006.872853}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/OgataKH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/MatsumotoKIKU06, author = {Ryutaroh Matsumoto and Kaoru Kurosawa and Toshiya Itoh and Toshimitsu Konno and Tomohiko Uyematsu}, title = {Primal-Dual Distance Bounds of Linear Codes With Application to Cryptography}, journal = {{IEEE} Trans. Inf. Theory}, volume = {52}, number = {9}, pages = {4251--4256}, year = {2006}, url = {https://doi.org/10.1109/TIT.2006.880050}, doi = {10.1109/TIT.2006.880050}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/MatsumotoKIKU06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AbeCIK06, author = {Masayuki Abe and Yang Cui and Hideki Imai and Kaoru Kurosawa}, editor = {Lynn Margaret Batten and Reihaneh Safavi{-}Naini}, title = {Tag-KEM from Set Partial Domain One-Way Permutations}, booktitle = {Information Security and Privacy, 11th Australasian Conference, {ACISP} 2006, Melbourne, Australia, July 3-5, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4058}, pages = {360--370}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11780656\_30}, doi = {10.1007/11780656\_30}, timestamp = {Wed, 08 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/AbeCIK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaT06, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, editor = {Xuejia Lai and Kefei Chen}, title = {New Approach for Selectively Convertible Undeniable Signature Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {428--443}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_28}, doi = {10.1007/11935230\_28}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/FurukawaKI06, author = {Jun Furukawa and Kaoru Kurosawa and Hideki Imai}, editor = {Michele Bugliesi and Bart Preneel and Vladimiro Sassone and Ingo Wegener}, title = {An Efficient Compiler from \emph{Sigma}-Protocol to 2-Move Deniable Zero-Knowledge}, booktitle = {Automata, Languages and Programming, 33rd International Colloquium, {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {4052}, pages = {46--57}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11787006\_5}, doi = {10.1007/11787006\_5}, timestamp = {Tue, 14 May 2019 10:00:44 +0200}, biburl = {https://dblp.org/rec/conf/icalp/FurukawaKI06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SuzukiTKT06, author = {Kazuhiro Suzuki and Dongvu Tonien and Kaoru Kurosawa and Koji Toyota}, editor = {Min Surp Rhee and Byoungcheon Lee}, title = {Birthday Paradox for Multi-collisions}, booktitle = {Information Security and Cryptology - {ICISC} 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4296}, pages = {29--40}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11927587\_5}, doi = {10.1007/11927587\_5}, timestamp = {Mon, 29 Jul 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SuzukiTKT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ih/LeK06, author = {Tri Van Le and Kaoru Kurosawa}, editor = {Jan Camenisch and Christian S. Collberg and Neil F. Johnson and Phil Sallee}, title = {Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks}, booktitle = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers}, series = {Lecture Notes in Computer Science}, volume = {4437}, pages = {297--313}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74124-4\_20}, doi = {10.1007/978-3-540-74124-4\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ih/LeK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KurosawaS06, author = {Kaoru Kurosawa and Katja Schmidt{-}Samoa}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {New Online/Offline Signature Schemes Without Random Oracles}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {330--346}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_22}, doi = {10.1007/11745853\_22}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KurosawaS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KurosawaH06, author = {Kaoru Kurosawa and Swee{-}Huay Heng}, editor = {Moti Yung and Yevgeniy Dodis and Aggelos Kiayias and Tal Malkin}, title = {The Power of Identification Schemes}, booktitle = {Public Key Cryptography - {PKC} 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3958}, pages = {364--377}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11745853\_24}, doi = {10.1007/11745853\_24}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/KurosawaH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/KurosawaH06, author = {Kaoru Kurosawa and Swee{-}Huay Heng}, editor = {Roberto De Prisco and Moti Yung}, title = {Relations Among Security Notions for Undeniable Signature Schemes}, booktitle = {Security and Cryptography for Networks, 5th International Conference, {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4116}, pages = {34--48}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11832072\_3}, doi = {10.1007/11832072\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/scn/KurosawaH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/drm/2006, editor = {Moti Yung and Kaoru Kurosawa and Reihaneh Safavi{-}Naini}, title = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management, Alexandria, VA, USA, October 30, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-555-X}, timestamp = {Thu, 17 Jan 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/drm/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KurosawaID05, author = {Kaoru Kurosawa and Tetsu Iwata and Quang Viet Duong}, title = {How to Improve Interpolation Attack}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {9--15}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_9\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KurosawaID05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IwataK05, author = {Tetsu Iwata and Kaoru Kurosawa}, title = {On the Security of a {MAC} by Mitchell}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {25--32}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_25\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IwataK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OhtakiKK05, author = {Yasuhiro Ohtaki and Masaru Kamada and Kaoru Kurosawa}, title = {A Scheme for Partial Disclosure of Transaction Log}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {222--229}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_222\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OhtakiKK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KamadaKOO05, author = {Masaru Kamada and Kaoru Kurosawa and Yasuhiro Ohtaki and Shusuke Okamoto}, title = {A Network Game Based on Fair Random Numbers}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {88-D}, number = {5}, pages = {859--864}, year = {2005}, url = {https://doi.org/10.1093/ietisy/e88-d.5.859}, doi = {10.1093/IETISY/E88-D.5.859}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KamadaKOO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/NguyenSK05, author = {Lan Nguyen and Reihaneh Safavi{-}Naini and Kaoru Kurosawa}, title = {A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem}, journal = {J. Univers. Comput. Sci.}, volume = {11}, number = {6}, pages = {986--1010}, year = {2005}, url = {https://doi.org/10.3217/jucs-011-06-0986}, doi = {10.3217/JUCS-011-06-0986}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/NguyenSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AbeGKS05, author = {Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa and Victor Shoup}, editor = {Ronald Cramer}, title = {Tag-KEM/DEM: {A} New Framework for Hybrid Encryption and {A} New Analysis of Kurosawa-Desmedt {KEM}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {128--146}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_8}, doi = {10.1007/11426639\_8}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AbeGKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaH05, author = {Kaoru Kurosawa and Swee{-}Huay Heng}, editor = {Ronald Cramer}, title = {3-Move Undeniable Signature Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {181--197}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_11}, doi = {10.1007/11426639\_11}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataK05, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Henri Gilbert and Helena Handschuh}, title = {How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {268--283}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_18}, doi = {10.1007/11502760\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KurosawaH05, author = {Kaoru Kurosawa and Swee{-}Huay Heng}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {Identity-Based Identification Without Random Oracles}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3481}, pages = {603--613}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424826\_64}, doi = {10.1007/11424826\_64}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KurosawaH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/Kurosawa05, author = {Kaoru Kurosawa}, title = {Some topics related to resilient functions}, booktitle = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005}, pages = {55--60}, publisher = {{IEEE}}, year = {2005}, url = {https://doi.org/10.1109/ITWTPI.2005.1543957}, doi = {10.1109/ITWTPI.2005.1543957}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icits/Kurosawa05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DesmedtK05, author = {Yvo Desmedt and Kaoru Kurosawa}, editor = {Jianying Zhou and Javier L{\'{o}}pez and Robert H. Deng and Feng Bao}, title = {Electronic Voting: Starting Over?}, booktitle = {Information Security, 8th International Conference, {ISC} 2005, Singapore, September 20-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3650}, pages = {329--343}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11556992\_24}, doi = {10.1007/11556992\_24}, timestamp = {Thu, 29 Aug 2019 08:10:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/DesmedtK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/OgataKH05, author = {Wakaha Ogata and Kaoru Kurosawa and Swee{-}Huay Heng}, editor = {Serge Vaudenay}, title = {The Security of the {FDH} Variant of Chaum's Undeniable Signature Scheme}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {328--345}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_23}, doi = {10.1007/978-3-540-30580-4\_23}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/OgataKH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-cs-0506087, author = {Ryutaroh Matsumoto and Kaoru Kurosawa and Toshiya Itoh and Toshimitsu Konno and Tomohiko Uyematsu}, title = {Primal-dual distance bounds of linear codes with application to cryptography}, journal = {CoRR}, volume = {abs/cs/0506087}, year = {2005}, url = {http://arxiv.org/abs/cs/0506087}, eprinttype = {arXiv}, eprint = {cs/0506087}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-cs-0506087.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeGK05, author = {Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa}, title = {Tag-KEM/DEM: {A} New Framework for Hybrid Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {27}, year = {2005}, url = {http://eprint.iacr.org/2005/027}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeGK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NguyenSK05, author = {Lan Nguyen and Reihaneh Safavi{-}Naini and Kaoru Kurosawa}, title = {A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2005}, url = {http://eprint.iacr.org/2005/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NguyenSK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MatsumotoKIKU05, author = {Ryutaroh Matsumoto and Kaoru Kurosawa and Toshiya Itoh and Toshimitsu Konno and Tomohiko Uyematsu}, title = {Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2005}, url = {http://eprint.iacr.org/2005/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MatsumotoKIKU05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaT05, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, title = {One-Wayness Equivalent to General Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2005}, url = {http://eprint.iacr.org/2005/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/OgataKSS04, author = {Wakaha Ogata and Kaoru Kurosawa and Douglas R. Stinson and Hajime Saido}, title = {New combinatorial designs and their applications to authentication codes and secret sharing schemes}, journal = {Discret. Math.}, volume = {279}, number = {1-3}, pages = {383--405}, year = {2004}, url = {https://doi.org/10.1016/S0012-365X(03)00283-8}, doi = {10.1016/S0012-365X(03)00283-8}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/OgataKSS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KurosawaI04, author = {Kaoru Kurosawa and Tetsu Iwata}, title = {{TMAC:} Two-Key {CBC} {MAC}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {46--52}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_46\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KurosawaI04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HengK04, author = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Square Hash with a Small Key Size}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {54--59}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_54\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HengK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IwataK04, author = {Tetsu Iwata and Kaoru Kurosawa}, title = {On the Universal Hash Functions in Luby-Rackoff Cipher}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {60--66}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_60\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IwataK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MatsuoK04, author = {Toshihiko Matsuo and Kaoru Kurosawa}, title = {On Parallel Hash Functions Based on Block-Ciphers}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {67--74}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_67\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MatsuoK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KurosawaD04, author = {Kaoru Kurosawa and Quang Viet Duong}, title = {How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {141--146}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_141\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KurosawaD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jc/OgataK04, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Oblivious keyword search}, journal = {J. Complex.}, volume = {20}, number = {2-3}, pages = {356--371}, year = {2004}, url = {https://doi.org/10.1016/j.jco.2003.08.023}, doi = {10.1016/J.JCO.2003.08.023}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jc/OgataK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KurosawaIY04, author = {Kaoru Kurosawa and Tetsu Iwata and Takayuki Yoshiwara}, title = {New covering radius of Reed-Muller codes for t-resilient functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {50}, number = {3}, pages = {468--475}, year = {2004}, url = {https://doi.org/10.1109/TIT.2004.824913}, doi = {10.1109/TIT.2004.824913}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KurosawaIY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KurosawaM04, author = {Kaoru Kurosawa and Ryutaroh Matsumoto}, title = {Almost security of cryptographic Boolean functions}, journal = {{IEEE} Trans. Inf. Theory}, volume = {50}, number = {11}, pages = {2752--2761}, year = {2004}, url = {https://doi.org/10.1109/TIT.2004.836684}, doi = {10.1109/TIT.2004.836684}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KurosawaM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IwataK04, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {How to Re-use Round Function in Super-Pseudorandom Permutation}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {224--235}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_20}, doi = {10.1007/978-3-540-27800-9\_20}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IwataK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurosawaM04, author = {Kaoru Kurosawa and Toshihiko Matsuo}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {How to Remove {MAC} from {DHIES}}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {236--247}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_21}, doi = {10.1007/978-3-540-27800-9\_21}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurosawaM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/NguyenSK04, author = {Lan Nguyen and Reihaneh Safavi{-}Naini and Kaoru Kurosawa}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Verifiable Shuffles: {A} Formal Model and a Paillier-Based Efficient Construction with Provable Security}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {61--75}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_5}, doi = {10.1007/978-3-540-24852-1\_5}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/NguyenSK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KurosawaD04, author = {Kaoru Kurosawa and Yvo Desmedt}, editor = {Matthew K. Franklin}, title = {A New Paradigm of Hybrid Encryption Scheme}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {426--442}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_26}, doi = {10.1007/978-3-540-28628-8\_26}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KurosawaD04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HengK04, author = {Swee{-}Huay Heng and Kaoru Kurosawa}, editor = {Tatsuaki Okamoto}, title = {k-Resilient Identity-Based Encryption in the Standard Model}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {67--80}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_6}, doi = {10.1007/978-3-540-24660-2\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HengK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/VietK04, author = {Quang Viet Duong and Kaoru Kurosawa}, editor = {Tatsuaki Okamoto}, title = {Almost Ideal Contrast Visual Cryptography with Reversing}, booktitle = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2964}, pages = {353--365}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24660-2\_27}, doi = {10.1007/978-3-540-24660-2\_27}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/VietK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KoshibaK04, author = {Takeshi Koshiba and Kaoru Kurosawa}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {Short Exponent Diffie-Hellman Problems}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {173--186}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_13}, doi = {10.1007/978-3-540-24632-9\_13}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KoshibaK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KurosawaH04, author = {Kaoru Kurosawa and Swee{-}Huay Heng}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {From Digital Signature to ID-based Identification/Signature}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {248--261}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_18}, doi = {10.1007/978-3-540-24632-9\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KurosawaH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongK04, author = {Quang Viet Duong and Kaoru Kurosawa}, title = {Almost Ideal Contrast Visual Cryptography with Reversing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {287}, year = {2004}, url = {http://eprint.iacr.org/2004/287}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuongK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OgataKH04, author = {Wakaha Ogata and Kaoru Kurosawa and Swee{-}Huay Heng}, title = {The Security of the {FDH} Variant of Chaum's Undeniable Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {290}, year = {2004}, url = {http://eprint.iacr.org/2004/290}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OgataKH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/IwataK03, author = {Tetsu Iwata and Kaoru Kurosawa}, title = {Inclusion Relations of Boolean Functions Satisfying PC(\emph{l}) of Order \emph{k}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {86-A}, number = {1}, pages = {47--53}, year = {2003}, url = {http://search.ieice.org/bin/summary.php?id=e86-a\_1\_47}, timestamp = {Tue, 08 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/IwataK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/IwataYK03, author = {Tetsu Iwata and Tomonobu Yoshino and Kaoru Kurosawa}, title = {Non-cryptographic primitive for pseudorandom permutation}, journal = {Theor. Comput. Sci.}, volume = {306}, number = {1-3}, pages = {139--154}, year = {2003}, url = {https://doi.org/10.1016/S0304-3975(03)00245-7}, doi = {10.1016/S0304-3975(03)00245-7}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/IwataYK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/IwataYK03, author = {Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On the Pseudorandomness of {KASUMI} Type Permutations}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {130--141}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_12}, doi = {10.1007/3-540-45067-X\_12}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/IwataYK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MatsuoK03, author = {Toshihiko Matsuo and Kaoru Kurosawa}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {On Parallel Hash Functions Based on Block-Cipher}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {510--521}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_44}, doi = {10.1007/3-540-45067-X\_44}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MatsuoK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/HengK03, author = {Swee{-}Huay Heng and Kaoru Kurosawa}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Square Hash with a Small Key Size}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {522--531}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_45}, doi = {10.1007/3-540-45067-X\_45}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/HengK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaT03, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, editor = {Chi{-}Sung Laih}, title = {Some RSA-Based Encryption Schemes with Tight Security Reduction}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {19--36}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_2}, doi = {10.1007/978-3-540-40061-5\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaST03, author = {Kaoru Kurosawa and Katja Schmidt{-}Samoa and Tsuyoshi Takagi}, editor = {Chi{-}Sung Laih}, title = {A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {474--491}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_30}, doi = {10.1007/978-3-540-40061-5\_30}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaST03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KurosawaI03, author = {Kaoru Kurosawa and Tetsu Iwata}, editor = {Marc Joye}, title = {{TMAC:} Two-Key {CBC} {MAC}}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {33--49}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_3}, doi = {10.1007/3-540-36563-X\_3}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KurosawaI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataK03, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Thomas Johansson}, title = {{OMAC:} One-Key {CBC} {MAC}}, booktitle = {Fast Software Encryption, 10th International Workshop, {FSE} 2003, Lund, Sweden, February 24-26, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2887}, pages = {129--153}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-39887-5\_11}, doi = {10.1007/978-3-540-39887-5\_11}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/IwataK03, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Jong In Lim and Dong Hoon Lee}, title = {On the Security of a New Variant of {OMAC}}, booktitle = {Information Security and Cryptology - {ICISC} 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2971}, pages = {67--78}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24691-6\_6}, doi = {10.1007/978-3-540-24691-6\_6}, timestamp = {Thu, 17 Nov 2022 14:05:51 +0100}, biburl = {https://dblp.org/rec/conf/icisc/IwataK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/IwataK03, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Kenneth G. Paterson}, title = {On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms}, booktitle = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester, UK, December 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2898}, pages = {306--318}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40974-8\_25}, doi = {10.1007/978-3-540-40974-8\_25}, timestamp = {Wed, 18 Mar 2020 16:01:02 +0100}, biburl = {https://dblp.org/rec/conf/ima/IwataK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/IwataK03, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Thomas Johansson and Subhamoy Maitra}, title = {Stronger Security Bounds for OMAC, TMAC, and {XCBC}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2904}, pages = {402--415}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24582-7\_30}, doi = {10.1007/978-3-540-24582-7\_30}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/IwataK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DesmedtKL03, author = {Yvo Desmedt and Kaoru Kurosawa and Tri Van Le}, editor = {Colin Boyd and Wenbo Mao}, title = {Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {396--407}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_30}, doi = {10.1007/10958513\_30}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/DesmedtKL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kurosawa03, author = {Kaoru Kurosawa}, title = {Almost Security of Cryptographic Boolean Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {75}, year = {2003}, url = {http://eprint.iacr.org/2003/075}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kurosawa03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataK03, author = {Tetsu Iwata and Kaoru Kurosawa}, title = {Stronger Security Bounds for OMAC, {TMAC} and {XCBC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {82}, year = {2003}, url = {http://eprint.iacr.org/2003/082}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataYK03, author = {Tetsu Iwata and Tohru Yagi and Kaoru Kurosawa}, title = {On the Pseudorandomness of {KASUMI} Type Permutations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {130}, year = {2003}, url = {http://eprint.iacr.org/2003/130}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataYK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaT03, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, title = {Some RSA-based Encryption Schemes with Tight Security Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2003}, url = {http://eprint.iacr.org/2003/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LeK03, author = {Tri Van Le and Kaoru Kurosawa}, title = {Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {244}, year = {2003}, url = {http://eprint.iacr.org/2003/244}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LeK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/KishimotoOKO02, author = {Wataru Kishimoto and Koji Okada and Kaoru Kurosawa and Wakaha Ogata}, title = {On the bound for anonymous secret sharing schemes}, journal = {Discret. Appl. Math.}, volume = {121}, number = {1-3}, pages = {193--202}, year = {2002}, url = {https://doi.org/10.1016/S0166-218X(01)00236-0}, doi = {10.1016/S0166-218X(01)00236-0}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/KishimotoOKO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/IwataYYK02, author = {Tetsu Iwata and Tomonobu Yoshino and Tomohiro Yuasa and Kaoru Kurosawa}, title = {Round Security and Super-Pseudorandomness of {MISTY} Type Structure}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {85-A}, number = {1}, pages = {2--10}, year = {2002}, url = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_2}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/IwataYYK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OgataK02, author = {Wakaha Ogata and Kaoru Kurosawa}, editor = {Yuliang Zheng}, title = {Bounds for Robust Metering Schemes and Their Relationship with A-code}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2501}, pages = {64--80}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36178-2\_4}, doi = {10.1007/3-540-36178-2\_4}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/OgataK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/KurosawaO02, author = {Kaoru Kurosawa and Wakaha Ogata}, editor = {Dieter Gollmann and G{\"{u}}nter Karjoth and Michael Waidner}, title = {Bit-Slice Auction Circuit}, booktitle = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2502}, pages = {24--38}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45853-0\_2}, doi = {10.1007/3-540-45853-0\_2}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/esorics/KurosawaO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataYK02, author = {Tetsu Iwata and Tomonobu Yoshino and Kaoru Kurosawa}, editor = {Joan Daemen and Vincent Rijmen}, title = {Non-cryptographic Primitive for Pseudorandom Permutation}, booktitle = {Fast Software Encryption, 9th International Workshop, {FSE} 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2365}, pages = {149--163}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45661-9\_12}, doi = {10.1007/3-540-45661-9\_12}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataYK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/IwataK02, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {On the Universal Hash Functionsin Luby-Rackoff Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {226--236}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_16}, doi = {10.1007/3-540-36552-4\_16}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/IwataK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Kurosawa02, author = {Kaoru Kurosawa}, editor = {David Naccache and Pascal Paillier}, title = {Multi-recipient Public-Key Encryption with Shortened Ciphertext}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {48--63}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_4}, doi = {10.1007/3-540-45664-3\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Kurosawa02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KurosawaY02, author = {Kaoru Kurosawa and Takuya Yoshida}, editor = {David Naccache and Pascal Paillier}, title = {Linear Code Implies Public-Key Traitor Tracing}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {172--187}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_12}, doi = {10.1007/3-540-45664-3\_12}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KurosawaY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaI02, author = {Kaoru Kurosawa and Tetsu Iwata}, title = {{TMAC:} Two-Key {CBC} {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2002}, url = {http://eprint.iacr.org/2002/092}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaI02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaIY02, author = {Kaoru Kurosawa and Tetsu Iwata and Takayuki Yoshiwara}, title = {New covering radius of Reed-Muller codes for t-resilient functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {123}, year = {2002}, url = {http://eprint.iacr.org/2002/123}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaIY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kurosawa02, author = {Kaoru Kurosawa}, title = {Power of a Public Random Permutation and its Application to Authenticated-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2002}, url = {http://eprint.iacr.org/2002/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kurosawa02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataK02, author = {Tetsu Iwata and Kaoru Kurosawa}, title = {{OMAC:} One-Key {CBC} {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {180}, year = {2002}, url = {http://eprint.iacr.org/2002/180}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OgataK02, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Oblivious Keyword Search}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {182}, year = {2002}, url = {http://eprint.iacr.org/2002/182}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OgataK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaO02, author = {Kaoru Kurosawa and Wakaha Ogata}, title = {Bit-Slice Auction Circuit}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {189}, year = {2002}, url = {http://eprint.iacr.org/2002/189}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ObanaK01, author = {Satoshi Obana and Kaoru Kurosawa}, title = {Bounds and Combinatorial Structure of Multi-Receiver-Codes}, journal = {Des. Codes Cryptogr.}, volume = {22}, number = {1}, pages = {47--63}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ObanaK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KurosawaO01, author = {Kaoru Kurosawa and Satoshi Obana}, title = {Combinatorial Bounds on Authentication Codes with Arbitration}, journal = {Des. Codes Cryptogr.}, volume = {22}, number = {3}, pages = {265--281}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KurosawaO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KurosawaJS01, author = {Kaoru Kurosawa and Thomas Johansson and Douglas R. Stinson}, title = {Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications}, journal = {J. Cryptol.}, volume = {14}, number = {4}, pages = {231--253}, year = {2001}, url = {https://doi.org/10.1007/s00145-001-0010-y}, doi = {10.1007/S00145-001-0010-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KurosawaJS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataYYK01, author = {Tetsu Iwata and Tomonobu Yoshino and Tomohiro Yuasa and Kaoru Kurosawa}, editor = {Mitsuru Matsui}, title = {Round Security and Super-Pseudorandomness of {MISTY} Type Structure}, booktitle = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2355}, pages = {233--247}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45473-X\_20}, doi = {10.1007/3-540-45473-X\_20}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataYYK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/YamamuraK01, author = {Akihiro Yamamura and Kaoru Kurosawa}, editor = {Peter Eades and Tadao Takaoka}, title = {Generic Algorithms and Key Agreement Protocols Based on Group Actions}, booktitle = {Algorithms and Computation, 12th International Symposium, {ISAAC} 2001, Christchurch, New Zealand, December 19-21, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2223}, pages = {208--218}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45678-3\_19}, doi = {10.1007/3-540-45678-3\_19}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isaac/YamamuraK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KurosawaOMM01, author = {Kaoru Kurosawa and Wakaha Ogata and Toshihiko Matsuo and Shuichi Makishima}, editor = {Kwangjo Kim}, title = {{IND-CCA} Public Key Schemes Equivalent to Factoring n=pq}, booktitle = {Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1992}, pages = {36--47}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-44586-2\_3}, doi = {10.1007/3-540-44586-2\_3}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KurosawaOMM01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/IwataYK01, author = {Tetsu Iwata and Takayuki Yoshiwara and Kaoru Kurosawa}, editor = {Serge Vaudenay and Amr M. Youssef}, title = {New Covering Radius of Reed-Muller Codes for t-Resilient Functions}, booktitle = {Selected Areas in Cryptography, 8th Annual International Workshop, {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2259}, pages = {75--86}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45537-X\_6}, doi = {10.1007/3-540-45537-X\_6}, timestamp = {Tue, 01 Jun 2021 15:22:31 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/IwataYK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kurosawa01, author = {Kaoru Kurosawa}, title = {Multi-Recipient Public-Key Encryption with Shortened Ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {71}, year = {2001}, url = {http://eprint.iacr.org/2001/071}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kurosawa01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaY01, author = {Kaoru Kurosawa and Takuya Yoshida}, title = {Linear Code Implies Public-Key Traitor Tracing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {99}, year = {2001}, url = {http://eprint.iacr.org/2001/099}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaY01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ObanaK00, author = {Satoshi Obana and Kaoru Kurosawa}, title = {Combinatorial Classification of Optimal Authentication Codes with Arbitration}, journal = {Des. Codes Cryptogr.}, volume = {20}, number = {3}, pages = {281--305}, year = {2000}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ObanaK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KurosawaSSK00, author = {Kaoru Kurosawa and Fumio Sato and Takahiro Sakata and Wataru Kishimoto}, title = {A relationship between linear complexity and kapa-error linear complexity}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {2}, pages = {694--698}, year = {2000}, url = {https://doi.org/10.1109/18.825845}, doi = {10.1109/18.825845}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KurosawaSSK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/OkadaK00, author = {Koji Okada and Kaoru Kurosawa}, title = {{MDS} secret-sharing scheme secure against cheaters}, journal = {{IEEE} Trans. Inf. Theory}, volume = {46}, number = {3}, pages = {1078--1081}, year = {2000}, url = {https://doi.org/10.1109/18.841188}, doi = {10.1109/18.841188}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/OkadaK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MitomoK00, author = {Masashi Mitomo and Kaoru Kurosawa}, editor = {Tatsuaki Okamoto}, title = {Attack for Flash {MIX}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {192--204}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_15}, doi = {10.1007/3-540-44448-3\_15}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MitomoK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OgataK00, author = {Wakaha Ogata and Kaoru Kurosawa}, editor = {Tatsuaki Okamoto}, title = {Provably Secure Metering Scheme}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1976}, pages = {388--398}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44448-3\_29}, doi = {10.1007/3-540-44448-3\_29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/OgataK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dlt/YamamuraK00, author = {Akihiro Yamamura and Kaoru Kurosawa}, editor = {Masami Ito and Teruo Imaoka}, title = {Key Agreement Protocol Securer than {DLOG}}, booktitle = {Proceedings of the International Colloquium on Words, Languages {\&} Combinatorics III, Kyoto, Japan, March 14-18, 2000}, pages = {450--465}, publisher = {World Scientific}, year = {2000}, timestamp = {Thu, 08 Dec 2011 13:57:12 +0100}, biburl = {https://dblp.org/rec/conf/dlt/YamamuraK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DesmedtK00, author = {Yvo Desmedt and Kaoru Kurosawa}, editor = {Bart Preneel}, title = {How to Break a Practical {MIX} and Design a New One}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1807}, pages = {557--572}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-45539-6\_39}, doi = {10.1007/3-540-45539-6\_39}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/DesmedtK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataK00, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Bruce Schneier}, title = {On the Pseudorandomness of the {AES} Finalists - {RC6} and Serpent}, booktitle = {Fast Software Encryption, 7th International Workshop, {FSE} 2000, New York, NY, USA, April 10-12, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1978}, pages = {231--243}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44706-7\_16}, doi = {10.1007/3-540-44706-7\_16}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KurosawaIQ00, author = {Kaoru Kurosawa and Tetsu Iwata and Quang Viet Duong}, editor = {Douglas R. Stinson and Stafford E. Tavares}, title = {Root Finding Interpolation Attack}, booktitle = {Selected Areas in Cryptography, 7th Annual International Workshop, {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2012}, pages = {303--314}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/3-540-44983-3\_22}, doi = {10.1007/3-540-44983-3\_22}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KurosawaIQ00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MitomoK00, author = {Masashi Mitomo and Kaoru Kurosawa}, title = {How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {65}, year = {2000}, url = {http://eprint.iacr.org/2000/065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MitomoK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KurosawaO99, author = {Kaoru Kurosawa and Wakaha Ogata}, title = {Efficient Rabin-type Digital Signature Scheme}, journal = {Des. Codes Cryptogr.}, volume = {16}, number = {1}, pages = {53--64}, year = {1999}, url = {https://doi.org/10.1023/A:1008374325369}, doi = {10.1023/A:1008374325369}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KurosawaO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BlundoSKO99, author = {Carlo Blundo and Alfredo De Santis and Kaoru Kurosawa and Wakaha Ogata}, title = {On a Fallacious Bound for Authentication Codes}, journal = {J. Cryptol.}, volume = {12}, number = {3}, pages = {155--159}, year = {1999}, url = {https://doi.org/10.1007/s001459900049}, doi = {10.1007/S001459900049}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BlundoSKO99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KurosawaY99, author = {Kaoru Kurosawa and Takuya Yoshida}, title = {Strongly universal hashing and identification codes via channels}, journal = {{IEEE} Trans. Inf. Theory}, volume = {45}, number = {6}, pages = {2091--2095}, year = {1999}, url = {https://doi.org/10.1109/18.782144}, doi = {10.1109/18.782144}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KurosawaY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SatohIK99, author = {Takashi Satoh and Tetsu Iwata and Kaoru Kurosawa}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {On Cryptographically Secure Vectorial Boolean Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {20--28}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_3}, doi = {10.1007/978-3-540-48000-6\_3}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SatohIK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/IwataK99, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Probabilistic Higher Order Differential Attack and Higher Order Bent Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {62--74}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_7}, doi = {10.1007/978-3-540-48000-6\_7}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/IwataK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KurosawaOSS98, author = {Kaoru Kurosawa and Koji Okada and Hajime Saido and Douglas R. Stinson}, title = {New Combinatorial Bounds for Authentication Codes and Key Predistribution Schemes}, journal = {Des. Codes Cryptogr.}, volume = {15}, number = {1}, pages = {87--100}, year = {1998}, url = {https://doi.org/10.1023/A:1008229625895}, doi = {10.1023/A:1008229625895}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KurosawaOSS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/OgataK98, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Some Basic Properties of General Nonperfect Secret Sharing Schemes}, journal = {J. Univers. Comput. Sci.}, volume = {4}, number = {8}, pages = {690--704}, year = {1998}, url = {https://doi.org/10.3217/jucs-004-08-0690}, doi = {10.3217/JUCS-004-08-0690}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/OgataK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/YamadaKHS98, author = {Isao Yamada and Kaoru Kurosawa and Hiroshi Hasegawa and Kohichi Sakaniwa}, title = {Algebraic multidimensional phase unwrapping and zero distribution of complex polynomials-characterization of multivariate stable polynomials}, journal = {{IEEE} Trans. Signal Process.}, volume = {46}, number = {6}, pages = {1639--1664}, year = {1998}, url = {https://doi.org/10.1109/78.678480}, doi = {10.1109/78.678480}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/YamadaKHS98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DesmedtKKK98, author = {Yvo Desmedt and Brian King and Wataru Kishimoto and Kaoru Kurosawa}, editor = {Colin Boyd and Ed Dawson}, title = {A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group}, booktitle = {Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1438}, pages = {391--402}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0053750}, doi = {10.1007/BFB0053750}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DesmedtKKK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaYDB98, author = {Kaoru Kurosawa and Takuya Yoshida and Yvo Desmedt and Mike Burmester}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Some Bounds and a Construction for Secure Broadcast Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {420--433}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_33}, doi = {10.1007/3-540-49649-1\_33}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaYDB98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaD98, author = {Kaoru Kurosawa and Yvo Desmedt}, editor = {Kaisa Nyberg}, title = {Optimum Traitor Tracing and Asymmetric Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {145--157}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054123}, doi = {10.1007/BFB0054123}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaD98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/IwataK98, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Cunsheng Ding and Tor Helleseth and Harald Niederreiter}, title = {Inclusion Relations of Boolean Functions Satisfying PC(l) of Order k}, booktitle = {Sequences and their Applications - Proceedings of {SETA} 1998, Singapore, December 14-17, 1998}, series = {Discrete Mathematics and Theoretical Computer Science}, pages = {263--272}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/978-1-4471-0551-0\_19}, doi = {10.1007/978-1-4471-0551-0\_19}, timestamp = {Mon, 16 Sep 2019 15:26:36 +0200}, biburl = {https://dblp.org/rec/conf/seta/IwataK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seta/SatoK98, author = {Fumio Sato and Kaoru Kurosawa}, editor = {Cunsheng Ding and Tor Helleseth and Harald Niederreiter}, title = {On the Randomness of a [d, k] Self-Decimation Stream Key Generator}, booktitle = {Sequences and their Applications - Proceedings of {SETA} 1998, Singapore, December 14-17, 1998}, series = {Discrete Mathematics and Theoretical Computer Science}, pages = {343--353}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/978-1-4471-0551-0\_26}, doi = {10.1007/978-1-4471-0551-0\_26}, timestamp = {Tue, 25 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/seta/SatoK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jucs/KurosawaSY97, author = {Kaoru Kurosawa and Takashi Satoh and Kentaro Yamamoto}, title = {Highly Nonlinear t-resilient Functions}, journal = {J. Univers. Comput. Sci.}, volume = {3}, number = {6}, pages = {721--729}, year = {1997}, url = {https://doi.org/10.3217/jucs-003-06-0721}, doi = {10.3217/JUCS-003-06-0721}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jucs/KurosawaSY97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurosawaO97, author = {Kaoru Kurosawa and Satoshi Obana}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Characterisation of (k, n) Multi-receiver Authentication}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {204--215}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027927}, doi = {10.1007/BFB0027927}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurosawaO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaJS97, author = {Kaoru Kurosawa and Thomas Johansson and Douglas R. Stinson}, editor = {Walter Fumy}, title = {Almost k-wise Independent Sample Spaces and Their Cryptologic Applications}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {409--421}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_28}, doi = {10.1007/3-540-69053-0\_28}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaJS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaS97, author = {Kaoru Kurosawa and Takashi Satoh}, editor = {Walter Fumy}, title = {Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria}, booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1233}, pages = {434--449}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/3-540-69053-0\_30}, doi = {10.1007/3-540-69053-0\_30}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaS97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ObanaK97, author = {Satoshi Obana and Kaoru Kurosawa}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {A\({}^{\mbox{2}}\)-code = Affine resolvable = {BIBD}}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {118--129}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028468}, doi = {10.1007/BFB0028468}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/ObanaK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/OgataKST97, author = {Wakaha Ogata and Kaoru Kurosawa and Kazue Sako and Kazunori Takatani}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {Fault tolerant anonymous channel}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {440--444}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028500}, doi = {10.1007/BFB0028500}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/OgataKST97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/OgataSK96, author = {Wakaha Ogata and Keiichi Sakano and Kaoru Kurosawa}, title = {Multisymbol Majority Vote and Hard Core}, journal = {Inf. Process. Lett.}, volume = {58}, number = {6}, pages = {285--292}, year = {1996}, url = {https://doi.org/10.1016/0020-0190(96)00058-0}, doi = {10.1016/0020-0190(96)00058-0}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/OgataSK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ObanaK96, author = {Satoshi Obana and Kaoru Kurosawa}, title = {Veto is Impossible in Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {58}, number = {6}, pages = {293--295}, year = {1996}, url = {https://doi.org/10.1016/0020-0190(96)00052-X}, doi = {10.1016/0020-0190(96)00052-X}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ObanaK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/KurosawaO96, author = {Kaoru Kurosawa and Koji Okada}, title = {Combinatorial Lower Bounds for Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {60}, number = {6}, pages = {301--304}, year = {1996}, url = {https://doi.org/10.1016/S0020-0190(96)00178-0}, doi = {10.1016/S0020-0190(96)00178-0}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/KurosawaO96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigpro/Kurosawa96, author = {Kaoru Kurosawa}, title = {Fast stability test algorithm for discrete time systems}, journal = {Signal Process.}, volume = {53}, number = {1}, pages = {83--88}, year = {1996}, url = {https://doi.org/10.1016/0165-1684(96)00078-3}, doi = {10.1016/0165-1684(96)00078-3}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigpro/Kurosawa96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaS96, author = {Kaoru Kurosawa and Takashi Satoh}, editor = {Kwangjo Kim and Tsutomu Matsumoto}, title = {Generalization of Higher Order {SAC} to Vector Output Boolean Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1163}, pages = {218--231}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0034849}, doi = {10.1007/BFB0034849}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaS96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/OgataK96, author = {Wakaha Ogata and Kaoru Kurosawa}, editor = {Ueli M. Maurer}, title = {Optimum Secret Sharing Scheme Secure against Cheating}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {200--211}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_18}, doi = {10.1007/3-540-68339-9\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/OgataK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/KurosawaOT95, author = {Kaoru Kurosawa and Koji Okada and Shigeo Tsujii}, title = {Low Exponent Attack Against Elliptic Curve {RSA}}, journal = {Inf. Process. Lett.}, volume = {53}, number = {2}, pages = {77--83}, year = {1995}, url = {https://doi.org/10.1016/0020-0190(94)00179-3}, doi = {10.1016/0020-0190(94)00179-3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/KurosawaOT95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cocoon/KurosawaK95, author = {Kaoru Kurosawa and Sanpei Kageyama}, editor = {Ding{-}Zhu Du and Ming Li}, title = {New Bound for Afine Resolvable Designs and Its Application to Authentication Codes}, booktitle = {Computing and Combinatorics, First Annual International Conference, {COCOON} '95, Xi'an, China, August 24-26, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {959}, pages = {292--302}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/BFb0030844}, doi = {10.1007/BFB0030844}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/cocoon/KurosawaK95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KurosawaOO95, author = {Kaoru Kurosawa and Satoshi Obana and Wakaha Ogata}, editor = {Don Coppersmith}, title = {t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {410--423}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_33}, doi = {10.1007/3-540-44750-4\_33}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KurosawaOO95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaO95, author = {Kaoru Kurosawa and Satoshi Obana}, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {Combinatorial Bounds for Authentication Codes with Arbitration}, booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, pages = {289--300}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X\_23}, doi = {10.1007/3-540-49264-X\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaO95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/KurosawaY95, author = {Kaoru Kurosawa and Naonori Yamashita}, title = {Power Complementary and Linear Phase Filter Banks}, booktitle = {1995 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 1995, Seattle, Washington, USA, April 30 - May 3, 1995}, pages = {760--763}, publisher = {{IEEE}}, year = {1995}, url = {https://doi.org/10.1109/ISCAS.1995.521628}, doi = {10.1109/ISCAS.1995.521628}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/KurosawaY95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OkadaK94, author = {Koji Okada and Kaoru Kurosawa}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {33--41}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000422}, doi = {10.1007/BFB0000422}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OkadaK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaO94, author = {Kaoru Kurosawa and Koji Okada}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Combinatorial Interpretation of Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {55--64}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000424}, doi = {10.1007/BFB0000424}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaO94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaOS94, author = {Kaoru Kurosawa and Koji Okada and Keiichi Sakano}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Security of the Center in Key Distribution Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {333--341}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000445}, doi = {10.1007/BFB0000445}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaOS94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaOT94, author = {Kaoru Kurosawa and Koji Okada and Shigeo Tsujii}, editor = {Josef Pieprzyk and Reihaneh Safavi{-}Naini}, title = {Low Exponent Attack against Elliptic Curve {RSA}}, booktitle = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {917}, pages = {376--383}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/BFb0000449}, doi = {10.1007/BFB0000449}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaOT94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Kurosawa94, author = {Kaoru Kurosawa}, editor = {Yvo Desmedt}, title = {New Bound on Authentication Code with Arbitration}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {140--149}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_16}, doi = {10.1007/3-540-48658-5\_16}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Kurosawa94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/KurosawaYYK94, author = {Kaoru Kurosawa and Isao Yamada and Naonori Yamashita and Toshiriro Komou}, title = {Optimum Highpass Filter in Linear Phase Perfect Reconstruction {QMF} Bank}, booktitle = {1994 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 1994, London, England, UK, May 30 - June 2, 1994}, pages = {25--28}, publisher = {{IEEE}}, year = {1994}, url = {https://doi.org/10.1109/ISCAS.1994.408896}, doi = {10.1109/ISCAS.1994.408896}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/KurosawaYYK94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/KurosawaYI94, author = {Kaoru Kurosawa and Isao Yamada and Masayuki Ihara}, title = {A Necessary Condition for Linear Phase in Two Dimensional Perfect Reconstruction {QMF} Banks}, booktitle = {1994 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 1994, London, England, UK, May 30 - June 2, 1994}, pages = {29--32}, publisher = {{IEEE}}, year = {1994}, url = {https://doi.org/10.1109/ISCAS.1994.408897}, doi = {10.1109/ISCAS.1994.408897}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/KurosawaYI94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/Kurosawa94, author = {Kaoru Kurosawa}, title = {On McClellan Transform and 2-D {QMF} Banks}, booktitle = {1994 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 1994, London, England, UK, May 30 - June 2, 1994}, pages = {505--508}, publisher = {{IEEE}}, year = {1994}, url = {https://doi.org/10.1109/ISCAS.1994.409036}, doi = {10.1109/ISCAS.1994.409036}, timestamp = {Wed, 16 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/Kurosawa94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaOSOT93, author = {Kaoru Kurosawa and Koji Okada and Keiichi Sakano and Wakaha Ogata and Shigeo Tsujii}, editor = {Tor Helleseth}, title = {Nonperfect Secret Sharing Schemes and Matroids}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {126--141}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_11}, doi = {10.1007/3-540-48285-7\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaOSOT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ParkIK93, author = {Choonsik Park and Kazutomo Itoh and Kaoru Kurosawa}, editor = {Tor Helleseth}, title = {Efficient Anonymous Channel and All/Nothing Election Scheme}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {248--259}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_21}, doi = {10.1007/3-540-48285-7\_21}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ParkIK93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/ParkKOT93, author = {Choonsik Park and Kaoru Kurosawa and Tatsuaki Okamoto and Shigeo Tsujii}, editor = {Tor Helleseth}, title = {On Key Distribution and Authentication in Mobile Radio Networks}, booktitle = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {765}, pages = {461--465}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-48285-7\_42}, doi = {10.1007/3-540-48285-7\_42}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/ParkKOT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/KurosawaYYT93, author = {Kaoru Kurosawa and Isao Yamada and Tetsunari Yokokawa and Shigeo Tsujii}, title = {A fast stability test for multidimensional systems}, booktitle = {1993 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 1993, Chicago, Illinois, USA, May 3-6, 1993}, pages = {579--582}, publisher = {{IEEE}}, year = {1993}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/KurosawaYYT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/KurosawaKT93, author = {Kaoru Kurosawa and Kouichi Kawabe and Shigeo Tsujii}, title = {Stability and zeros of a complex polynomial}, booktitle = {1993 {IEEE} International Symposium on Circuits and Systems, {ISCAS} 1993, Chicago, Illinois, USA, May 3-6, 1993}, pages = {2279--2282}, publisher = {{IEEE}}, year = {1993}, timestamp = {Fri, 20 May 2016 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iscas/KurosawaKT93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OgataKT92, author = {Wakaha Ogata and Kaoru Kurosawa and Shigeo Tsujii}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {Nonperfect Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {56--66}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_52}, doi = {10.1007/3-540-57220-1\_52}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/OgataKT92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SatohKT92, author = {Takashi Satoh and Kaoru Kurosawa and Shigeo Tsujii}, editor = {Jennifer Seberry and Yuliang Zheng}, title = {Privacy for Multi-Party Protocols}, booktitle = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {718}, pages = {252--260}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-57220-1\_67}, doi = {10.1007/3-540-57220-1\_67}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SatohKT92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/KurosawaW92, author = {Kaoru Kurosawa and Osamu Watanabe}, editor = {Toshihide Ibaraki and Yasuyoshi Inagaki and Kazuo Iwama and Takao Nishizeki and Masafumi Yamashita}, title = {Computational and Statistical Indistinguishabilities}, booktitle = {Algorithms and Computation, Third International Symposium, {ISAAC} '92, Nagoya, Japan, December 16-18, 1992, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {650}, pages = {430--438}, publisher = {Springer}, year = {1992}, url = {https://doi.org/10.1007/3-540-56279-6\_95}, doi = {10.1007/3-540-56279-6\_95}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/KurosawaW92.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/OgataK91, author = {Wakaha Ogata and Kaoru Kurosawa}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {On Claw Free Families}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {111--123}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_9}, doi = {10.1007/3-540-57332-1\_9}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/OgataK91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SaitoKS91, author = {Takeshi Saito and Kaoru Kurosawa and Kouichi Sakurai}, editor = {Hideki Imai and Ronald L. Rivest and Tsutomu Matsumoto}, title = {4 Move Perfect {ZKIP} of Knowledge with No Assumption}, booktitle = {Advances in Cryptology - {ASIACRYPT} '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {739}, pages = {321--330}, publisher = {Springer}, year = {1991}, url = {https://doi.org/10.1007/3-540-57332-1\_27}, doi = {10.1007/3-540-57332-1\_27}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SaitoKS91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KurosawaT90, author = {Kaoru Kurosawa and Shigeo Tsujii}, editor = {Alfred Menezes and Scott A. Vanstone}, title = {Multi-Language Zero Knowledge Interactive Proof Systems}, booktitle = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {537}, pages = {339--352}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-38424-3\_25}, doi = {10.1007/3-540-38424-3\_25}, timestamp = {Fri, 17 Jul 2020 16:12:45 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KurosawaT90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaKOT90, author = {Kaoru Kurosawa and Yutaka Katayama and Wakaha Ogata and Shigeo Tsujii}, editor = {Ivan Damg{\aa}rd}, title = {General Public Key Residue Cryptosystems and Mental Poker Protocols}, booktitle = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {473}, pages = {374--388}, publisher = {Springer}, year = {1990}, url = {https://doi.org/10.1007/3-540-46877-3\_34}, doi = {10.1007/3-540-46877-3\_34}, timestamp = {Fri, 17 Jul 2020 16:12:46 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaKOT90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/SuganumaKY89, author = {Tomohisa Suganuma and Kaoru Kurosawa and Ni Yongmao}, title = {A polynomial time validation method for channel boundedness of communication protocols {(2} processes)}, journal = {Syst. Comput. Jpn.}, volume = {20}, number = {11}, pages = {60--66}, year = {1989}, url = {https://doi.org/10.1002/scj.4690201106}, doi = {10.1002/SCJ.4690201106}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/SuganumaKY89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/KurosawaT89, author = {Kaoru Kurosawa and Shigeo Tsujii}, title = {An {IIR} parallel-type adaptive algorithm using the fast least squares method}, journal = {{IEEE} Trans. Acoust. Speech Signal Process.}, volume = {37}, number = {8}, pages = {1226--1230}, year = {1989}, url = {https://doi.org/10.1109/29.31270}, doi = {10.1109/29.31270}, timestamp = {Tue, 19 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsp/KurosawaT89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptologia/KurosawaIT88, author = {Kaoru Kurosawa and Toshiya Itoh and Masashi Takeuchi}, title = {Public Key Cryptosystem using a reciprocal number with the same Intractability as Factoring a Large number}, journal = {Cryptologia}, volume = {12}, number = {4}, pages = {225--233}, year = {1988}, url = {https://doi.org/10.1080/0161-118891862972}, doi = {10.1080/0161-118891862972}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptologia/KurosawaIT88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/TsujiiIFKM88, author = {Shigeo Tsujii and Toshiya Itoh and Atsushi Fujioka and Kaoru Kurosawa and Tsutomu Matsumoto}, title = {A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations}, journal = {Syst. Comput. Jpn.}, volume = {19}, number = {2}, pages = {10--18}, year = {1988}, url = {https://doi.org/10.1002/scj.4690190202}, doi = {10.1002/SCJ.4690190202}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/TsujiiIFKM88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scjapan/KurosawaKS88, author = {Kaoru Kurosawa and Yoshiki Kuwabara and Takashi Shigeno}, title = {A Validation Method for Communication Protocols Using Context-Free Language Theory}, journal = {Syst. Comput. Jpn.}, volume = {19}, number = {4}, pages = {48--55}, year = {1988}, url = {https://doi.org/10.1002/scj.4690190405}, doi = {10.1002/SCJ.4690190405}, timestamp = {Wed, 13 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scjapan/KurosawaKS88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icassp/KurosawaT86, author = {Kaoru Kurosawa and Shigeo Tsujii}, title = {A new {IIR} type adaptive algorithm of parallel type structure}, booktitle = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing, {ICASSP} 1986, Tokyo, Japan, April 7-11, 1986}, pages = {2091--2094}, publisher = {{IEEE}}, year = {1986}, url = {https://doi.org/10.1109/ICASSP.1986.1169129}, doi = {10.1109/ICASSP.1986.1169129}, timestamp = {Mon, 09 Aug 2021 14:54:02 +0200}, biburl = {https://dblp.org/rec/conf/icassp/KurosawaT86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/KurosawaT86, author = {Kaoru Kurosawa and Shigeo Tsujii}, title = {An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to {HDLC}}, booktitle = {{IEEE} International Conference on Communications: Integrating the World Through Communications, {ICC} 1986, Toronto, Canada, June 22-25, 1986, Proceedings}, pages = {563--567}, publisher = {{IEEE}}, year = {1986}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/KurosawaT86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.