
Kouichi Sakurai
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j90]Zhao Hao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
A Sequential Detection Method for Intrusion Detection System Based on Artificial Neural Networks. Int. J. Netw. Comput. 10(2): 213-226 (2020) - [j89]Yan Naung Soe
, Yaokai Feng, Paulus Insap Santosa
, Rudy Hartanto, Kouichi Sakurai:
Machine Learning-Based IoT-Botnet Attack Detection with Sequential Architecture. Sensors 20(16): 4372 (2020) - [c323]Kosuke Kaneko, Ke Yan, Kouichi Sakurai:
Simulation System of Autonomous Vehicles for Overtaking Service Using Smart Contract. CISIS 2020: 199-209 - [c322]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Cryptography. EIDWT 2020: 247-258 - [c321]Daiji Hara, Kouichi Sakurai, Yasuo Musashi:
Classification of Malicious Domains by Their LIFETIME. EIDWT 2020: 334-341 - [c320]Haibo Zhang, Kouichi Sakurai:
Blockchain for IoT-Based Digital Supply Chain: A Survey. EIDWT 2020: 564-573 - [c319]Sabyasachi Dutta, Md Kutubuddin Sardar, Avishek Adhikari, Sushmita Ruj, Kouichi Sakurai:
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings. ICISS 2020: 198-217 - [c318]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties. NSS 2020: 292-308 - [c317]Ishak Meraouche, Sabyasachi Dutta, Kouichi Sakurai:
3-Party Adversarial Steganography. WISA 2020: 89-100 - [i17]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Hypercube and Cascading-based Algorithms for Secret Sharing Schemes. IACR Cryptol. ePrint Arch. 2020: 719 (2020)
2010 – 2019
- 2019
- [j88]Mosarrat Jahan
, Suranga Seneviratne, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne, Sanjay K. Jha
:
Light weight and fine-grained access mechanism for secure access to outsourced data. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j87]Wai Kyi Kyi Oo, Hiroshi Koide, Kouichi Sakurai:
Analyzing the Effect of Moving Target Defense for a Web System. Int. J. Netw. Comput. 9(2): 188-200 (2019) - [j86]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking convolutional neural network using differential evolution. IPSJ Trans. Comput. Vis. Appl. 11: 1 (2019) - [j85]Hiroaki Anada, Takanori Yasuda, Junpei Kawamoto, Jian Weng
, Kouichi Sakurai:
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust. J. Inf. Secur. Appl. 45: 10-19 (2019) - [j84]Jiawei Su
, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One Pixel Attack for Fooling Deep Neural Networks. IEEE Trans. Evol. Comput. 23(5): 828-841 (2019) - [c316]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation. AINA 2019: 458-469 - [c315]Johjima Shota, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Simulation of Secure Volunteer Computing by Using Blockchain. AINA 2019: 883-894 - [c314]Somnath Panja, Sabyasachi Dutta, Kouichi Sakurai:
Deniable Secret Handshake Protocol - Revisited. AINA 2019: 1266-1278 - [c313]Di Li, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Universal Rules for Fooling Deep Neural Networks based Text Classification. CEC 2019: 2221-2228 - [c312]Yan Naung Soe, Yaokai Feng, Paulus Insap Santosa, Rudy Hartanto, Kouichi Sakurai:
A Sequential Scheme for Detecting Cyber Attacks in IoT Environment. DASC/PiCom/DataCom/CyberSciTech 2019: 238-244 - [c311]Haibo Zhang, Toru Nakamura, Kouichi Sakurai:
Security and Trust Issues on Digital Supply Chain. DASC/PiCom/DataCom/CyberSciTech 2019: 338-343 - [c310]Rui Qiu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Frame Difference Generative Adversarial Networks: Clearer Contour Video Generating. CANDAR Workshops 2019: 169-175 - [c309]Hao Zhao, Yaokai Feng, Hiroshi Koide, Kouichi Sakurai:
An ANN Based Sequential Detection Method for Balancing Performance Indicators of IDS. CANDAR 2019: 239-244 - [c308]Limao Ma, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Reliable Decentralized Oracle with Mechanisms for Verification and Disputation. CANDAR Workshops 2019: 346-352 - [c307]Sabyasachi Dutta, Tamal Bhore, Md Kutubuddin Sardar, Avishek Adhikari, Kouichi Sakurai:
Visual Secret Sharing Scheme with Distributed Levels of Importance of Shadows. ICMC 2019: 19-32 - [c306]Sabyasachi Dutta, Kouichi Sakurai:
Theory and Application of Computationally-Independent One-Way Functions: Interactive Proof of Ability - Revisited. ICMC 2019: 97-109 - [c305]Katsumi Nagai, Hiroshi Koide, Kouichi Sakurai:
Proposal and Evaluation of a Security Incident Response Training Method using Programming. SIGITE 2019: 165 - [c304]Longjian Ye, Hiroshi Koide, Dirceu Cavendish, Kouichi Sakurai:
Efficient Shortest Path Routing Algorithms for Distributed XML Processing. WEBIST 2019: 265-272 - [c303]Sabyasachi Dutta, Partha Sarathi Roy
, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Secret Sharing on Evolving Multi-level Access Structure. WISA 2019: 180-191 - [i16]Di Li, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Universal Rules for Fooling Deep Neural Networks based Text Classification. CoRR abs/1901.07132 (2019) - [i15]Sabyasachi Dutta, Kouichi Sakurai:
Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited. IACR Cryptol. ePrint Arch. 2019: 323 (2019) - [i14]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
AC0 Constructions for Evolving Secret Sharing Schemes and Redistribution of Secret Shares. IACR Cryptol. ePrint Arch. 2019: 1428 (2019) - [i13]Shion Samadder Chaudhury, Sabyasachi Dutta, Kouichi Sakurai:
Secret Sharing Schemes : A Fine Grained Analysis. IACR Cryptol. ePrint Arch. 2019: 1429 (2019) - 2018
- [j83]Mosarrat Jahan
, Mohsen Rezvani, Qianrui Zhao, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne
, Sanjay K. Jha
:
Light Weight Write Mechanism for Cloud Data. IEEE Trans. Parallel Distributed Syst. 29(5): 1131-1146 (2018) - [c302]Yuto Nakano, Seira Hidano, Shinsaku Kiyomoto, Kouichi Sakurai:
Active Attack Against Oblivious RAM. AINA 2018: 744-751 - [c301]Hiroaki Anada, Tomohiro Matsushima, Chunhua Su, Weizhi Meng, Junpei Kawamoto, Samiran Bag, Kouichi Sakurai:
Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work. Inscrypt 2018: 101-114 - [c300]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware Based on Image Recognition. COMPSAC (2) 2018: 664-669 - [c299]Yaokai Feng, Hitoshi Akiyama, Liang Lu, Kouichi Sakurai:
Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks. DASC/PiCom/DataCom/CyberSciTech 2018: 173-180 - [c298]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation. CANDAR Workshops 2018: 223-227 - [c297]Ryousuke Komiya, Yaokai Feng, Kouichi Sakurai:
Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding. CANDAR Workshops 2018: 417-423 - [c296]Yuetong Zhu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Neural Cryptography Based on the Topology Evolving Neural Networks. CANDAR Workshops 2018: 472-478 - [c295]Yuki Nishida, Kosuke Kaneko, Subodh Sharma, Kouichi Sakurai:
Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems. CANDAR Workshops 2018: 524-528 - [c294]Yao Xu, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Tracing MIRAI Malware in Networked System. CANDAR Workshops 2018: 534-538 - [c293]Wai Kyi Kyi Oo, Hiroshi Koide, Danilo Vasconcellos Vargas, Kouichi Sakurai:
A New Design for Evaluating Moving Target Defense System. CANDAR Workshops 2018: 561-563 - [c292]Jyotirmoy Pramanik
, Partha Sarathi Roy
, Sabyasachi Dutta, Avishek Adhikari, Kouichi Sakurai:
Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters. ICISS 2018: 171-188 - [c291]Partha Sarathi Roy
, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai:
Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. ISPEC 2018: 578-594 - [c290]Asoke K. Talukder, Manish Chaitanya, David Arnold, Kouichi Sakurai:
Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 257-262 - [e6]Satya V. Lokam, Sushmita Ruj, Kouichi Sakurai:
Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC@AsiaCCS 2018, Incheon, Republic of Korea, June 4, 2018. ACM 2018 [contents] - [e5]Debdas Ghosh, Debasis Giri, Ram N. Mohapatra, Ekrem Savas, Kouichi Sakurai, L. P. Singh:
Mathematics and Computing - 4th International Conference, ICMC 2018, Varanasi, India, January 9-11, 2018, Revised Selected Papers. Communications in Computer and Information Science 834, Springer 2018, ISBN 978-981-13-0022-6 [contents] - [i12]Jiawei Su, Danilo Vasconcellos Vargas, Sanjiva Prasad, Daniele Sgandurra, Yaokai Feng, Kouichi Sakurai:
Lightweight Classification of IoT Malware based on Image Recognition. CoRR abs/1802.03714 (2018) - [i11]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Attacking Convolutional Neural Network using Differential Evolution. CoRR abs/1804.07062 (2018) - 2017
- [j82]Rohit Ahuja, Sraban Kumar Mohanty
, Kouichi Sakurai:
A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing. Comput. Electr. Eng. 57: 241-256 (2017) - [j81]Pinaki Sarkar, Morshed Uddin Chowdhury
, Kouichi Sakurai:
Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors. Concurr. Comput. Pract. Exp. 29(23) (2017) - [j80]Samiran Bag
, Sushmita Ruj, Kouichi Sakurai:
Bitcoin Block Withholding Attack: Analysis and Mitigation. IEEE Trans. Inf. Forensics Secur. 12(8): 1967-1978 (2017) - [j79]Hiroaki Anada
, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai:
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions. J. Supercomput. 73(10): 4275-4301 (2017) - [c289]Xiang You, Yaokai Feng, Kouichi Sakurai:
Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow. CANDAR 2017: 522-528 - [c288]Shiqian Yu, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking. CANDAR 2017: 533-536 - [c287]Mojtaba Alizadeh
, Mohammad Hesam Tadayon, Kouichi Sakurai, Sabariah Baharun, Hiroaki Anada, Mazdak Zamani
, Akram M. Zeki, Shehzad Ashraf Chaudhry
, Muhammad Khurram Khan:
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management". ICIN 2017: 112-116 - [c286]Ryosuke Miyazaki, Junpei Kawamoto, Shinichi Matsumoto, Kouichi Sakurai:
Host independent and distributed detection system of the network attack by using OpenFlow. ICOIN 2017: 236-241 - [c285]Tomohisa Ishikawa, Kouichi Sakurai:
A proposal of event study methodology with Twitter sentimental analysis for risk management. IMCOM 2017: 14 - [c284]Taku Nishigori, Junpei Kawamoto, Kouichi Sakurai:
Improving the accuracy of signature authentication using the eight principles of Yong. IMCOM 2017: 32 - [c283]Liang Lu, Yaokai Feng, Kouichi Sakurai:
C&C session detection using random forest. IMCOM 2017: 34 - [c282]Tomohisa Ishikawa, Kouichi Sakurai:
Parameter manipulation attack prevention and detection by using web application deception proxy. IMCOM 2017: 74 - [c281]Kirill Morozov, Partha Sarathi Roy, Kouichi Sakurai:
On unconditionally binding code-based commitment schemes. IMCOM 2017: 101 - [c280]Wissam Razouk, Daniele Sgandurra, Kouichi Sakurai:
A new security middleware architecture based on fog computing and cloud to support IoT constrained devices. IML 2017: 35:1-35:8 - [c279]Kouichi Sakurai, Takashi Nishide, Amril Syalim:
Improved proxy re-encryption scheme for symmetric key cryptography. IWBIS 2017: 105-111 - [c278]Amril Syalim, Kouichi Sakurai:
How to sign multiple versions of digital documents. IWBIS 2017: 133-136 - [c277]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
Evasion Attacks Against Statistical Code Obfuscation Detectors. IWSEC 2017: 121-137 - [c276]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation. SpaCCS 2017: 461-473 - [c275]Mosarrat Jahan, Partha Sarathi Roy
, Kouichi Sakurai, Aruna Seneviratne
, Sanjay Jha
:
Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data. TrustCom/BigDataSE/ICESS 2017: 201-209 - [i10]Jiawei Su, Danilo Vasconcellos Vargas, Kouichi Sakurai:
One pixel attack for fooling deep neural networks. CoRR abs/1710.08864 (2017) - 2016
- [j78]Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints. J. Internet Serv. Inf. Secur. 6(2): 23-36 (2016) - [j77]Mojtaba Alizadeh
, Saeid Abolfazli
, Mazdak Zamani
, Sabariah Baharun, Kouichi Sakurai:
Authentication in mobile cloud computing: A survey. J. Netw. Comput. Appl. 61: 59-80 (2016) - [j76]Takanori Suga, Takashi Nishide, Kouichi Sakurai:
Character-based symmetric searchable encryption and its implementation and experiment on mobile devices. Secur. Commun. Networks 9(12): 1717-1725 (2016) - [c274]Rohit Ahuja, Sraban Kumar Mohanty
, Kouichi Sakurai:
A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage. CIT 2016: 524-531 - [c273]Yoshifumi Ueshige, Kouichi Sakurai:
Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication Protocols. AINA 2016: 769-775 - [c272]Rohit Ahuja, Sraban Kumar Mohanty
, Kouichi Sakurai:
An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing. AsiaJCIS 2016: 39-47 - [c271]Yuxuan Gao, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation. AsiaJCIS 2016: 80-86 - [c270]Yoshiaki Hori, Seiichiro Mizoguchi, Ryosuke Miyazaki, Akira Yamada, Yaokai Feng, Ayumu Kubota, Kouichi Sakurai:
A Comprehensive Security Analysis Checksheet for OpenFlow Networks. BWCCA 2016: 231-242 - [c269]Linghuan Xiao, Shinichi Matsumoto, Tomohisa Ishikawa, Kouichi Sakurai:
SQL Injection Attack Detection Method Using Expectation Criterion. CANDAR 2016: 649-654 - [c268]Binanda Sengupta, Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
Retricoin: Bitcoin based on compact proofs of retrievability. ICDCN 2016: 14:1-14:10 - [c267]Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy
, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters. ICITS 2016: 3-23 - [c266]Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai:
Cross-group Secret Sharing for Secure Cloud Storage Service. IMCOM 2016: 63:1-63:8 - [c265]Tomohisa Ishikawa, Kouichi Sakurai:
A Study of Security Management with Cyber Insurance. IMCOM 2016: 68:1-68:6 - [c264]Ziyi Li, Junpei Kawamoto, Yaokai Feng, Kouichi Sakurai:
Cyberbullying detection using parent-child relationship between comments. iiWAS 2016: 325-334 - [c263]Pengfei Li, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging. IMIS 2016: 603-607 - [c262]Longzhu Cai, Yaokai Feng, Junpei Kawamoto, Kouichi Sakurai:
A Behavior-Based Method for Detecting DNS Amplification Attacks. IMIS 2016: 608-613 - [c261]Samiran Bag, Kouichi Sakurai:
Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools. ISC 2016: 167-180 - [c260]Sabyasachi Dutta, Partha Sarathi Roy
, Avishek Adhikari, Kouichi Sakurai:
On the Robustness of Visual Cryptographic Schemes. IWDW 2016: 251-262 - [c259]Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai:
Expressive Rating Scheme by Signatures with Predications on Ratees. NSS 2016: 363-379 - [c258]Junzuo Lai, Robert H. Deng
, Changshe Ma, Kouichi Sakurai, Jian Weng:
CCA-Secure Keyed-Fully Homomorphic Encryption. Public Key Cryptography (1) 2016: 70-98 - [c257]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks. WISA 2016: 79-89 - [i9]Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures. IACR Cryptol. ePrint Arch. 2016: 483 (2016) - 2015
- [j75]Angsuman Das, Avishek Adhikari, Kouichi Sakurai:
Plaintext checkable encryption with designated checker. Adv. Math. Commun. 9(1): 37-53 (2015) - [j74]Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:
A multivariate quadratic challenge toward post-quantum generation cryptography. ACM Commun. Comput. Algebra 49(3): 105-107 (2015) - [j73]Kouichi Sakurai:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 1-2 (2015) - [j72]Kuo-Yang Wu, Kuo-Yu Tsai, Tzong-Chen Wu, Kouichi Sakurai:
Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks. J. Inf. Sci. Eng. 31(2): 727-742 (2015) - [j71]Jian Weng
, Yunlei Zhao, Robert H. Deng
, Shengli Liu, Yanjiang Yang, Kouichi Sakurai:
A note on the security of KHL scheme. Theor. Comput. Sci. 602: 1-6 (2015) - [c256]Zhongqqiang Zhang, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms. AINA 2015: 406-413 - [c255]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai:
A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding. AsiaJCIS 2015: 152-159 - [c254]Samiran Bag, Sushmita Ruj, Kouichi Sakurai:
On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies. Inscrypt 2015: 260-279 - [c253]Hirokazu Ishizuka, Kouichi Sakurai, Isao Echizen, Keiichi Iwamura:
Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm. CANDAR 2015: 457-462 - [c252]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields. CANDAR 2015: 477-483 - [c251]Takanori Yasuda, Kouichi Sakurai:
A Multivariate Encryption Scheme with Rainbow. ICICS 2015: 236-251 - [c250]Hiroaki Anada, Seiko Arita, Kouichi Sakurai:
Attribute-Based Two-Tier Signatures: Definition and Construction. ICISC 2015: 36-49 - [c249]Naoya Kajiwara, Junpei Kawamoto, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Android ad library focusing on HTTP connections and view object redraw behaviors. ICOIN 2015: 104-109 - [c248]Chunlu Chen, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai:
Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse. ICT-EurAsia/CONFENIS 2015: 255-264 - [c247]Hui Zhao, Kouichi Sakurai:
Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS. INTRUST 2015: 99-113 - [c246]Takanori Yasuda, Hiroaki Anada, Kouichi Sakurai:
Application of NTRU Using Group Rings to Partial Decryption Technique. INTRUST 2015: 203-213 - [c245]Nobuyuki Teraura, Kouichi Sakurai:
Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones. NTMS 2015: 1-5 - [c244]Nobuyuki Teraura, Kunio Ito, Daisuke Kobayashi, Kouichi Sakurai:
Evaluation of gamma ray durability of RF tag and application to the radiation environment. RFID-TA 2015: 147-152 - [i8]Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems. IACR Cryptol. ePrint Arch. 2015: 275 (2015) - [i7]Hui Zhao, Kouichi Sakurai:
Computational Soundness of Uniformity Properties for Multi-party Computation based on LSSS. IACR Cryptol. ePrint Arch. 2015: 1054 (2015) - [i6]Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu:
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters. IACR Cryptol. ePrint Arch. 2015: 1115 (2015) - [i5]Takanori Yasuda, Xavier Dahan, Kouichi Sakurai:
Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security. IACR Cryptol. ePrint Arch. 2015: 1170 (2015) - 2014
- [j70]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai:
An enhanced audio ownership protection scheme based on visual cryptography. EURASIP J. Inf. Secur. 2014: 2 (2014) - [j69]Yuto Nakano, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsukasa Ishiguro, Yutaka Miyake, Toshiaki Tanaka, Kouichi Sakurai:
Fast Implementation of KCipher-2 for Software and Hardware. IEICE Trans. Inf. Syst. 97-D(1): 43-52 (2014) - [j68]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Security of Multivariate Signature Scheme Using Non-commutative Rings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 245-252 (2014) - [j67]Fangming Zhao, Takashi Nishide, Kouichi Sakurai:
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search. IEICE Trans. Inf. Syst. 97-D(7): 1790-1803 (2014) - [j66]Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai:
Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation. IEICE Trans. Inf. Syst. 97-D(10): 2576-2585 (2014) - [j65]Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai:
Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units. J. Internet Serv. Inf. Secur. 4(3): 1-20 (2014) - [j64]Naoya Kajiwara, Shinichi Matsumoto, Yuuki Nishimoto, Yoshiaki Hori, Kouichi Sakurai:
Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework. J. Networks 9(11): 2905-2913 (2014) - [j63]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Efficient variant of Rainbow using sparse secret keys. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 3-13 (2014) - [j62]