BibTeX records: Kaoru Kurosawa

download as .bib file

@inproceedings{DBLP:conf/eurocrypt/EriguchiKN24,
  author       = {Reo Eriguchi and
                  Kaoru Kurosawa and
                  Koji Nuida},
  editor       = {Marc Joye and
                  Gregor Leander},
  title        = {Efficient and Generic Methods to Achieve Active Security in Private
                  Information Retrieval and More Advanced Database Search},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2024 - 43rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zurich, Switzerland, May 26-30, 2024, Proceedings, Part {V}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14655},
  pages        = {92--121},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-58740-5\_4},
  doi          = {10.1007/978-3-031-58740-5\_4},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/EriguchiKN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EriguchiKN24,
  author       = {Reo Eriguchi and
                  Kaoru Kurosawa and
                  Koji Nuida},
  title        = {Efficient and Generic Methods to Achieve Active Security in Private
                  Information Retrieval and More Advanced Database Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/375},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EriguchiKN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EriguchiKN23,
  author       = {Reo Eriguchi and
                  Kaoru Kurosawa and
                  Koji Nuida},
  title        = {New Generic Constructions of Error-Correcting {PIR} and Efficient
                  Instantiations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {210},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/210},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EriguchiKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/TomitaOK22,
  author       = {Toi Tomita and
                  Wakaha Ogata and
                  Kaoru Kurosawa},
  title        = {Boosting {CPA} to {CCA2} for Leakage-Resilient Attribute-Based Encryption
                  by Using New {QA-NIZK}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {3},
  pages        = {143--159},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021cip0003},
  doi          = {10.1587/TRANSFUN.2021CIP0003},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/TomitaOK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/EriguchiKN22,
  author       = {Reo Eriguchi and
                  Kaoru Kurosawa and
                  Koji Nuida},
  editor       = {Dana Dachman{-}Soled},
  title        = {Multi-Server {PIR} with Full Error Detection and Limited Error Correction},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {1:1--1:20},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.1},
  doi          = {10.4230/LIPICS.ITC.2022.1},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/EriguchiKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/EriguchiKN22,
  author       = {Reo Eriguchi and
                  Kaoru Kurosawa and
                  Koji Nuida},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {On the Optimal Communication Complexity of Error-Correcting Multi-server
                  {PIR}},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13749},
  pages        = {60--88},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22368-6\_3},
  doi          = {10.1007/978-3-031-22368-6\_3},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/EriguchiKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EriguchiKN22,
  author       = {Reo Eriguchi and
                  Kaoru Kurosawa and
                  Koji Nuida},
  title        = {Multi-Server {PIR} with Full Error Detection and Limited Error Correction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/500},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EriguchiKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EriguchiKN22a,
  author       = {Reo Eriguchi and
                  Kaoru Kurosawa and
                  Koji Nuida},
  title        = {On the Optimal Communication Complexity of Error-Correcting Multi-Server
                  {PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1206},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1206},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EriguchiKN22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DaizaK21,
  author       = {Takanori Daiza and
                  Kaoru Kurosawa},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Optimum Attack on 3-Round Feistel-2 Structure},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {175--192},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_10},
  doi          = {10.1007/978-3-030-85987-9\_10},
  timestamp    = {Fri, 03 Sep 2021 14:25:23 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DaizaK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/TomitaOKK20,
  author       = {Toi Tomita and
                  Wakaha Ogata and
                  Kaoru Kurosawa and
                  Ryo Kuwayama},
  title        = {CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type
                  Assumptions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {10},
  pages        = {1157--1166},
  year         = {2020},
  url          = {https://doi.org/10.1587/transfun.2019DMP0013},
  doi          = {10.1587/TRANSFUN.2019DMP0013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/TomitaOKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/LohHTK20,
  author       = {Jia{-}Ch'ng Loh and
                  Swee{-}Huay Heng and
                  Syh{-}Yuan Tan and
                  Kaoru Kurosawa},
  title        = {On the Invisibility and Anonymity of Undeniable Signature Schemes},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {11},
  number       = {1},
  pages        = {18--34},
  year         = {2020},
  url          = {https://doi.org/10.22667/JOWUA.2020.03.31.018},
  doi          = {10.22667/JOWUA.2020.03.31.018},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/LohHTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OgataK19,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  title        = {No-Dictionary Searchable Symmetric Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {1},
  pages        = {114--124},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.114},
  doi          = {10.1587/TRANSFUN.E102.A.114},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OgataK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Kurosawa19,
  author       = {Kaoru Kurosawa},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {How to Correct Errors in Multi-server {PIR}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  pages        = {564--574},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8\_20},
  doi          = {10.1007/978-3-030-34621-8\_20},
  timestamp    = {Fri, 22 Nov 2019 13:52:52 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Kurosawa19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TomitaOK19,
  author       = {Toi Tomita and
                  Wakaha Ogata and
                  Kaoru Kurosawa},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from
                  Simple (Not {\textbackslash}mathtt q -type) Assumptions},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_1},
  doi          = {10.1007/978-3-030-26834-3\_1},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TomitaOK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaUMS19,
  author       = {Kaoru Kurosawa and
                  Akinaga Ueda and
                  Hayato Matsuhashi and
                  Yusuke Sakagami},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {How to Solve Multiple Short-Exponent Discrete Logarithm Problem},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {53--64},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_4},
  doi          = {10.1007/978-3-030-26834-3\_4},
  timestamp    = {Wed, 07 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KurosawaUMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/LohHTK19,
  author       = {Jia{-}Ch'ng Loh and
                  Swee{-}Huay Heng and
                  Syh{-}Yuan Tan and
                  Kaoru Kurosawa},
  editor       = {Ilsun You},
  title        = {A Note on the Invisibility and Anonymity of Undeniable Signature Schemes},
  booktitle    = {Information Security Applications - 20th International Conference,
                  {WISA} 2019, Jeju Island, South Korea, August 21-24, 2019, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11897},
  pages        = {112--125},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39303-8\_9},
  doi          = {10.1007/978-3-030-39303-8\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/LohHTK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurosawa19,
  author       = {Kaoru Kurosawa},
  title        = {How to Correct Errors in Multi-Server {PIR}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {531},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/531},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurosawa19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TomitaOKK19,
  author       = {Toi Tomita and
                  Wakaha Ogata and
                  Kaoru Kurosawa and
                  Ryo Kuwayama},
  title        = {CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from
                  Simple (not {\textdollar}{\textbackslash}mathtt\{q\}{\textdollar}-type)
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {982},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/982},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TomitaOKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/UedaTK18,
  author       = {Akinaga Ueda and
                  Hayato Tada and
                  Kaoru Kurosawa},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {(Short Paper) How to Solve {DLOG} Problem with Auxiliary Input},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {104--113},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_7},
  doi          = {10.1007/978-3-319-97916-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/UedaTK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/TadaUK18,
  author       = {Hayato Tada and
                  Akinaga Ueda and
                  Kaoru Kurosawa},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {How to Prove {KDM} Security of {BHHO}},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {281--296},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_18},
  doi          = {10.1007/978-3-319-97916-8\_18},
  timestamp    = {Wed, 08 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/TadaUK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KurosawaOK17,
  author       = {Kaoru Kurosawa and
                  Hiroyuki Ohta and
                  Kenji Kakuta},
  title        = {How to make a linear network code (strongly) secure},
  journal      = {Des. Codes Cryptogr.},
  volume       = {82},
  number       = {3},
  pages        = {559--582},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0180-0},
  doi          = {10.1007/S10623-016-0180-0},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KurosawaOK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KurosawaP17,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  title        = {Anonymous and leakage resilient {IBE} and {IPE}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {85},
  number       = {2},
  pages        = {273--298},
  year         = {2017},
  url          = {https://doi.org/10.1007/s10623-016-0303-7},
  doi          = {10.1007/S10623-016-0303-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KurosawaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ItakuraKY17,
  author       = {Naoto Itakura and
                  Kaoru Kurosawa and
                  Kazuki Yoneyama},
  title        = {Oblivious Polynomial Evaluation in the Exponent, Revisited},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {1},
  pages        = {26--33},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.26},
  doi          = {10.1587/TRANSFUN.E100.A.26},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ItakuraKY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/KurosawaP17,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  title        = {{IBE} and function-private {IBE} under linear assumptions with shorter
                  ciphertexts and private keys, and extensions},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {210--224},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007292},
  doi          = {10.1504/IJACT.2017.10007292},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/KurosawaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KurosawaH17,
  author       = {Kaoru Kurosawa and
                  Rie Habuka},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {More Efficient Construction of Bounded {KDM} Secure Encryption},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {354--372},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_18},
  doi          = {10.1007/978-3-319-61204-1\_18},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KurosawaH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/OgataK17,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  editor       = {Aggelos Kiayias},
  title        = {Efficient No-dictionary Verifiable Searchable Symmetric Encryption},
  booktitle    = {Financial Cryptography and Data Security - 21st International Conference,
                  {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10322},
  pages        = {498--516},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70972-7\_28},
  doi          = {10.1007/978-3-319-70972-7\_28},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/OgataK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaSOY16,
  author       = {Kaoru Kurosawa and
                  Keisuke Sasaki and
                  Kiyohiko Ohta and
                  Kazuki Yoneyama},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {UC-Secure Dynamic Searchable Symmetric Encryption Scheme},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_5},
  doi          = {10.1007/978-3-319-44524-3\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KurosawaSOY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OgataK16,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  title        = {Efficient No-dictionary Verifiable {SSE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {981},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/981},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OgataK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KurosawaNP15,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {Generic Fully Simulatable Adaptive Oblivious Transfer},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {232--245},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.232},
  doi          = {10.1587/TRANSFUN.E98.A.232},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KurosawaNP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ImaiK15,
  author       = {Shigeyoshi Imai and
                  Kaoru Kurosawa},
  title        = {Improved reconstruction of {RSA} private-keys from their fraction},
  journal      = {Inf. Process. Lett.},
  volume       = {115},
  number       = {6-8},
  pages        = {630--632},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.ipl.2015.02.013},
  doi          = {10.1016/J.IPL.2015.02.013},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ImaiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurosawaP15,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {{IBE} Under k k -LIN with Shorter Ciphertexts and Private Keys},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_9},
  doi          = {10.1007/978-3-319-19962-7\_9},
  timestamp    = {Tue, 07 May 2024 20:09:57 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurosawaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/NuidaIK15,
  author       = {Koji Nuida and
                  Naoto Itakura and
                  Kaoru Kurosawa},
  editor       = {Kaisa Nyberg},
  title        = {A Simple and Improved Algorithm for Integer Factorization with Implicit
                  Hints},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {258--269},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_14},
  doi          = {10.1007/978-3-319-16715-2\_14},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/NuidaIK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NuidaK15,
  author       = {Koji Nuida and
                  Kaoru Kurosawa},
  editor       = {Elisabeth Oswald and
                  Marc Fischlin},
  title        = {(Batch) Fully Homomorphic Encryption over Integers for Non-Binary
                  Message Spaces},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2015 - 34th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9056},
  pages        = {537--555},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-46800-5\_21},
  doi          = {10.1007/978-3-662-46800-5\_21},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NuidaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaO15,
  author       = {Kaoru Kurosawa and
                  Yasuhiro Ohtaki},
  title        = {How to Construct UC-Secure Searchable Symmetric Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {251},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/251},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KurosawaNP14,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {Relation between Verifiable Random Functions and Convertible Undeniable
                  Signatures, and New Constructions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {1},
  pages        = {215--224},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.215},
  doi          = {10.1587/TRANSFUN.E97.A.215},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KurosawaNP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/KurosawaP14,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  editor       = {David Pointcheval and
                  Damien Vergnaud},
  title        = {Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2014 - 7th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8469},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-06734-6\_4},
  doi          = {10.1007/978-3-319-06734-6\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/KurosawaP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KurosawaF14,
  author       = {Kaoru Kurosawa and
                  Jun Furukawa},
  editor       = {Josh Benaloh},
  title        = {2-Pass Key Exchange Protocols from CPA-Secure {KEM}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {385--401},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_20},
  doi          = {10.1007/978-3-319-04852-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KurosawaF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/Kurosawa14,
  author       = {Kaoru Kurosawa},
  editor       = {Nicolas Christin and
                  Reihaneh Safavi{-}Naini},
  title        = {Garbled Searchable Symmetric Encryption},
  booktitle    = {Financial Cryptography and Data Security - 18th International Conference,
                  {FC} 2014, Christ Church, Barbados, March 3-7, 2014, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8437},
  pages        = {234--251},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45472-5\_15},
  doi          = {10.1007/978-3-662-45472-5\_15},
  timestamp    = {Tue, 21 Mar 2023 20:59:40 +0100},
  biburl       = {https://dblp.org/rec/conf/fc/Kurosawa14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NuidaK14,
  author       = {Koji Nuida and
                  Kaoru Kurosawa},
  title        = {(Batch) Fully Homomorphic Encryption over Integers for Non-Binary
                  Message Spaces},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {777},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/777},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NuidaK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NuidaIK14,
  author       = {Koji Nuida and
                  Naoto Itakura and
                  Kaoru Kurosawa},
  title        = {A Simple and Improved Algorithm for Integer Factorization with Implicit
                  Hints},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {839},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/839},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NuidaIK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/KurosawaNP13,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {New leakage-resilient CCA-secure public key encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {4},
  pages        = {297--312},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2013-5007},
  doi          = {10.1515/JMC-2013-5007},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/KurosawaNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KurosawaP13,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  editor       = {Michael J. Jacobson Jr. and
                  Michael E. Locasto and
                  Payman Mohassel and
                  Reihaneh Safavi{-}Naini},
  title        = {Leakage Resilient {IBE} and {IPE} under the {DLIN} Assumption},
  booktitle    = {Applied Cryptography and Network Security - 11th International Conference,
                  {ACNS} 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7954},
  pages        = {487--501},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38980-1\_31},
  doi          = {10.1007/978-3-642-38980-1\_31},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KurosawaP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KurosawaO13,
  author       = {Kaoru Kurosawa and
                  Yasuhiro Ohtaki},
  editor       = {Michel Abdalla and
                  Cristina Nita{-}Rotaru and
                  Ricardo Dahab},
  title        = {How to Update Documents Verifiably in Searchable Symmetric Encryption},
  booktitle    = {Cryptology and Network Security - 12th International Conference, {CANS}
                  2013, Paraty, Brazil, November 20-22. 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8257},
  pages        = {309--328},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-02937-5\_17},
  doi          = {10.1007/978-3-319-02937-5\_17},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/KurosawaO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KurosawaOK13,
  author       = {Kaoru Kurosawa and
                  Hiroyuki Ohta and
                  Kenji Kakuta},
  editor       = {Carles Padr{\'{o}}},
  title        = {How to Construct Strongly Secure Network Coding Scheme},
  booktitle    = {Information Theoretic Security - 7th International Conference, {ICITS}
                  2013, Singapore, November 28-30, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8317},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-04268-8\_1},
  doi          = {10.1007/978-3-319-04268-8\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KurosawaOK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KurosawaU13,
  author       = {Kaoru Kurosawa and
                  Takuma Ueda},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {How to Factor {N} 1 and {N} 2 When {\textdollar}p{\_}1=p{\_}2 {\textbackslash}bmod
                  2{\^{}}t{\textdollar}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {217--225},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_14},
  doi          = {10.1007/978-3-642-41383-4\_14},
  timestamp    = {Sun, 04 Aug 2024 19:41:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KurosawaU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pkc/2013,
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7},
  doi          = {10.1007/978-3-642-36362-7},
  isbn         = {978-3-642-36361-0},
  timestamp    = {Fri, 01 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaNP13,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {UC-Secure Multi-Session {OT} Using Tamper-Proof Hardware},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {77},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/077},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaNP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaU13,
  author       = {Kaoru Kurosawa and
                  Takuma Ueda},
  title        = {How to Factor N\({}_{\mbox{1}}\) and N\({}_{\mbox{2}}\) When p\({}_{\mbox{1}}\)=p\({}_{\mbox{2}}\)
                  mod 2\({}^{\mbox{t}}\)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaU13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaP13,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  title        = {Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {765},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/765},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kurosawa12,
  author       = {Kaoru Kurosawa},
  title        = {Round-efficient perfectly secure message transmission scheme against
                  general adversary},
  journal      = {Des. Codes Cryptogr.},
  volume       = {63},
  number       = {2},
  pages        = {199--207},
  year         = {2012},
  url          = {https://doi.org/10.1007/s10623-011-9546-5},
  doi          = {10.1007/S10623-011-9546-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kurosawa12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/PhongKO12,
  author       = {Le Trieu Phong and
                  Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {Undeniable and Unpretendable Signatures},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {138--150},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.138},
  doi          = {10.1587/TRANSFUN.E95.A.138},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/PhongKO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurosawaNP12,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Relation between Verifiable Random Functions and Convertible Undeniable
                  Signatures, and New Constructions},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_18},
  doi          = {10.1007/978-3-642-31448-3\_18},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurosawaNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/KurosawaO12,
  author       = {Kaoru Kurosawa and
                  Yasuhiro Ohtaki},
  editor       = {Angelos D. Keromytis},
  title        = {UC-Secure Searchable Symmetric Encryption},
  booktitle    = {Financial Cryptography and Data Security - 16th International Conference,
                  {FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7397},
  pages        = {285--298},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32946-3\_21},
  doi          = {10.1007/978-3-642-32946-3\_21},
  timestamp    = {Tue, 30 Jul 2024 10:38:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/KurosawaO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaNP12,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {Relation between Verifiable Random Functions and Convertible Undeniable
                  Signatures, and New Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {213},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/213},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaNP12a,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {New Leakage Resilient CCA-Secure Public Key Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {453},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/453},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaNP12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SakaiHKO11,
  author       = {Yusuke Sakai and
                  Goichiro Hanaoka and
                  Kaoru Kurosawa and
                  Kazuo Ohta},
  title        = {How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms
                  in the Random Oracle Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {6},
  pages        = {1293--1305},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1293},
  doi          = {10.1587/TRANSFUN.E94.A.1293},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SakaiHKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Kurosawa11,
  author       = {Kaoru Kurosawa},
  title        = {General Error Decodable Secret Sharing Scheme and Its Application},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {57},
  number       = {9},
  pages        = {6304--6309},
  year         = {2011},
  url          = {https://doi.org/10.1109/TIT.2011.2161927},
  doi          = {10.1109/TIT.2011.2161927},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/Kurosawa11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KurosawaNP11,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Generic Fully Simulatable Adaptive Oblivious Transfer},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {274--291},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_16},
  doi          = {10.1007/978-3-642-21554-4\_16},
  timestamp    = {Thu, 29 Aug 2019 08:10:02 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KurosawaNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ChoudhuryKP11,
  author       = {Ashish Choudhury and
                  Kaoru Kurosawa and
                  Arpita Patra},
  editor       = {Javier L{\'{o}}pez and
                  Gene Tsudik},
  title        = {Simple and Efficient Single Round almost Perfectly Secure Message
                  Transmission Tolerating Generalized Adversary},
  booktitle    = {Applied Cryptography and Network Security - 9th International Conference,
                  {ACNS} 2011, Nerja, Spain, June 7-10, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6715},
  pages        = {292--308},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21554-4\_17},
  doi          = {10.1007/978-3-642-21554-4\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/ChoudhuryKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/ChoudhuryKP11,
  author       = {Ashish Choudhury and
                  Kaoru Kurosawa and
                  Arpita Patra},
  editor       = {Serge Fehr},
  title        = {The Round Complexity of Perfectly Secure General {VSS}},
  booktitle    = {Information Theoretic Security - 5th International Conference, {ICITS}
                  2011, Amsterdam, The Netherlands, May 21-24, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6673},
  pages        = {143--162},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20728-0\_14},
  doi          = {10.1007/978-3-642-20728-0\_14},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/ChoudhuryKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:reference/crypt/Kurosawa11,
  author       = {Kaoru Kurosawa},
  editor       = {Henk C. A. van Tilborg and
                  Sushil Jajodia},
  title        = {Hybrid Encryption},
  booktitle    = {Encyclopedia of Cryptography and Security, 2nd Ed},
  pages        = {570--572},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-5906-5\_321},
  doi          = {10.1007/978-1-4419-5906-5\_321},
  timestamp    = {Wed, 12 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/reference/crypt/Kurosawa11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryKP11,
  author       = {Ashish Choudhury and
                  Kaoru Kurosawa and
                  Arpita Patra},
  title        = {Simple and Efficient Single Round Almost Perfectly Secure Message
                  Transmission Tolerating Generalized Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryKP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaNP11,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {Generic Fully Simulatable Adaptive Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaNP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaP11,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  title        = {Maximum Leakage Resilient {IBE} and {IPE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {628},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/628},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/PhongKO10,
  author       = {Le Trieu Phong and
                  Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {New RSA-Based (Selectively) Convertible Undeniable Signature Schemes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {63--75},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.63},
  doi          = {10.1587/TRANSFUN.E93.A.63},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/PhongKO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanaokaK10,
  author       = {Goichiro Hanaoka and
                  Kaoru Kurosawa},
  title        = {Between Hashed {DH} and Computational {DH:} Compact Encryption from
                  Weaker Assumption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {11},
  pages        = {1994--2006},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1994},
  doi          = {10.1587/TRANSFUN.E93.A.1994},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanaokaK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/DesmedtGKS10,
  author       = {Yvo Desmedt and
                  Rosario Gennaro and
                  Kaoru Kurosawa and
                  Victor Shoup},
  title        = {A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext
                  Attack},
  journal      = {J. Cryptol.},
  volume       = {23},
  number       = {1},
  pages        = {91--120},
  year         = {2010},
  url          = {https://doi.org/10.1007/s00145-009-9051-4},
  doi          = {10.1007/S00145-009-9051-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/DesmedtGKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/Kurosawa10,
  author       = {Kaoru Kurosawa},
  title        = {Power of a public random permutation and its application to authenticated
                  encryption},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {56},
  number       = {10},
  pages        = {5366--5374},
  year         = {2010},
  url          = {https://doi.org/10.1109/TIT.2010.2059636},
  doi          = {10.1109/TIT.2010.2059636},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/Kurosawa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/Kurosawa10,
  author       = {Kaoru Kurosawa},
  editor       = {Swee{-}Huay Heng and
                  Rebecca N. Wright and
                  Bok{-}Min Goi},
  title        = {Cryptography for Unconditionally Secure Message Transmission in Networks
                  (Invited Talk)},
  booktitle    = {Cryptology and Network Security - 9th International Conference, {CANS}
                  2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6467},
  pages        = {43},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17619-7\_4},
  doi          = {10.1007/978-3-642-17619-7\_4},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/Kurosawa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SakaiHKO10,
  author       = {Yusuke Sakai and
                  Goichiro Hanaoka and
                  Kaoru Kurosawa and
                  Kazuo Ohta},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {A Generic Method for Reducing Ciphertext Length of Reproducible KEMs
                  in the {RO} Model},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_5},
  doi          = {10.1007/978-3-642-16825-3\_5},
  timestamp    = {Mon, 15 Jun 2020 17:00:57 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SakaiHKO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KurosawaNP10,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Efficiency-Improved Fully Simulatable Adaptive {OT} under the {DDH}
                  Assumption},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {172--181},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_12},
  doi          = {10.1007/978-3-642-15317-4\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KurosawaNP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/PhongKO10,
  author       = {Le Trieu Phong and
                  Kaoru Kurosawa and
                  Wakaha Ogata},
  editor       = {Juan A. Garay and
                  Roberto De Prisco},
  title        = {Provably Secure Convertible Undeniable Signatures with Unambiguity},
  booktitle    = {Security and Cryptography for Networks, 7th International Conference,
                  {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6280},
  pages        = {291--308},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-15317-4\_19},
  doi          = {10.1007/978-3-642-15317-4\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/PhongKO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icits/2009,
  editor       = {Kaoru Kurosawa},
  title        = {Information Theoretic Security, 4th International Conference, {ICITS}
                  2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5973},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14496-7},
  doi          = {10.1007/978-3-642-14496-7},
  isbn         = {978-3-642-14495-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2010,
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0},
  doi          = {10.1007/978-3-642-16280-0},
  isbn         = {978-3-642-16279-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaK10,
  author       = {Goichiro Hanaoka and
                  Kaoru Kurosawa},
  title        = {Between Hashed {DH} and Computational {DH:} Compact Encryption from
                  Weaker Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {35},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/035},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaNP10,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  title        = {Efficiency-Improved Fully Simulatable Adaptive {OT} under the {DDH}
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaNP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurosawa10,
  author       = {Kaoru Kurosawa},
  title        = {Round-Efficient Perfectly Secure Message Transmission Scheme Against
                  General Adversary},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {450},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/450},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurosawa10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChoudhuryKP10,
  author       = {Ashish Choudhury and
                  Kaoru Kurosawa and
                  Arpita Patra},
  title        = {The Round Complexity of General {VSS}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {609},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/609},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChoudhuryKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ItohKK09,
  author       = {Kouichi Itoh and
                  Noboru Kunihiro and
                  Kaoru Kurosawa},
  title        = {Small Secret Key Attack on a Takagi's Variant of {RSA}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {33--41},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.33},
  doi          = {10.1587/TRANSFUN.E92.A.33},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ItohKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AbeCIK09,
  author       = {Masayuki Abe and
                  Yang Cui and
                  Hideki Imai and
                  Kaoru Kurosawa},
  title        = {Tag-KEM from Set Partial Domain One-Way Permutations},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {42--52},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.42},
  doi          = {10.1587/TRANSFUN.E92.A.42},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AbeCIK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KurosawaS09,
  author       = {Kaoru Kurosawa and
                  Kazuhiro Suzuki},
  title        = {Almost Secure (1-Round, \emph{n}-Channel) Message Transmission Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {105--112},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.105},
  doi          = {10.1587/TRANSFUN.E92.A.105},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KurosawaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KurosawaT09,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  title        = {One-wayness equivalent to general factoring},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {55},
  number       = {9},
  pages        = {4249--4262},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIT.2009.2025532},
  doi          = {10.1109/TIT.2009.2025532},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KurosawaT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KurosawaS09,
  author       = {Kaoru Kurosawa and
                  Kazuhiro Suzuki},
  title        = {Truly efficient 2-round perfectly secure message transmission scheme},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {55},
  number       = {11},
  pages        = {5223--5232},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIT.2009.2030434},
  doi          = {10.1109/TIT.2009.2030434},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KurosawaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/PhongKO09,
  author       = {Le Trieu Phong and
                  Kaoru Kurosawa and
                  Wakaha Ogata},
  editor       = {Bart Preneel},
  title        = {New RSA-Based (Selectively) Convertible Undeniable Signature Schemes},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {116--134},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_8},
  doi          = {10.1007/978-3-642-02384-2\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/PhongKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaN09,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima},
  editor       = {Mitsuru Matsui},
  title        = {Simple Adaptive Oblivious Transfer without Random Oracle},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {334--346},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_20},
  doi          = {10.1007/978-3-642-10366-7\_20},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurosawa09,
  author       = {Kaoru Kurosawa},
  title        = {General Error Decodable Secret Sharing Scheme and Its Application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {263},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/263},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurosawa09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaN09,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima},
  title        = {Simple Adaptive Oblivious Transfer Without Random Oracle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/PhongKO09,
  author       = {Le Trieu Phong and
                  Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {Provably Secure Convertible Undeniable Signatures with Unambiguity},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/394},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/PhongKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IwataYK08,
  author       = {Tetsu Iwata and
                  Tohru Yagi and
                  Kaoru Kurosawa},
  title        = {Security of the Five-Round Kasumi Type Permutation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {30--38},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.30},
  doi          = {10.1093/IETFEC/E91-A.1.30},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IwataYK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SuzukiTKT08,
  author       = {Kazuhiro Suzuki and
                  Dongvu Tonien and
                  Kaoru Kurosawa and
                  Koji Toyota},
  title        = {Birthday Paradox for Multi-Collisions},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {39--45},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.39},
  doi          = {10.1093/IETFEC/E91-A.1.39},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SuzukiTKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KunihiroK08,
  author       = {Noboru Kunihiro and
                  Kaoru Kurosawa},
  title        = {Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery
                  Attack on Takagi's {RSA}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {9},
  pages        = {2356--2364},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.9.2356},
  doi          = {10.1093/IETFEC/E91-A.9.2356},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KunihiroK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/KurosawaH08,
  author       = {Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  title        = {The power of identification schemes},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {60--69},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017050},
  doi          = {10.1504/IJACT.2008.017050},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/KurosawaH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbeGK08,
  author       = {Masayuki Abe and
                  Rosario Gennaro and
                  Kaoru Kurosawa},
  title        = {Tag-KEM/DEM: {A} New Framework for Hybrid Encryption},
  journal      = {J. Cryptol.},
  volume       = {21},
  number       = {1},
  pages        = {97--130},
  year         = {2008},
  url          = {https://doi.org/10.1007/s00145-007-9010-x},
  doi          = {10.1007/S00145-007-9010-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbeGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KurosawaKK08,
  author       = {Kaoru Kurosawa and
                  Wataru Kishimoto and
                  Takeshi Koshiba},
  title        = {A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure
                  Oblivious Transfer Reductions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {6},
  pages        = {2566--2571},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.921704},
  doi          = {10.1109/TIT.2008.921704},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KurosawaKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HanaokaK08,
  author       = {Goichiro Hanaoka and
                  Kaoru Kurosawa},
  editor       = {Josef Pieprzyk},
  title        = {Efficient Chosen Ciphertext Secure Public Key Encryption under the
                  Computational Diffie-Hellman Assumption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {308--325},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_19},
  doi          = {10.1007/978-3-540-89255-7\_19},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HanaokaK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ItohKK08,
  author       = {Kouichi Itoh and
                  Noboru Kunihiro and
                  Kaoru Kurosawa},
  editor       = {Tal Malkin},
  title        = {Small Secret Key Attack on a Variant of {RSA} (Due to Takagi)},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {387--406},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_25},
  doi          = {10.1007/978-3-540-79263-5\_25},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ItohKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaS08,
  author       = {Kaoru Kurosawa and
                  Kazuhiro Suzuki},
  editor       = {Nigel P. Smart},
  title        = {Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {324--340},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_19},
  doi          = {10.1007/978-3-540-78967-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/KurosawaF08,
  author       = {Kaoru Kurosawa and
                  Jun Furukawa},
  editor       = {Luca Aceto and
                  Ivan Damg{\aa}rd and
                  Leslie Ann Goldberg and
                  Magn{\'{u}}s M. Halld{\'{o}}rsson and
                  Anna Ing{\'{o}}lfsd{\'{o}}ttir and
                  Igor Walukiewicz},
  title        = {Universally Composable Undeniable Signature},
  booktitle    = {Automata, Languages and Programming, 35th International Colloquium,
                  {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part
                  {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&}
                  Track {C:} Security and Cryptography Foundations},
  series       = {Lecture Notes in Computer Science},
  volume       = {5126},
  pages        = {524--535},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70583-3\_43},
  doi          = {10.1007/978-3-540-70583-3\_43},
  timestamp    = {Fri, 27 Mar 2020 09:02:59 +0100},
  biburl       = {https://dblp.org/rec/conf/icalp/KurosawaF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KurosawaK08,
  author       = {Kaoru Kurosawa and
                  Takeshi Koshiba},
  editor       = {Reihaneh Safavi{-}Naini},
  title        = {Simple Direct Reduction of String (1, 2)-OT to Rabin's {OT} without
                  Privacy Amplification},
  booktitle    = {Information Theoretic Security, Third International Conference, {ICITS}
                  2008, Calgary, Canada, August 10-13, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5155},
  pages        = {199--209},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85093-9\_19},
  doi          = {10.1007/978-3-540-85093-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KurosawaK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/FurukawaAK08,
  author       = {Jun Furukawa and
                  Frederik Armknecht and
                  Kaoru Kurosawa},
  editor       = {Rafail Ostrovsky and
                  Roberto De Prisco and
                  Ivan Visconti},
  title        = {A Universally Composable Group Key Exchange Protocol with Minimum
                  Communication Effort},
  booktitle    = {Security and Cryptography for Networks, 6th International Conference,
                  {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5229},
  pages        = {392--408},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85855-3\_26},
  doi          = {10.1007/978-3-540-85855-3\_26},
  timestamp    = {Tue, 25 Feb 2020 11:33:46 +0100},
  biburl       = {https://dblp.org/rec/conf/scn/FurukawaAK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaF08,
  author       = {Kaoru Kurosawa and
                  Jun Furukawa},
  title        = {Universally Composable Undeniable Signature},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {94},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/094},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanaokaK08,
  author       = {Goichiro Hanaoka and
                  Kaoru Kurosawa},
  title        = {Efficient Chosen Ciphertext Secure Public Key Encryption under the
                  Computational Diffie-Hellman Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/211},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanaokaK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaS08,
  author       = {Kaoru Kurosawa and
                  Kazuhiro Suzuki},
  title        = {Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {421},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/421},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IwataK07,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  title        = {How to Construct Super-Pseudorandom Permutations with Short Keys},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {2--13},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.2},
  doi          = {10.1093/IETFEC/E90-A.1.2},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IwataK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/HirotaK07,
  author       = {Osamu Hirota and
                  Kaoru Kurosawa},
  title        = {Immunity against Correlation Attack on Quantum Stream Cipher by Yuen
                  2000 Protocol},
  journal      = {Quantum Inf. Process.},
  volume       = {6},
  number       = {2},
  pages        = {81--91},
  year         = {2007},
  url          = {https://doi.org/10.1007/s11128-006-0039-9},
  doi          = {10.1007/S11128-006-0039-9},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/HirotaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/BellareBKS07,
  author       = {Mihir Bellare and
                  Alexandra Boldyreva and
                  Kaoru Kurosawa and
                  Jessica Staddon},
  title        = {Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation
                  Without Sacrificing Security},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {11},
  pages        = {3927--3943},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2007.907471},
  doi          = {10.1109/TIT.2007.907471},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tit/BellareBKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/KurosawaS07,
  author       = {Kaoru Kurosawa and
                  Kazuhiro Suzuki},
  editor       = {Yvo Desmedt},
  title        = {Almost Secure (1-Round, n-Channel) Message Transmission Scheme},
  booktitle    = {Information Theoretic Security - Second International Conference,
                  {ICITS} 2007, Madrid, Spain, May 25-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4883},
  pages        = {99--112},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-642-10230-1\_8},
  doi          = {10.1007/978-3-642-10230-1\_8},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/KurosawaS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DesmedtK07,
  author       = {Yvo Desmedt and
                  Kaoru Kurosawa},
  editor       = {Juan A. Garay and
                  Arjen K. Lenstra and
                  Masahiro Mambo and
                  Ren{\'{e}} Peralta},
  title        = {A Generalization and a Variant of Two Threshold Cryptosystems Based
                  on Factoring},
  booktitle    = {Information Security, 10th International Conference, {ISC} 2007, Valpara{\'{\i}}so,
                  Chile, October 9-12, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4779},
  pages        = {351--361},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75496-1\_23},
  doi          = {10.1007/978-3-540-75496-1\_23},
  timestamp    = {Fri, 03 Feb 2023 21:39:19 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/DesmedtK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SuzukiK07,
  author       = {Kazuhiro Suzuki and
                  Kaoru Kurosawa},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {How to Find Many Collisions of 3-Pass {HAVAL}},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {428--443},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_29},
  doi          = {10.1007/978-3-540-75651-4\_29},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SuzukiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KunihiroK07,
  author       = {Noboru Kunihiro and
                  Kaoru Kurosawa},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery
                  Attack on Takagi's {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {412--425},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_27},
  doi          = {10.1007/978-3-540-71677-8\_27},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KunihiroK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2007,
  editor       = {Kaoru Kurosawa},
  title        = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2},
  doi          = {10.1007/978-3-540-76900-2},
  isbn         = {978-3-540-76899-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaK07,
  author       = {Kaoru Kurosawa and
                  Takeshi Koshiba},
  title        = {Direct Reduction of String (1, 2)-OT to Rabin's {OT}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/046},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaKK07,
  author       = {Kaoru Kurosawa and
                  Wataru Kishimoto and
                  Takeshi Koshiba},
  title        = {How to Derive Lower Bound on Oblivious Transfer Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaS07,
  author       = {Kaoru Kurosawa and
                  Kazuhiro Suzuki},
  title        = {Almost Secure (1-Round, n-Channel) Message Transmission Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {76},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/076},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SuzukiK07,
  author       = {Kazuhiro Suzuki and
                  Kaoru Kurosawa},
  title        = {How To Find Many Collisions of 3-Pass {HAVAL}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {79},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SuzukiK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HengK06,
  author       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {\emph{k}-Resilient Identity-Based Encryption in the Standard Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {39--46},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.39},
  doi          = {10.1093/IETFEC/E89-A.1.39},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HengK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/NguyenSK06,
  author       = {Lan Nguyen and
                  Reihaneh Safavi{-}Naini and
                  Kaoru Kurosawa},
  title        = {Verifiable shuffles: a formal model and a Paillier-based three-round
                  construction with provable security},
  journal      = {Int. J. Inf. Sec.},
  volume       = {5},
  number       = {4},
  pages        = {241--255},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10207-006-0004-8},
  doi          = {10.1007/S10207-006-0004-8},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/NguyenSK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamdm/OgataKS06,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa and
                  Douglas R. Stinson},
  title        = {Optimum Secret Sharing Scheme Secure against Cheating},
  journal      = {{SIAM} J. Discret. Math.},
  volume       = {20},
  number       = {1},
  pages        = {79--95},
  year         = {2006},
  url          = {https://doi.org/10.1137/S0895480100378689},
  doi          = {10.1137/S0895480100378689},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamdm/OgataKS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/OgataKH06,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  title        = {The security of the {FDH} variant of Chaum's undeniable signature
                  scheme},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {5},
  pages        = {2006--2017},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.872853},
  doi          = {10.1109/TIT.2006.872853},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/OgataKH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/MatsumotoKIKU06,
  author       = {Ryutaroh Matsumoto and
                  Kaoru Kurosawa and
                  Toshiya Itoh and
                  Toshimitsu Konno and
                  Tomohiko Uyematsu},
  title        = {Primal-Dual Distance Bounds of Linear Codes With Application to Cryptography},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {52},
  number       = {9},
  pages        = {4251--4256},
  year         = {2006},
  url          = {https://doi.org/10.1109/TIT.2006.880050},
  doi          = {10.1109/TIT.2006.880050},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/MatsumotoKIKU06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AbeCIK06,
  author       = {Masayuki Abe and
                  Yang Cui and
                  Hideki Imai and
                  Kaoru Kurosawa},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Tag-KEM from Set Partial Domain One-Way Permutations},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {360--370},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_30},
  doi          = {10.1007/11780656\_30},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AbeCIK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaT06,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {New Approach for Selectively Convertible Undeniable Signature Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {428--443},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_28},
  doi          = {10.1007/11935230\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/FurukawaKI06,
  author       = {Jun Furukawa and
                  Kaoru Kurosawa and
                  Hideki Imai},
  editor       = {Michele Bugliesi and
                  Bart Preneel and
                  Vladimiro Sassone and
                  Ingo Wegener},
  title        = {An Efficient Compiler from \emph{Sigma}-Protocol to 2-Move Deniable
                  Zero-Knowledge},
  booktitle    = {Automata, Languages and Programming, 33rd International Colloquium,
                  {ICALP} 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4052},
  pages        = {46--57},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11787006\_5},
  doi          = {10.1007/11787006\_5},
  timestamp    = {Tue, 14 May 2019 10:00:44 +0200},
  biburl       = {https://dblp.org/rec/conf/icalp/FurukawaKI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SuzukiTKT06,
  author       = {Kazuhiro Suzuki and
                  Dongvu Tonien and
                  Kaoru Kurosawa and
                  Koji Toyota},
  editor       = {Min Surp Rhee and
                  Byoungcheon Lee},
  title        = {Birthday Paradox for Multi-collisions},
  booktitle    = {Information Security and Cryptology - {ICISC} 2006, 9th International
                  Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4296},
  pages        = {29--40},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11927587\_5},
  doi          = {10.1007/11927587\_5},
  timestamp    = {Mon, 29 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SuzukiTKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ih/LeK06,
  author       = {Tri Van Le and
                  Kaoru Kurosawa},
  editor       = {Jan Camenisch and
                  Christian S. Collberg and
                  Neil F. Johnson and
                  Phil Sallee},
  title        = {Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext
                  Attacks},
  booktitle    = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria,
                  VA, USA, July 10-12, 2006. Revised Selcted Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4437},
  pages        = {297--313},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74124-4\_20},
  doi          = {10.1007/978-3-540-74124-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ih/LeK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KurosawaS06,
  author       = {Kaoru Kurosawa and
                  Katja Schmidt{-}Samoa},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {New Online/Offline Signature Schemes Without Random Oracles},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {330--346},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_22},
  doi          = {10.1007/11745853\_22},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KurosawaS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KurosawaH06,
  author       = {Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  editor       = {Moti Yung and
                  Yevgeniy Dodis and
                  Aggelos Kiayias and
                  Tal Malkin},
  title        = {The Power of Identification Schemes},
  booktitle    = {Public Key Cryptography - {PKC} 2006, 9th International Conference
                  on Theory and Practice of Public-Key Cryptography, New York, NY, USA,
                  April 24-26, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3958},
  pages        = {364--377},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11745853\_24},
  doi          = {10.1007/11745853\_24},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/KurosawaH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/KurosawaH06,
  author       = {Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  editor       = {Roberto De Prisco and
                  Moti Yung},
  title        = {Relations Among Security Notions for Undeniable Signature Schemes},
  booktitle    = {Security and Cryptography for Networks, 5th International Conference,
                  {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4116},
  pages        = {34--48},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11832072\_3},
  doi          = {10.1007/11832072\_3},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/KurosawaH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/drm/2006,
  editor       = {Moti Yung and
                  Kaoru Kurosawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Proceedings of the Sixth {ACM} Workshop on Digital Rights Management,
                  Alexandria, VA, USA, October 30, 2006},
  publisher    = {{ACM}},
  year         = {2006},
  isbn         = {1-59593-555-X},
  timestamp    = {Thu, 17 Jan 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/drm/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KurosawaID05,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata and
                  Quang Viet Duong},
  title        = {How to Improve Interpolation Attack},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {9--15},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_9\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KurosawaID05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IwataK05,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  title        = {On the Security of a {MAC} by Mitchell},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {25--32},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_25\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IwataK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OhtakiKK05,
  author       = {Yasuhiro Ohtaki and
                  Masaru Kamada and
                  Kaoru Kurosawa},
  title        = {A Scheme for Partial Disclosure of Transaction Log},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {222--229},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_222\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OhtakiKK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KamadaKOO05,
  author       = {Masaru Kamada and
                  Kaoru Kurosawa and
                  Yasuhiro Ohtaki and
                  Shusuke Okamoto},
  title        = {A Network Game Based on Fair Random Numbers},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {88-D},
  number       = {5},
  pages        = {859--864},
  year         = {2005},
  url          = {https://doi.org/10.1093/ietisy/e88-d.5.859},
  doi          = {10.1093/IETISY/E88-D.5.859},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KamadaKOO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/NguyenSK05,
  author       = {Lan Nguyen and
                  Reihaneh Safavi{-}Naini and
                  Kaoru Kurosawa},
  title        = {A Provably Secure and Efficient Verifiable Shuffle based on a Variant
                  of the Paillier Cryptosystem},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {11},
  number       = {6},
  pages        = {986--1010},
  year         = {2005},
  url          = {https://doi.org/10.3217/jucs-011-06-0986},
  doi          = {10.3217/JUCS-011-06-0986},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/NguyenSK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AbeGKS05,
  author       = {Masayuki Abe and
                  Rosario Gennaro and
                  Kaoru Kurosawa and
                  Victor Shoup},
  editor       = {Ronald Cramer},
  title        = {Tag-KEM/DEM: {A} New Framework for Hybrid Encryption and {A} New Analysis
                  of Kurosawa-Desmedt {KEM}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {128--146},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_8},
  doi          = {10.1007/11426639\_8},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AbeGKS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaH05,
  author       = {Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  editor       = {Ronald Cramer},
  title        = {3-Move Undeniable Signature Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3494},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11426639\_11},
  doi          = {10.1007/11426639\_11},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataK05,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Henri Gilbert and
                  Helena Handschuh},
  title        = {How to Enhance the Security of the 3GPP Confidentiality and Integrity
                  Algorithms},
  booktitle    = {Fast Software Encryption: 12th International Workshop, {FSE} 2005,
                  Paris, France, February 21-23, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3557},
  pages        = {268--283},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11502760\_18},
  doi          = {10.1007/11502760\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KurosawaH05,
  author       = {Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {Identity-Based Identification Without Random Oracles},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3481},
  pages        = {603--613},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424826\_64},
  doi          = {10.1007/11424826\_64},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/KurosawaH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/Kurosawa05,
  author       = {Kaoru Kurosawa},
  title        = {Some topics related to resilient functions},
  booktitle    = {{IEEE} Information Theory Workshop on Theory and Practice in Information-Theoretic
                  Security, {ICITS} 2005, Awaji Island, Japan, October 16-19, 2005},
  pages        = {55--60},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ITWTPI.2005.1543957},
  doi          = {10.1109/ITWTPI.2005.1543957},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/Kurosawa05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DesmedtK05,
  author       = {Yvo Desmedt and
                  Kaoru Kurosawa},
  editor       = {Jianying Zhou and
                  Javier L{\'{o}}pez and
                  Robert H. Deng and
                  Feng Bao},
  title        = {Electronic Voting: Starting Over?},
  booktitle    = {Information Security, 8th International Conference, {ISC} 2005, Singapore,
                  September 20-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3650},
  pages        = {329--343},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11556992\_24},
  doi          = {10.1007/11556992\_24},
  timestamp    = {Thu, 29 Aug 2019 08:10:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DesmedtK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/OgataKH05,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  editor       = {Serge Vaudenay},
  title        = {The Security of the {FDH} Variant of Chaum's Undeniable Signature
                  Scheme},
  booktitle    = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
                  Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
                  January 23-26, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3386},
  pages        = {328--345},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/978-3-540-30580-4\_23},
  doi          = {10.1007/978-3-540-30580-4\_23},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/OgataKH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0506087,
  author       = {Ryutaroh Matsumoto and
                  Kaoru Kurosawa and
                  Toshiya Itoh and
                  Toshimitsu Konno and
                  Tomohiko Uyematsu},
  title        = {Primal-dual distance bounds of linear codes with application to cryptography},
  journal      = {CoRR},
  volume       = {abs/cs/0506087},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0506087},
  eprinttype    = {arXiv},
  eprint       = {cs/0506087},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0506087.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeGK05,
  author       = {Masayuki Abe and
                  Rosario Gennaro and
                  Kaoru Kurosawa},
  title        = {Tag-KEM/DEM: {A} New Framework for Hybrid Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {27},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/027},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeGK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NguyenSK05,
  author       = {Lan Nguyen and
                  Reihaneh Safavi{-}Naini and
                  Kaoru Kurosawa},
  title        = {A Provably Secure and Efficient Verifiable Shuffle based on a Variant
                  of the Paillier Cryptosystem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NguyenSK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MatsumotoKIKU05,
  author       = {Ryutaroh Matsumoto and
                  Kaoru Kurosawa and
                  Toshiya Itoh and
                  Toshimitsu Konno and
                  Tomohiko Uyematsu},
  title        = {Primal-Dual Distance Bounds of Linear Codes with Application to Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MatsumotoKIKU05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaT05,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  title        = {One-Wayness Equivalent to General Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dm/OgataKSS04,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa and
                  Douglas R. Stinson and
                  Hajime Saido},
  title        = {New combinatorial designs and their applications to authentication
                  codes and secret sharing schemes},
  journal      = {Discret. Math.},
  volume       = {279},
  number       = {1-3},
  pages        = {383--405},
  year         = {2004},
  url          = {https://doi.org/10.1016/S0012-365X(03)00283-8},
  doi          = {10.1016/S0012-365X(03)00283-8},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dm/OgataKSS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KurosawaI04,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata},
  title        = {{TMAC:} Two-Key {CBC} {MAC}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {46--52},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_46\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KurosawaI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HengK04,
  author       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Square Hash with a Small Key Size},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {54--59},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_54\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HengK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IwataK04,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  title        = {On the Universal Hash Functions in Luby-Rackoff Cipher},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {60--66},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_60\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IwataK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MatsuoK04,
  author       = {Toshihiko Matsuo and
                  Kaoru Kurosawa},
  title        = {On Parallel Hash Functions Based on Block-Ciphers},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {67--74},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_67\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MatsuoK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KurosawaD04,
  author       = {Kaoru Kurosawa and
                  Quang Viet Duong},
  title        = {How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {141--146},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_141\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KurosawaD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jc/OgataK04,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  title        = {Oblivious keyword search},
  journal      = {J. Complex.},
  volume       = {20},
  number       = {2-3},
  pages        = {356--371},
  year         = {2004},
  url          = {https://doi.org/10.1016/j.jco.2003.08.023},
  doi          = {10.1016/J.JCO.2003.08.023},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jc/OgataK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KurosawaIY04,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata and
                  Takayuki Yoshiwara},
  title        = {New covering radius of Reed-Muller codes for t-resilient functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {50},
  number       = {3},
  pages        = {468--475},
  year         = {2004},
  url          = {https://doi.org/10.1109/TIT.2004.824913},
  doi          = {10.1109/TIT.2004.824913},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KurosawaIY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KurosawaM04,
  author       = {Kaoru Kurosawa and
                  Ryutaroh Matsumoto},
  title        = {Almost security of cryptographic Boolean functions},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {50},
  number       = {11},
  pages        = {2752--2761},
  year         = {2004},
  url          = {https://doi.org/10.1109/TIT.2004.836684},
  doi          = {10.1109/TIT.2004.836684},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KurosawaM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IwataK04,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {How to Re-use Round Function in Super-Pseudorandom Permutation},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {224--235},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_20},
  doi          = {10.1007/978-3-540-27800-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IwataK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurosawaM04,
  author       = {Kaoru Kurosawa and
                  Toshihiko Matsuo},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {How to Remove {MAC} from {DHIES}},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {236--247},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_21},
  doi          = {10.1007/978-3-540-27800-9\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurosawaM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/NguyenSK04,
  author       = {Lan Nguyen and
                  Reihaneh Safavi{-}Naini and
                  Kaoru Kurosawa},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Verifiable Shuffles: {A} Formal Model and a Paillier-Based Efficient
                  Construction with Provable Security},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {61--75},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_5},
  doi          = {10.1007/978-3-540-24852-1\_5},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/NguyenSK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KurosawaD04,
  author       = {Kaoru Kurosawa and
                  Yvo Desmedt},
  editor       = {Matthew K. Franklin},
  title        = {A New Paradigm of Hybrid Encryption Scheme},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {426--442},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_26},
  doi          = {10.1007/978-3-540-28628-8\_26},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KurosawaD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HengK04,
  author       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  editor       = {Tatsuaki Okamoto},
  title        = {k-Resilient Identity-Based Encryption in the Standard Model},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {67--80},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_6},
  doi          = {10.1007/978-3-540-24660-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HengK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/VietK04,
  author       = {Quang Viet Duong and
                  Kaoru Kurosawa},
  editor       = {Tatsuaki Okamoto},
  title        = {Almost Ideal Contrast Visual Cryptography with Reversing},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2004, The Cryptographers' Track at
                  the {RSA} Conference 2004, San Francisco, CA, USA, February 23-27,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2964},
  pages        = {353--365},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24660-2\_27},
  doi          = {10.1007/978-3-540-24660-2\_27},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/VietK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KoshibaK04,
  author       = {Takeshi Koshiba and
                  Kaoru Kurosawa},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {Short Exponent Diffie-Hellman Problems},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {173--186},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_13},
  doi          = {10.1007/978-3-540-24632-9\_13},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KoshibaK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KurosawaH04,
  author       = {Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {From Digital Signature to ID-based Identification/Signature},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {248--261},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_18},
  doi          = {10.1007/978-3-540-24632-9\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KurosawaH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongK04,
  author       = {Quang Viet Duong and
                  Kaoru Kurosawa},
  title        = {Almost Ideal Contrast Visual Cryptography with Reversing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {287},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/287},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OgataKH04,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  title        = {The Security of the {FDH} Variant of Chaum's Undeniable Signature
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {290},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/290},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OgataKH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/IwataK03,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  title        = {Inclusion Relations of Boolean Functions Satisfying PC(\emph{l}) of
                  Order \emph{k}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {86-A},
  number       = {1},
  pages        = {47--53},
  year         = {2003},
  url          = {http://search.ieice.org/bin/summary.php?id=e86-a\_1\_47},
  timestamp    = {Tue, 08 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/IwataK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/IwataYK03,
  author       = {Tetsu Iwata and
                  Tomonobu Yoshino and
                  Kaoru Kurosawa},
  title        = {Non-cryptographic primitive for pseudorandom permutation},
  journal      = {Theor. Comput. Sci.},
  volume       = {306},
  number       = {1-3},
  pages        = {139--154},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0304-3975(03)00245-7},
  doi          = {10.1016/S0304-3975(03)00245-7},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/IwataYK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IwataYK03,
  author       = {Tetsu Iwata and
                  Tohru Yagi and
                  Kaoru Kurosawa},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On the Pseudorandomness of {KASUMI} Type Permutations},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {130--141},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_12},
  doi          = {10.1007/3-540-45067-X\_12},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IwataYK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MatsuoK03,
  author       = {Toshihiko Matsuo and
                  Kaoru Kurosawa},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On Parallel Hash Functions Based on Block-Cipher},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {510--521},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_44},
  doi          = {10.1007/3-540-45067-X\_44},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MatsuoK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HengK03,
  author       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Square Hash with a Small Key Size},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {522--531},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_45},
  doi          = {10.1007/3-540-45067-X\_45},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HengK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaT03,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  editor       = {Chi{-}Sung Laih},
  title        = {Some RSA-Based Encryption Schemes with Tight Security Reduction},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_2},
  doi          = {10.1007/978-3-540-40061-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaST03,
  author       = {Kaoru Kurosawa and
                  Katja Schmidt{-}Samoa and
                  Tsuyoshi Takagi},
  editor       = {Chi{-}Sung Laih},
  title        = {A Complete and Explicit Security Reduction Algorithm for RSA-Based
                  Cryptosystems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {474--491},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_30},
  doi          = {10.1007/978-3-540-40061-5\_30},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaST03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KurosawaI03,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata},
  editor       = {Marc Joye},
  title        = {{TMAC:} Two-Key {CBC} {MAC}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {33--49},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_3},
  doi          = {10.1007/3-540-36563-X\_3},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KurosawaI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataK03,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Thomas Johansson},
  title        = {{OMAC:} One-Key {CBC} {MAC}},
  booktitle    = {Fast Software Encryption, 10th International Workshop, {FSE} 2003,
                  Lund, Sweden, February 24-26, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2887},
  pages        = {129--153},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-39887-5\_11},
  doi          = {10.1007/978-3-540-39887-5\_11},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IwataK03,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Jong In Lim and
                  Dong Hoon Lee},
  title        = {On the Security of a New Variant of {OMAC}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2003, 6th International
                  Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2971},
  pages        = {67--78},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24691-6\_6},
  doi          = {10.1007/978-3-540-24691-6\_6},
  timestamp    = {Thu, 17 Nov 2022 14:05:51 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/IwataK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/IwataK03,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Kenneth G. Paterson},
  title        = {On the Correctness of Security Proofs for the 3GPP Confidentiality
                  and Integrity Algorithms},
  booktitle    = {Cryptography and Coding, 9th {IMA} International Conference, Cirencester,
                  UK, December 16-18, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2898},
  pages        = {306--318},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40974-8\_25},
  doi          = {10.1007/978-3-540-40974-8\_25},
  timestamp    = {Wed, 18 Mar 2020 16:01:02 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/IwataK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/IwataK03,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Thomas Johansson and
                  Subhamoy Maitra},
  title        = {Stronger Security Bounds for OMAC, TMAC, and {XCBC}},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2003, 4th International Conference
                  on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2904},
  pages        = {402--415},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-24582-7\_30},
  doi          = {10.1007/978-3-540-24582-7\_30},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/IwataK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DesmedtKL03,
  author       = {Yvo Desmedt and
                  Kaoru Kurosawa and
                  Tri Van Le},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {396--407},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_30},
  doi          = {10.1007/10958513\_30},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DesmedtKL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurosawa03,
  author       = {Kaoru Kurosawa},
  title        = {Almost Security of Cryptographic Boolean Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {75},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/075},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurosawa03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataK03,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  title        = {Stronger Security Bounds for OMAC, {TMAC} and {XCBC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {82},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/082},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataYK03,
  author       = {Tetsu Iwata and
                  Tohru Yagi and
                  Kaoru Kurosawa},
  title        = {On the Pseudorandomness of {KASUMI} Type Permutations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {130},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/130},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataYK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaT03,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  title        = {Some RSA-based Encryption Schemes with Tight Security Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LeK03,
  author       = {Tri Van Le and
                  Kaoru Kurosawa},
  title        = {Efficient Public Key Steganography Secure Against Adaptively Chosen
                  Stegotext Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {244},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/244},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LeK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/KishimotoOKO02,
  author       = {Wataru Kishimoto and
                  Koji Okada and
                  Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {On the bound for anonymous secret sharing schemes},
  journal      = {Discret. Appl. Math.},
  volume       = {121},
  number       = {1-3},
  pages        = {193--202},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0166-218X(01)00236-0},
  doi          = {10.1016/S0166-218X(01)00236-0},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/KishimotoOKO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/IwataYYK02,
  author       = {Tetsu Iwata and
                  Tomonobu Yoshino and
                  Tomohiro Yuasa and
                  Kaoru Kurosawa},
  title        = {Round Security and Super-Pseudorandomness of {MISTY} Type Structure},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {85-A},
  number       = {1},
  pages        = {2--10},
  year         = {2002},
  url          = {http://search.ieice.org/bin/summary.php?id=e85-a\_1\_2},
  timestamp    = {Wed, 09 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/IwataYYK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OgataK02,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  editor       = {Yuliang Zheng},
  title        = {Bounds for Robust Metering Schemes and Their Relationship with A-code},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2002, 8th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Queenstown, New Zealand, December 1-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2501},
  pages        = {64--80},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36178-2\_4},
  doi          = {10.1007/3-540-36178-2\_4},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OgataK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KurosawaO02,
  author       = {Kaoru Kurosawa and
                  Wakaha Ogata},
  editor       = {Dieter Gollmann and
                  G{\"{u}}nter Karjoth and
                  Michael Waidner},
  title        = {Bit-Slice Auction Circuit},
  booktitle    = {Computer Security - {ESORICS} 2002, 7th European Symposium on Research
                  in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2502},
  pages        = {24--38},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45853-0\_2},
  doi          = {10.1007/3-540-45853-0\_2},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KurosawaO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataYK02,
  author       = {Tetsu Iwata and
                  Tomonobu Yoshino and
                  Kaoru Kurosawa},
  editor       = {Joan Daemen and
                  Vincent Rijmen},
  title        = {Non-cryptographic Primitive for Pseudorandom Permutation},
  booktitle    = {Fast Software Encryption, 9th International Workshop, {FSE} 2002,
                  Leuven, Belgium, February 4-6, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2365},
  pages        = {149--163},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45661-9\_12},
  doi          = {10.1007/3-540-45661-9\_12},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataYK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IwataK02,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {On the Universal Hash Functionsin Luby-Rackoff Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {226--236},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_16},
  doi          = {10.1007/3-540-36552-4\_16},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IwataK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Kurosawa02,
  author       = {Kaoru Kurosawa},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Multi-recipient Public-Key Encryption with Shortened Ciphertext},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {48--63},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_4},
  doi          = {10.1007/3-540-45664-3\_4},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Kurosawa02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KurosawaY02,
  author       = {Kaoru Kurosawa and
                  Takuya Yoshida},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {Linear Code Implies Public-Key Traitor Tracing},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {172--187},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_12},
  doi          = {10.1007/3-540-45664-3\_12},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KurosawaY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaI02,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata},
  title        = {{TMAC:} Two-Key {CBC} {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/092},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaI02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaIY02,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata and
                  Takayuki Yoshiwara},
  title        = {New covering radius of Reed-Muller codes for t-resilient functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {123},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/123},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaIY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurosawa02,
  author       = {Kaoru Kurosawa},
  title        = {Power of a Public Random Permutation and its Application to Authenticated-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurosawa02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataK02,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  title        = {{OMAC:} One-Key {CBC} {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {180},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/180},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OgataK02,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  title        = {Oblivious Keyword Search},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {182},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/182},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OgataK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaO02,
  author       = {Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {Bit-Slice Auction Circuit},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {189},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/189},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ObanaK01,
  author       = {Satoshi Obana and
                  Kaoru Kurosawa},
  title        = {Bounds and Combinatorial Structure of Multi-Receiver-Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {22},
  number       = {1},
  pages        = {47--63},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ObanaK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KurosawaO01,
  author       = {Kaoru Kurosawa and
                  Satoshi Obana},
  title        = {Combinatorial Bounds on Authentication Codes with Arbitration},
  journal      = {Des. Codes Cryptogr.},
  volume       = {22},
  number       = {3},
  pages        = {265--281},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KurosawaO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KurosawaJS01,
  author       = {Kaoru Kurosawa and
                  Thomas Johansson and
                  Douglas R. Stinson},
  title        = {Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications},
  journal      = {J. Cryptol.},
  volume       = {14},
  number       = {4},
  pages        = {231--253},
  year         = {2001},
  url          = {https://doi.org/10.1007/s00145-001-0010-y},
  doi          = {10.1007/S00145-001-0010-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KurosawaJS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataYYK01,
  author       = {Tetsu Iwata and
                  Tomonobu Yoshino and
                  Tomohiro Yuasa and
                  Kaoru Kurosawa},
  editor       = {Mitsuru Matsui},
  title        = {Round Security and Super-Pseudorandomness of {MISTY} Type Structure},
  booktitle    = {Fast Software Encryption, 8th International Workshop, {FSE} 2001 Yokohama,
                  Japan, April 2-4, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2355},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45473-X\_20},
  doi          = {10.1007/3-540-45473-X\_20},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataYYK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/YamamuraK01,
  author       = {Akihiro Yamamura and
                  Kaoru Kurosawa},
  editor       = {Peter Eades and
                  Tadao Takaoka},
  title        = {Generic Algorithms and Key Agreement Protocols Based on Group Actions},
  booktitle    = {Algorithms and Computation, 12th International Symposium, {ISAAC}
                  2001, Christchurch, New Zealand, December 19-21, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2223},
  pages        = {208--218},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45678-3\_19},
  doi          = {10.1007/3-540-45678-3\_19},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/YamamuraK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KurosawaOMM01,
  author       = {Kaoru Kurosawa and
                  Wakaha Ogata and
                  Toshihiko Matsuo and
                  Shuichi Makishima},
  editor       = {Kwangjo Kim},
  title        = {{IND-CCA} Public Key Schemes Equivalent to Factoring n=pq},
  booktitle    = {Public Key Cryptography, 4th International Workshop on Practice and
                  Theory in Public Key Cryptography, {PKC} 2001, Cheju Island, Korea,
                  February 13-15, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1992},
  pages        = {36--47},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-44586-2\_3},
  doi          = {10.1007/3-540-44586-2\_3},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KurosawaOMM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/IwataYK01,
  author       = {Tetsu Iwata and
                  Takayuki Yoshiwara and
                  Kaoru Kurosawa},
  editor       = {Serge Vaudenay and
                  Amr M. Youssef},
  title        = {New Covering Radius of Reed-Muller Codes for t-Resilient Functions},
  booktitle    = {Selected Areas in Cryptography, 8th Annual International Workshop,
                  {SAC} 2001 Toronto, Ontario, Canada, August 16-17, 2001, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2259},
  pages        = {75--86},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45537-X\_6},
  doi          = {10.1007/3-540-45537-X\_6},
  timestamp    = {Tue, 01 Jun 2021 15:22:31 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/IwataYK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kurosawa01,
  author       = {Kaoru Kurosawa},
  title        = {Multi-Recipient Public-Key Encryption with Shortened Ciphertext},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {71},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/071},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kurosawa01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaY01,
  author       = {Kaoru Kurosawa and
                  Takuya Yoshida},
  title        = {Linear Code Implies Public-Key Traitor Tracing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {99},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/099},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ObanaK00,
  author       = {Satoshi Obana and
                  Kaoru Kurosawa},
  title        = {Combinatorial Classification of Optimal Authentication Codes with
                  Arbitration},
  journal      = {Des. Codes Cryptogr.},
  volume       = {20},
  number       = {3},
  pages        = {281--305},
  year         = {2000},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ObanaK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KurosawaSSK00,
  author       = {Kaoru Kurosawa and
                  Fumio Sato and
                  Takahiro Sakata and
                  Wataru Kishimoto},
  title        = {A relationship between linear complexity and kapa-error linear complexity},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {2},
  pages        = {694--698},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.825845},
  doi          = {10.1109/18.825845},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KurosawaSSK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/OkadaK00,
  author       = {Koji Okada and
                  Kaoru Kurosawa},
  title        = {{MDS} secret-sharing scheme secure against cheaters},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {46},
  number       = {3},
  pages        = {1078--1081},
  year         = {2000},
  url          = {https://doi.org/10.1109/18.841188},
  doi          = {10.1109/18.841188},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/OkadaK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MitomoK00,
  author       = {Masashi Mitomo and
                  Kaoru Kurosawa},
  editor       = {Tatsuaki Okamoto},
  title        = {Attack for Flash {MIX}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {192--204},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_15},
  doi          = {10.1007/3-540-44448-3\_15},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MitomoK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OgataK00,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  editor       = {Tatsuaki Okamoto},
  title        = {Provably Secure Metering Scheme},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kyoto, Japan, December 3-7, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1976},
  pages        = {388--398},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44448-3\_29},
  doi          = {10.1007/3-540-44448-3\_29},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OgataK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dlt/YamamuraK00,
  author       = {Akihiro Yamamura and
                  Kaoru Kurosawa},
  editor       = {Masami Ito and
                  Teruo Imaoka},
  title        = {Key Agreement Protocol Securer than {DLOG}},
  booktitle    = {Proceedings of the International Colloquium on Words, Languages {\&}
                  Combinatorics III, Kyoto, Japan, March 14-18, 2000},
  pages        = {450--465},
  publisher    = {World Scientific},
  year         = {2000},
  timestamp    = {Thu, 08 Dec 2011 13:57:12 +0100},
  biburl       = {https://dblp.org/rec/conf/dlt/YamamuraK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DesmedtK00,
  author       = {Yvo Desmedt and
                  Kaoru Kurosawa},
  editor       = {Bart Preneel},
  title        = {How to Break a Practical {MIX} and Design a New One},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
                  on the Theory and Application of Cryptographic Techniques, Bruges,
                  Belgium, May 14-18, 2000, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1807},
  pages        = {557--572},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-45539-6\_39},
  doi          = {10.1007/3-540-45539-6\_39},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DesmedtK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataK00,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Bruce Schneier},
  title        = {On the Pseudorandomness of the {AES} Finalists - {RC6} and Serpent},
  booktitle    = {Fast Software Encryption, 7th International Workshop, {FSE} 2000,
                  New York, NY, USA, April 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1978},
  pages        = {231--243},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44706-7\_16},
  doi          = {10.1007/3-540-44706-7\_16},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KurosawaIQ00,
  author       = {Kaoru Kurosawa and
                  Tetsu Iwata and
                  Quang Viet Duong},
  editor       = {Douglas R. Stinson and
                  Stafford E. Tavares},
  title        = {Root Finding Interpolation Attack},
  booktitle    = {Selected Areas in Cryptography, 7th Annual International Workshop,
                  {SAC} 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2012},
  pages        = {303--314},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/3-540-44983-3\_22},
  doi          = {10.1007/3-540-44983-3\_22},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KurosawaIQ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MitomoK00,
  author       = {Masashi Mitomo and
                  Kaoru Kurosawa},
  title        = {How to Encrypt Long Messages without Large Size Symmetric/Asymmetric
                  Encryption Schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {65},
  year         = {2000},
  url          = {http://eprint.iacr.org/2000/065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MitomoK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KurosawaO99,
  author       = {Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {Efficient Rabin-type Digital Signature Scheme},
  journal      = {Des. Codes Cryptogr.},
  volume       = {16},
  number       = {1},
  pages        = {53--64},
  year         = {1999},
  url          = {https://doi.org/10.1023/A:1008374325369},
  doi          = {10.1023/A:1008374325369},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KurosawaO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BlundoSKO99,
  author       = {Carlo Blundo and
                  Alfredo De Santis and
                  Kaoru Kurosawa and
                  Wakaha Ogata},
  title        = {On a Fallacious Bound for Authentication Codes},
  journal      = {J. Cryptol.},
  volume       = {12},
  number       = {3},
  pages        = {155--159},
  year         = {1999},
  url          = {https://doi.org/10.1007/s001459900049},
  doi          = {10.1007/S001459900049},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BlundoSKO99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KurosawaY99,
  author       = {Kaoru Kurosawa and
                  Takuya Yoshida},
  title        = {Strongly universal hashing and identification codes via channels},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {45},
  number       = {6},
  pages        = {2091--2095},
  year         = {1999},
  url          = {https://doi.org/10.1109/18.782144},
  doi          = {10.1109/18.782144},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KurosawaY99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SatohIK99,
  author       = {Takashi Satoh and
                  Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {On Cryptographically Secure Vectorial Boolean Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {20--28},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_3},
  doi          = {10.1007/978-3-540-48000-6\_3},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SatohIK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/IwataK99,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Probabilistic Higher Order Differential Attack and Higher Order Bent
                  Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {62--74},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_7},
  doi          = {10.1007/978-3-540-48000-6\_7},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/IwataK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KurosawaOSS98,
  author       = {Kaoru Kurosawa and
                  Koji Okada and
                  Hajime Saido and
                  Douglas R. Stinson},
  title        = {New Combinatorial Bounds for Authentication Codes and Key Predistribution
                  Schemes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {15},
  number       = {1},
  pages        = {87--100},
  year         = {1998},
  url          = {https://doi.org/10.1023/A:1008229625895},
  doi          = {10.1023/A:1008229625895},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KurosawaOSS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/OgataK98,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  title        = {Some Basic Properties of General Nonperfect Secret Sharing Schemes},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {4},
  number       = {8},
  pages        = {690--704},
  year         = {1998},
  url          = {https://doi.org/10.3217/jucs-004-08-0690},
  doi          = {10.3217/JUCS-004-08-0690},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/OgataK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/YamadaKHS98,
  author       = {Isao Yamada and
                  Kaoru Kurosawa and
                  Hiroshi Hasegawa and
                  Kohichi Sakaniwa},
  title        = {Algebraic multidimensional phase unwrapping and zero distribution
                  of complex polynomials-characterization of multivariate stable polynomials},
  journal      = {{IEEE} Trans. Signal Process.},
  volume       = {46},
  number       = {6},
  pages        = {1639--1664},
  year         = {1998},
  url          = {https://doi.org/10.1109/78.678480},
  doi          = {10.1109/78.678480},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsp/YamadaKHS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DesmedtKKK98,
  author       = {Yvo Desmedt and
                  Brian King and
                  Wataru Kishimoto and
                  Kaoru Kurosawa},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A Comment on the Efficiency of Secret Sharing Scheme over Any Finite
                  Abelian Group},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {391--402},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053750},
  doi          = {10.1007/BFB0053750},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DesmedtKKK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaYDB98,
  author       = {Kaoru Kurosawa and
                  Takuya Yoshida and
                  Yvo Desmedt and
                  Mike Burmester},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Some Bounds and a Construction for Secure Broadcast Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {420--433},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_33},
  doi          = {10.1007/3-540-49649-1\_33},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaYDB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaD98,
  author       = {Kaoru Kurosawa and
                  Yvo Desmedt},
  editor       = {Kaisa Nyberg},
  title        = {Optimum Traitor Tracing and Asymmetric Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {145--157},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054123},
  doi          = {10.1007/BFB0054123},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/IwataK98,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Cunsheng Ding and
                  Tor Helleseth and
                  Harald Niederreiter},
  title        = {Inclusion Relations of Boolean Functions Satisfying PC(l) of Order
                  k},
  booktitle    = {Sequences and their Applications - Proceedings of {SETA} 1998, Singapore,
                  December 14-17, 1998},
  series       = {Discrete Mathematics and Theoretical Computer Science},
  pages        = {263--272},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/978-1-4471-0551-0\_19},
  doi          = {10.1007/978-1-4471-0551-0\_19},
  timestamp    = {Mon, 16 Sep 2019 15:26:36 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/IwataK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seta/SatoK98,
  author       = {Fumio Sato and
                  Kaoru Kurosawa},
  editor       = {Cunsheng Ding and
                  Tor Helleseth and
                  Harald Niederreiter},
  title        = {On the Randomness of a [d, k] Self-Decimation Stream Key Generator},
  booktitle    = {Sequences and their Applications - Proceedings of {SETA} 1998, Singapore,
                  December 14-17, 1998},
  series       = {Discrete Mathematics and Theoretical Computer Science},
  pages        = {343--353},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/978-1-4471-0551-0\_26},
  doi          = {10.1007/978-1-4471-0551-0\_26},
  timestamp    = {Tue, 25 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/seta/SatoK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jucs/KurosawaSY97,
  author       = {Kaoru Kurosawa and
                  Takashi Satoh and
                  Kentaro Yamamoto},
  title        = {Highly Nonlinear t-resilient Functions},
  journal      = {J. Univers. Comput. Sci.},
  volume       = {3},
  number       = {6},
  pages        = {721--729},
  year         = {1997},
  url          = {https://doi.org/10.3217/jucs-003-06-0721},
  doi          = {10.3217/JUCS-003-06-0721},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jucs/KurosawaSY97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurosawaO97,
  author       = {Kaoru Kurosawa and
                  Satoshi Obana},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Characterisation of (k, n) Multi-receiver Authentication},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {204--215},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027927},
  doi          = {10.1007/BFB0027927},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurosawaO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaJS97,
  author       = {Kaoru Kurosawa and
                  Thomas Johansson and
                  Douglas R. Stinson},
  editor       = {Walter Fumy},
  title        = {Almost k-wise Independent Sample Spaces and Their Cryptologic Applications},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {409--421},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_28},
  doi          = {10.1007/3-540-69053-0\_28},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaJS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaS97,
  author       = {Kaoru Kurosawa and
                  Takashi Satoh},
  editor       = {Walter Fumy},
  title        = {Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic
                  Criteria},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
                  on the Theory and Application of Cryptographic Techniques, Konstanz,
                  Germany, May 11-15, 1997, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1233},
  pages        = {434--449},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/3-540-69053-0\_30},
  doi          = {10.1007/3-540-69053-0\_30},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaS97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ObanaK97,
  author       = {Satoshi Obana and
                  Kaoru Kurosawa},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {A\({}^{\mbox{2}}\)-code = Affine resolvable = {BIBD}},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {118--129},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028468},
  doi          = {10.1007/BFB0028468},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ObanaK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/OgataKST97,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa and
                  Kazue Sako and
                  Kazunori Takatani},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {Fault tolerant anonymous channel},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {440--444},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028500},
  doi          = {10.1007/BFB0028500},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/OgataKST97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/OgataSK96,
  author       = {Wakaha Ogata and
                  Keiichi Sakano and
                  Kaoru Kurosawa},
  title        = {Multisymbol Majority Vote and Hard Core},
  journal      = {Inf. Process. Lett.},
  volume       = {58},
  number       = {6},
  pages        = {285--292},
  year         = {1996},
  url          = {https://doi.org/10.1016/0020-0190(96)00058-0},
  doi          = {10.1016/0020-0190(96)00058-0},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/OgataSK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ObanaK96,
  author       = {Satoshi Obana and
                  Kaoru Kurosawa},
  title        = {Veto is Impossible in Secret Sharing Schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {58},
  number       = {6},
  pages        = {293--295},
  year         = {1996},
  url          = {https://doi.org/10.1016/0020-0190(96)00052-X},
  doi          = {10.1016/0020-0190(96)00052-X},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ObanaK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KurosawaO96,
  author       = {Kaoru Kurosawa and
                  Koji Okada},
  title        = {Combinatorial Lower Bounds for Secret Sharing Schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {60},
  number       = {6},
  pages        = {301--304},
  year         = {1996},
  url          = {https://doi.org/10.1016/S0020-0190(96)00178-0},
  doi          = {10.1016/S0020-0190(96)00178-0},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/KurosawaO96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigpro/Kurosawa96,
  author       = {Kaoru Kurosawa},
  title        = {Fast stability test algorithm for discrete time systems},
  journal      = {Signal Process.},
  volume       = {53},
  number       = {1},
  pages        = {83--88},
  year         = {1996},
  url          = {https://doi.org/10.1016/0165-1684(96)00078-3},
  doi          = {10.1016/0165-1684(96)00078-3},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigpro/Kurosawa96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaS96,
  author       = {Kaoru Kurosawa and
                  Takashi Satoh},
  editor       = {Kwangjo Kim and
                  Tsutomu Matsumoto},
  title        = {Generalization of Higher Order {SAC} to Vector Output Boolean Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '96, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Kyongju, Korea, November 3-7, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1163},
  pages        = {218--231},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0034849},
  doi          = {10.1007/BFB0034849},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaS96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/OgataK96,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  editor       = {Ueli M. Maurer},
  title        = {Optimum Secret Sharing Scheme Secure against Cheating},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '96, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saragossa,
                  Spain, May 12-16, 1996, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1070},
  pages        = {200--211},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/3-540-68339-9\_18},
  doi          = {10.1007/3-540-68339-9\_18},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/OgataK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/KurosawaOT95,
  author       = {Kaoru Kurosawa and
                  Koji Okada and
                  Shigeo Tsujii},
  title        = {Low Exponent Attack Against Elliptic Curve {RSA}},
  journal      = {Inf. Process. Lett.},
  volume       = {53},
  number       = {2},
  pages        = {77--83},
  year         = {1995},
  url          = {https://doi.org/10.1016/0020-0190(94)00179-3},
  doi          = {10.1016/0020-0190(94)00179-3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/KurosawaOT95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cocoon/KurosawaK95,
  author       = {Kaoru Kurosawa and
                  Sanpei Kageyama},
  editor       = {Ding{-}Zhu Du and
                  Ming Li},
  title        = {New Bound for Afine Resolvable Designs and Its Application to Authentication
                  Codes},
  booktitle    = {Computing and Combinatorics, First Annual International Conference,
                  {COCOON} '95, Xi'an, China, August 24-26, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {959},
  pages        = {292--302},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/BFb0030844},
  doi          = {10.1007/BFB0030844},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/cocoon/KurosawaK95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KurosawaOO95,
  author       = {Kaoru Kurosawa and
                  Satoshi Obana and
                  Wakaha Ogata},
  editor       = {Don Coppersmith},
  title        = {t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {410--423},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_33},
  doi          = {10.1007/3-540-44750-4\_33},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KurosawaOO95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaO95,
  author       = {Kaoru Kurosawa and
                  Satoshi Obana},
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {Combinatorial Bounds for Authentication Codes with Arbitration},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  pages        = {289--300},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X\_23},
  doi          = {10.1007/3-540-49264-X\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaO95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/KurosawaY95,
  author       = {Kaoru Kurosawa and
                  Naonori Yamashita},
  title        = {Power Complementary and Linear Phase Filter Banks},
  booktitle    = {1995 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  1995, Seattle, Washington, USA, April 30 - May 3, 1995},
  pages        = {760--763},
  publisher    = {{IEEE}},
  year         = {1995},
  url          = {https://doi.org/10.1109/ISCAS.1995.521628},
  doi          = {10.1109/ISCAS.1995.521628},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/KurosawaY95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OkadaK94,
  author       = {Koji Okada and
                  Kaoru Kurosawa},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {33--41},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000422},
  doi          = {10.1007/BFB0000422},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OkadaK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaO94,
  author       = {Kaoru Kurosawa and
                  Koji Okada},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Combinatorial Interpretation of Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {55--64},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000424},
  doi          = {10.1007/BFB0000424},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaO94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaOS94,
  author       = {Kaoru Kurosawa and
                  Koji Okada and
                  Keiichi Sakano},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Security of the Center in Key Distribution Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {333--341},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000445},
  doi          = {10.1007/BFB0000445},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaOS94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaOT94,
  author       = {Kaoru Kurosawa and
                  Koji Okada and
                  Shigeo Tsujii},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  title        = {Low Exponent Attack against Elliptic Curve {RSA}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '94, 4th International Conference
                  on the Theory and Applications of Cryptology, Wollongong, Australia,
                  November 28 - December 1, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {917},
  pages        = {376--383},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/BFb0000449},
  doi          = {10.1007/BFB0000449},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaOT94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Kurosawa94,
  author       = {Kaoru Kurosawa},
  editor       = {Yvo Desmedt},
  title        = {New Bound on Authentication Code with Arbitration},
  booktitle    = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {839},
  pages        = {140--149},
  publisher    = {Springer},
  year         = {1994},
  url          = {https://doi.org/10.1007/3-540-48658-5\_16},
  doi          = {10.1007/3-540-48658-5\_16},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Kurosawa94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/KurosawaYYK94,
  author       = {Kaoru Kurosawa and
                  Isao Yamada and
                  Naonori Yamashita and
                  Toshiriro Komou},
  title        = {Optimum Highpass Filter in Linear Phase Perfect Reconstruction {QMF}
                  Bank},
  booktitle    = {1994 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  1994, London, England, UK, May 30 - June 2, 1994},
  pages        = {25--28},
  publisher    = {{IEEE}},
  year         = {1994},
  url          = {https://doi.org/10.1109/ISCAS.1994.408896},
  doi          = {10.1109/ISCAS.1994.408896},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/KurosawaYYK94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/KurosawaYI94,
  author       = {Kaoru Kurosawa and
                  Isao Yamada and
                  Masayuki Ihara},
  title        = {A Necessary Condition for Linear Phase in Two Dimensional Perfect
                  Reconstruction {QMF} Banks},
  booktitle    = {1994 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  1994, London, England, UK, May 30 - June 2, 1994},
  pages        = {29--32},
  publisher    = {{IEEE}},
  year         = {1994},
  url          = {https://doi.org/10.1109/ISCAS.1994.408897},
  doi          = {10.1109/ISCAS.1994.408897},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/KurosawaYI94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/Kurosawa94,
  author       = {Kaoru Kurosawa},
  title        = {On McClellan Transform and 2-D {QMF} Banks},
  booktitle    = {1994 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  1994, London, England, UK, May 30 - June 2, 1994},
  pages        = {505--508},
  publisher    = {{IEEE}},
  year         = {1994},
  url          = {https://doi.org/10.1109/ISCAS.1994.409036},
  doi          = {10.1109/ISCAS.1994.409036},
  timestamp    = {Wed, 16 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/Kurosawa94.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaOSOT93,
  author       = {Kaoru Kurosawa and
                  Koji Okada and
                  Keiichi Sakano and
                  Wakaha Ogata and
                  Shigeo Tsujii},
  editor       = {Tor Helleseth},
  title        = {Nonperfect Secret Sharing Schemes and Matroids},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {126--141},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_11},
  doi          = {10.1007/3-540-48285-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaOSOT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ParkIK93,
  author       = {Choonsik Park and
                  Kazutomo Itoh and
                  Kaoru Kurosawa},
  editor       = {Tor Helleseth},
  title        = {Efficient Anonymous Channel and All/Nothing Election Scheme},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {248--259},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_21},
  doi          = {10.1007/3-540-48285-7\_21},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ParkIK93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/ParkKOT93,
  author       = {Choonsik Park and
                  Kaoru Kurosawa and
                  Tatsuaki Okamoto and
                  Shigeo Tsujii},
  editor       = {Tor Helleseth},
  title        = {On Key Distribution and Authentication in Mobile Radio Networks},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '93, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27,
                  1993, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {765},
  pages        = {461--465},
  publisher    = {Springer},
  year         = {1993},
  url          = {https://doi.org/10.1007/3-540-48285-7\_42},
  doi          = {10.1007/3-540-48285-7\_42},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/ParkKOT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/KurosawaYYT93,
  author       = {Kaoru Kurosawa and
                  Isao Yamada and
                  Tetsunari Yokokawa and
                  Shigeo Tsujii},
  title        = {A fast stability test for multidimensional systems},
  booktitle    = {1993 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  1993, Chicago, Illinois, USA, May 3-6, 1993},
  pages        = {579--582},
  publisher    = {{IEEE}},
  year         = {1993},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/KurosawaYYT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/KurosawaKT93,
  author       = {Kaoru Kurosawa and
                  Kouichi Kawabe and
                  Shigeo Tsujii},
  title        = {Stability and zeros of a complex polynomial},
  booktitle    = {1993 {IEEE} International Symposium on Circuits and Systems, {ISCAS}
                  1993, Chicago, Illinois, USA, May 3-6, 1993},
  pages        = {2279--2282},
  publisher    = {{IEEE}},
  year         = {1993},
  timestamp    = {Fri, 20 May 2016 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/KurosawaKT93.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OgataKT92,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa and
                  Shigeo Tsujii},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {Nonperfect Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {56--66},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_52},
  doi          = {10.1007/3-540-57220-1\_52},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OgataKT92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SatohKT92,
  author       = {Takashi Satoh and
                  Kaoru Kurosawa and
                  Shigeo Tsujii},
  editor       = {Jennifer Seberry and
                  Yuliang Zheng},
  title        = {Privacy for Multi-Party Protocols},
  booktitle    = {Advances in Cryptology - {AUSCRYPT} '92, Workshop on the Theory and
                  Application of Cryptographic Techniques, Gold Coast, Queensland, Australia,
                  December 13-16, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {718},
  pages        = {252--260},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-57220-1\_67},
  doi          = {10.1007/3-540-57220-1\_67},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SatohKT92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/KurosawaW92,
  author       = {Kaoru Kurosawa and
                  Osamu Watanabe},
  editor       = {Toshihide Ibaraki and
                  Yasuyoshi Inagaki and
                  Kazuo Iwama and
                  Takao Nishizeki and
                  Masafumi Yamashita},
  title        = {Computational and Statistical Indistinguishabilities},
  booktitle    = {Algorithms and Computation, Third International Symposium, {ISAAC}
                  '92, Nagoya, Japan, December 16-18, 1992, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {650},
  pages        = {430--438},
  publisher    = {Springer},
  year         = {1992},
  url          = {https://doi.org/10.1007/3-540-56279-6\_95},
  doi          = {10.1007/3-540-56279-6\_95},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/KurosawaW92.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/OgataK91,
  author       = {Wakaha Ogata and
                  Kaoru Kurosawa},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {On Claw Free Families},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {111--123},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_9},
  doi          = {10.1007/3-540-57332-1\_9},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/OgataK91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SaitoKS91,
  author       = {Takeshi Saito and
                  Kaoru Kurosawa and
                  Kouichi Sakurai},
  editor       = {Hideki Imai and
                  Ronald L. Rivest and
                  Tsutomu Matsumoto},
  title        = {4 Move Perfect {ZKIP} of Knowledge with No Assumption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '91, International Conference
                  on the Theory and Applications of Cryptology, Fujiyoshida, Japan,
                  November 11-14, 1991, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {739},
  pages        = {321--330},
  publisher    = {Springer},
  year         = {1991},
  url          = {https://doi.org/10.1007/3-540-57332-1\_27},
  doi          = {10.1007/3-540-57332-1\_27},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SaitoKS91.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KurosawaT90,
  author       = {Kaoru Kurosawa and
                  Shigeo Tsujii},
  editor       = {Alfred Menezes and
                  Scott A. Vanstone},
  title        = {Multi-Language Zero Knowledge Interactive Proof Systems},
  booktitle    = {Advances in Cryptology - {CRYPTO} '90, 10th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {537},
  pages        = {339--352},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-38424-3\_25},
  doi          = {10.1007/3-540-38424-3\_25},
  timestamp    = {Fri, 17 Jul 2020 16:12:45 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KurosawaT90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaKOT90,
  author       = {Kaoru Kurosawa and
                  Yutaka Katayama and
                  Wakaha Ogata and
                  Shigeo Tsujii},
  editor       = {Ivan Damg{\aa}rd},
  title        = {General Public Key Residue Cryptosystems and Mental Poker Protocols},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '90, Workshop on the Theory and
                  Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24,
                  1990, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {473},
  pages        = {374--388},
  publisher    = {Springer},
  year         = {1990},
  url          = {https://doi.org/10.1007/3-540-46877-3\_34},
  doi          = {10.1007/3-540-46877-3\_34},
  timestamp    = {Fri, 17 Jul 2020 16:12:46 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaKOT90.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/SuganumaKY89,
  author       = {Tomohisa Suganuma and
                  Kaoru Kurosawa and
                  Ni Yongmao},
  title        = {A polynomial time validation method for channel boundedness of communication
                  protocols {(2} processes)},
  journal      = {Syst. Comput. Jpn.},
  volume       = {20},
  number       = {11},
  pages        = {60--66},
  year         = {1989},
  url          = {https://doi.org/10.1002/scj.4690201106},
  doi          = {10.1002/SCJ.4690201106},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/SuganumaKY89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsp/KurosawaT89,
  author       = {Kaoru Kurosawa and
                  Shigeo Tsujii},
  title        = {An {IIR} parallel-type adaptive algorithm using the fast least squares
                  method},
  journal      = {{IEEE} Trans. Acoust. Speech Signal Process.},
  volume       = {37},
  number       = {8},
  pages        = {1226--1230},
  year         = {1989},
  url          = {https://doi.org/10.1109/29.31270},
  doi          = {10.1109/29.31270},
  timestamp    = {Tue, 19 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsp/KurosawaT89.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cryptologia/KurosawaIT88,
  author       = {Kaoru Kurosawa and
                  Toshiya Itoh and
                  Masashi Takeuchi},
  title        = {Public Key Cryptosystem using a reciprocal number with the same Intractability
                  as Factoring a Large number},
  journal      = {Cryptologia},
  volume       = {12},
  number       = {4},
  pages        = {225--233},
  year         = {1988},
  url          = {https://doi.org/10.1080/0161-118891862972},
  doi          = {10.1080/0161-118891862972},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cryptologia/KurosawaIT88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/TsujiiIFKM88,
  author       = {Shigeo Tsujii and
                  Toshiya Itoh and
                  Atsushi Fujioka and
                  Kaoru Kurosawa and
                  Tsutomu Matsumoto},
  title        = {A public-key cryptosystem based on the difficulty of solving a system
                  of nonlinear equations},
  journal      = {Syst. Comput. Jpn.},
  volume       = {19},
  number       = {2},
  pages        = {10--18},
  year         = {1988},
  url          = {https://doi.org/10.1002/scj.4690190202},
  doi          = {10.1002/SCJ.4690190202},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/TsujiiIFKM88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scjapan/KurosawaKS88,
  author       = {Kaoru Kurosawa and
                  Yoshiki Kuwabara and
                  Takashi Shigeno},
  title        = {A Validation Method for Communication Protocols Using Context-Free
                  Language Theory},
  journal      = {Syst. Comput. Jpn.},
  volume       = {19},
  number       = {4},
  pages        = {48--55},
  year         = {1988},
  url          = {https://doi.org/10.1002/scj.4690190405},
  doi          = {10.1002/SCJ.4690190405},
  timestamp    = {Wed, 13 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scjapan/KurosawaKS88.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/KurosawaT86,
  author       = {Kaoru Kurosawa and
                  Shigeo Tsujii},
  title        = {A new {IIR} type adaptive algorithm of parallel type structure},
  booktitle    = {{IEEE} International Conference on Acoustics, Speech, and Signal Processing,
                  {ICASSP} 1986, Tokyo, Japan, April 7-11, 1986},
  pages        = {2091--2094},
  publisher    = {{IEEE}},
  year         = {1986},
  url          = {https://doi.org/10.1109/ICASSP.1986.1169129},
  doi          = {10.1109/ICASSP.1986.1169129},
  timestamp    = {Mon, 09 Aug 2021 14:54:02 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/KurosawaT86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/KurosawaT86,
  author       = {Kaoru Kurosawa and
                  Shigeo Tsujii},
  title        = {An Efficient Method to Find Invalid Loops in a Communication Protocol
                  and Its Application to {HDLC}},
  booktitle    = {{IEEE} International Conference on Communications: Integrating the
                  World Through Communications, {ICC} 1986, Toronto, Canada, June 22-25,
                  1986, Proceedings},
  pages        = {563--567},
  publisher    = {{IEEE}},
  year         = {1986},
  timestamp    = {Wed, 22 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/KurosawaT86.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}