Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Kouichi Sakurai
2010 – today
- 2013
[j53]Jingyu Hua, Kouichi Sakurai: Botnet command and control based on Short Message Service and human mobility. Computer Networks 57(2): 579-597 (2013)
[j52]Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai: Efficient implementation for QUAD stream cipher with GPUs. Comput. Sci. Inf. Syst. 10(2): 897-911 (2013)
[j51]Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai: General Fault Attacks on Multivariate Public Key Cryptosystems. IEICE Transactions 96-A(1): 196-205 (2013)
[j50]Nobuyuki Teraura, Kouichi Sakurai: Confidentiality of 2D Code using Infrared with Cell-level Error Correction. IJIMAI 2(1): 23-31 (2013)
[j49]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun-ichi Takeuchi: A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets. JIP 21(3): 527-538 (2013)
[j48]Yizhi Ren, Mingchu Li, Yang Xiang, Yongrui Cui, Kouichi Sakurai: Evolution of cooperation in reputation system by group-based scheme. The Journal of Supercomputing 63(1): 171-190 (2013)
[c206]Amril Syalim, Takashi Nishide, Kouichi Sakurai: Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance. ICT-EurAsia 2013: 363-372
[c205]Shinichi Matsumoto, Kouichi Sakurai: A proposal for the privacy leakage verification tool for Android application developers. ICUIMC 2013: 54
[c204]Satoshi Tanaka, Takanori Yasuda, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai: Efficient Computing over GF(2^16) Using Graphics Processing Unit. IMIS 2013: 843-846
[c203]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai: Multivariate Signature Scheme Using Quadratic Forms. PQCrypto 2013: 243-258- 2012
[j47]Dong Hao, Xiaojuan Liao, Avishek Adhikari, Kouichi Sakurai, Makoto Yokoo: A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks. Computer Communications 35(17): 2125-2137 (2012)
[j46]Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai: DSSH: Digital signature based secure handover for network-based mobility management. Comput. Syst. Sci. Eng. 27(3) (2012)
[j45]Amril Syalim, Takashi Nishide, Kouichi Sakurai: Securing Provenance of Distributed Processes in an Untrusted Environment. IEICE Transactions 95-D(7): 1894-1907 (2012)
[j44]Laiping Zhao, Yizhi Ren, MingChu Li, Kouichi Sakurai: Flexible service selection with user-specific QoS support in service-oriented architecture. J. Network and Computer Applications 35(3): 962-973 (2012)
[j43]Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai: Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network. JNW 7(1): 88-100 (2012)
[c202]
[c201]Shogo Nakamura, Yoshiaki Hori, Kouichi Sakurai: Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology. AINA Workshops 2012: 766-771
[c200]
[c199]Liang Zhao, Takashi Nishide, Kouichi Sakurai: Differential Fault Analysis of Full LBlock. COSADE 2012: 135-150
[c198]Satoru Akimoto, Yoshiaki Hori, Kouichi Sakurai: Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic. CSS 2012: 212-226
[c197]Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi: Reducing the Key Size of Rainbow Using Non-commutative Rings. CT-RSA 2012: 68-83
[c196]Fangming Zhao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai: Analysis of Methods for Detecting Compromised Nodes and its Countermeasures. ICITCS 2012: 53-60
[c195]Yichao Xu, Kouichi Sakurai: Cooperatively securing network coding against pollution attacks with incentive mechanism. ICUIMC 2012: 52
[c194]Taketoshi Sakuraba, Kouichi Sakurai: Proposal of the Hierarchical File Server Groups for Implementing Mandatory Access Control. IMIS 2012: 639-644
[c193]Nobuyuki Teraura, Kouichi Sakurai: Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional Code. IMIS 2012: 645-650
[c192]Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai: Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs. IMIS 2012: 660-664
[c191]Motoki Kitahara, Takashi Nishide, Kouichi Sakurai: A Method for Embedding Secret Key Information in RSA Public Key and Its Application. IMIS 2012: 665-670
[c190]Nobuyuki Teraura, Kouichi Sakurai: Information Hiding of Two-dimensional Code by Multi-layer Optical. ISPA 2012: 770-777
[c189]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai: Image Splicing Verification Based on Pixel-Based Alignment Method. IWDW 2012: 198-212
[c188]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai: Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography. IWSEC 2012: 19-36
[c187]Rimba Whidiana Ciptasari, Kyung Hyune Rhee, Kouichi Sakurai: An Image Splicing Detection Based on Interpolation Analysis. PCM 2012: 390-401
[c186]Takanori Suga, Takashi Nishide, Kouichi Sakurai: Secure Keyword Search Using Bloom Filter with Specified Character Positions. ProvSec 2012: 235-252
[c185]Jingyu Hua, Kouichi Sakurai: Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation. SAC 2012: 1470-1477
[c184]Yaokai Feng, Yoshiaki Hori, Kouichi Sakurai, Jun-ichi Takeuchi: A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks. SAINT 2012: 267-272
[c183]Chunhua Su, Guilin Wang, Kouichi Sakurai: Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework. TrustCom 2012: 1012-1017
[c182]Satoshi Tanaka, Tung Chou, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai: Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs. WISA 2012: 28-42- 2011
[j42]Jingyu Hua, MingChu Li, Yizhi Ren, Kouichi Sakurai: Efficient Context-Sensitive Intrusion Detection Based on State Transition Table. IEICE Transactions 94-A(1): 255-264 (2011)
[j41]Ilsun You, Yoshiaki Hori, Kouichi Sakurai: Towards formal analysis of wireless LAN security with MIS protocol. IJAHUC 7(2): 112-120 (2011)
[j40]Ilsun You, Jong-Hyouk Lee, Yoshiaki Hori, Kouichi Sakurai: Enhancing MISP with Fast Mobile IPv6 Security. Mobile Information Systems 7(3): 271-283 (2011)
[j39]Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai: Guest editorial: Trusted computing and communications. Security and Communication Networks 4(1): 1-2 (2011)
[j38]Yizhi Ren, MingChu Li, Kouichi Sakurai: FineTrust: a fine-grained trust model for peer-to-peer networks. Security and Communication Networks 4(1): 61-69 (2011)
[c181]Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, Kyung Hyune Rhee: Securing Location-Aware Services Based on Online/Offline Signatures in VANETs. ARES 2011: 271-285
[c180]Laiping Zhao, Yizhi Ren, Kouichi Sakurai: A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems. AINA 2011: 275-282
[c179]Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung Hyune Rhee, Kouichi Sakurai: Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. Inscrypt 2011: 341-362
[c178]Fangming Zhao, Takashi Nishide, Kouichi Sakurai: Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control. ICISC 2011: 406-418
[c177]Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai: A generic evaluation method for key management schemes in wireless sensor network. ICUIMC 2011: 55
[c176]Peng Gao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai: Integrity for the In-flight web page based on a fragile watermarking chain scheme. ICUIMC 2011: 86
[c175]Rong Huang, Kouichi Sakurai: A Robust and Compression-Combined Digital Image Encryption Method Based on Compressive Sensing. IIH-MSP 2011: 105-108
[c174]Rimba Whidiana Ciptasari, Aulia Fajar, Fazmah Arif Yulianto, Kouichi Sakurai: An Efficient Key Generation Method in Audio Zero-Watermarking. IIH-MSP 2011: 336-339
[c173]Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai: Design and Implementation of a Forced Encryption Kernel Module. IMIS 2011: 607-611
[c172]Seiichiro Mizoguchi, Keisuke Takemori, Yutaka Miyake, Yoshiaki Hori, Kouichi Sakurai: Traceback Framework against Botmaster by Sharing Network Communication Pattern Information. IMIS 2011: 639-644
[c171]Yoshiaki Hori, Takashi Nishide, Kouichi Sakurai: Towards Countermeasure of Insider Threat in Network Security. INCoS 2011: 634-636
[c170]Takashi Nishide, Kouichi Sakurai: Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited. INCoS 2011: 656-661
[c169]Dong Hao, Avishek Adhikari, Kouichi Sakurai: Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks. INTRUST 2011: 239-257
[c168]Fangming Zhao, Takashi Nishide, Kouichi Sakurai: Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems. ISPEC 2011: 83-97
[c167]Ryuzou Nishi, Kirill Morozov, Yoshiaki Hori, Kouichi Sakurai: Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter. MSN 2011: 463-469
[c166]Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai: General Fault Attacks on Multivariate Public Key Cryptosystems. PQCrypto 2011: 1-18
[c165]Takanori Yasuda, Kouichi Sakurai: A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm. PQCrypto 2011: 275-294
[c164]Fumiharu Etoh, Yoshiaki Hori, Kouichi Sakurai: A Study of Communication Route Selection Considering Route Security. SAINT 2011: 360-365
[c163]Kazuhide Fukushima, Shinsaku Kiyomoto, Yutaka Miyake, Kouichi Sakurai: Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree. SECRYPT 2011: 37-49
[c162]Jingyu Hua, Kouichi Sakurai: A SMS-Based Mobile Botnet Using Flooding Algorithm. WISTP 2011: 264-279- 2010
[j37]Guojun Wang, Laurence Tianruo Yang, Kouichi Sakurai: Foreword. IEICE Transactions 93-D(3): 409-410 (2010)
[j36]Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai: Analysis of Existing Privacy-Preserving Protocols in Domain Name System. IEICE Transactions 93-D(5): 1031-1043 (2010)
[j35]Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai, Yoshiaki Hori: ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6. IEICE Transactions 93-D(5): 1096-1105 (2010)
[j34]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Improved Subset Difference Method with Ternary Tree. IEICE Transactions 93-A(11): 2034-2044 (2010)
[j33]Heru Sukoco, Yoshiaki Hori, Hendrawan, Kouichi Sakurai: Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol. IEICE Transactions 93-D(11): 2953-2961 (2010)
[c161]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai: Adaptive and Composable Non-committing Encryptions. ACISP 2010: 135-144
[c160]Seiichiro Mizoguchi, Yoshiro Fukushima, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai: Darknet Monitoring on Real-Operated Networks. BWCCA 2010: 278-285
[c159]Amril Syalim, Takashi Nishide, Kouichi Sakurai: Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance. DBSec 2010: 311-318
[c158]Jingyu Hua, Kouichi Sakurai: Modeling and Containment of Search Worms Targeting Web Applications. DIMVA 2010: 183-199
[c157]Laiping Zhao, Yizhi Ren, Yang Xiang, Kouichi Sakurai: Fault tolerant scheduling with dynamic number of replicas in heterogeneous system. HPCC 2010: 434-441
[c156]Liangjian Mao, Shuzhen Yao, Kai Zhang, Kouichi Sakurai: Design and Implementation of Document Access Control Model Based on Role and Security Policy. INTRUST 2010: 26-36
[c155]Dong Hao, Yizhi Ren, Kouichi Sakurai: A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress). INTRUST 2010: 237-252
[c154]Laiping Zhao, Yizhi Ren, MingChu Li, Kouichi Sakurai: SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid. IPDPS Workshops 2010: 1-8
[c153]Liang Zhao, Avishek Adhikari, Kouichi Sakurai: A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane. IWDW 2010: 29-44
[c152]Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai: Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit. IWDW 2010: 45-59
[c151]Tadashi Kiuchi, Yoshiaki Hori, Kouichi Sakurai: A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks. SAINT 2010: 261-264
[c150]Jingyu Hua, Takashi Nishide, Kouichi Sakurai: Model-Based Intrusion Detection by Abstract Interpretation. SAINT 2010: 359-362
[c149]Fumiharu Etoh, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai: Study of Log File Dispersion Management Method. SAINT 2010: 371-374
[c148]Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai: Behavior Control Based on Dynamic Code Translation. SAINT 2010: 375-378
[c147]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai: Adaptive and Composable Non-interactive String-commitment Protocols. SECRYPT 2010: 354-361
[c146]Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai: Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries. SECRYPT 2010: 389-398
[c145]Takashi Nishide, Kouichi Sakurai: Distributed Paillier Cryptosystem without Trusted Dealer. WISA 2010: 44-60
[e3]Tai-Hoon Kim, Thanos Vasilakos, Kouichi Sakurai, Yang Xiao, Gansen Zhao, Dominik Slezak (Eds.): Communication and Networking - International Conference, FGCN 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings, Part II. Communications in Computer and Information Science 120, Springer 2010, ISBN 978-3-642-17603-6
2000 – 2009
- 2009
[j32]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes. IEICE Transactions 92-A(4): 1246-1250 (2009)
[j31]
[j30]Yongrui Cui, MingChu Li, Yizhi Ren, Kouichi Sakurai: An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation. IEICE Transactions 92-A(5): 1339-1346 (2009)
[j29]Cheng Guo, MingChu Li, Kouichi Sakurai: A New Secret Sharing Scheme Based on the Multi-Dealer. IEICE Transactions 92-A(5): 1373-1378 (2009)
[j28]Yizhi Ren, MingChu Li, Kouichi Sakurai: Modeling Security Bridge Certificate Authority Architecture. IEICE Transactions 92-A(6): 1544-1547 (2009)
[j27]Ilsun You, Kouichi Sakurai, Yoshiaki Hori: A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6. IEICE Transactions 92-B(6): 2287-2290 (2009)
[j26]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party. IEICE Transactions 92-A(8): 1868-1871 (2009)
[j25]Ilsun You, Kouichi Sakurai, Yoshiaki Hori: An Enhanced Security Protocol for Fast Mobile IPv6. IEICE Transactions 92-D(10): 1979-1982 (2009)
[c144]Amril Syalim, Yoshiaki Hori, Kouichi Sakurai: Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide. ARES 2009: 726-731
[c143]Kohei Tatara, Kouichi Sakurai: A Signature Scheme Associated with Universal Re-signcryption. ARES 2009: 780-785
[c142]Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai: Security Analysis for P2P Routing Protocols. ARES 2009: 899-904
[c141]
[c140]Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai: Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. ARES 2009: 972-977
[c139]Chunhua Su, Justin Zhan, Kouichi Sakurai: Importance of Data Standardization in Privacy-Preserving K-Means Clustering. DASFAA Workshops 2009: 276-286
[c138]Jingyu Hua, MingChu Li, Kouichi Sakurai, Yizhi Ren: Efficient Intrusion Detection Based on Static Analysis and Stack Walks. IWSEC 2009: 158-173
[c137]Amril Syalim, Yoshiaki Hori, Kouichi Sakurai: Grouping Provenance Information to Improve Efficiency of Access Control. ISA 2009: 51-59
[c136]Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai: Formal Verification for Access Control in Web Information Sharing System. ISA 2009: 80-89
[e2]Dominik Slezak, Tai-Hoon Kim, Alan Chin-Chen Chang, Thanos Vasilakos, MingChu Li, Kouichi Sakurai (Eds.): Communication and Networking - International Conference, FGCN/ACN 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings. Communications in Computer and Information Science 56, Springer 2009, ISBN 978-3-642-10843-3- 2008
[j24]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Analysis of Program Obfuscation Schemes with Variable Encoding Technique. IEICE Transactions 91-A(1): 316-329 (2008)
[j23]Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai: Toward a Scalable Visualization System for Network Traffic Monitoring. IEICE Transactions 91-D(5): 1300-1310 (2008)
[j22]Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai: Reliable Key Distribution Scheme for Lossy Channels. IEICE Transactions 91-D(5): 1485-1488 (2008)
[j21]Kenji Imamoto, Jianying Zhou, Kouichi Sakurai: Achieving evenhandedness in certified email system for contract signing. Int. J. Inf. Sec. 7(6): 383-394 (2008)
[j20]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment. J. Comput. Sci. Technol. 23(1): 129-140 (2008)
[j19]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Optimization of Group Key Management Structure with a Client Join-Leave Mechanism. JIP 16: 130-141 (2008)
[c135]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119
[c134]Chunhua Su, Kouichi Sakurai: A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree. ADMA 2008: 170-181
[c133]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System. AINA Workshops 2008: 241-246
[c132]MingChu Li, Yizhi Ren, Kouichi Sakurai, Yongrui Cui, Zhi-Hui Wang: Granularity Considering in a Trust Model for P2P Networks. AINA Workshops 2008: 307-312
[c131]Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai: Key Distribution Scheme Using Matched Filter Resistant against DoS Attack. AINA Workshops 2008: 1534-1539
[c130]Kenichi Takahashi, Akihiro Sakai, Kouichi Sakurai: Invalidation of Mailing List Address to Block Spam Mails. APSCC 2008: 841-846
[c129]Yizhi Ren, MingChu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai: Trust Similarity Measure in Trust Model for P2P Networks. EUC (2) 2008: 107-112
[c128]Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai: Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection. MUE 2008: 485-489
[c127]Seiichiro Mizoguchi, Yoshiaki Hori, Kouichi Sakurai: Monitoring Unused IP Addresses on Segments Managed by DHCP. NCM (1) 2008: 510-515
[c126]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: FPGA-Targeted Hardware Implementations of K2. SECRYPT 2008: 270-277
[c125]Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Ternary Subset Difference Method and Its Quantitative Analysis. WISA 2008: 225-239
[i5]Yasufumi Hashimoto, Kouichi Sakurai: On construction of signature schemes based on birational permutations over noncommutative rings. IACR Cryptology ePrint Archive 2008: 340 (2008)- 2007
[j18]Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee: Efficient verifier-based password-authenticated key exchange in the three-party setting. Computer Standards & Interfaces 29(5): 513-520 (2007)
[j17]Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Kouichi Sakurai: On Effectiveness of Clock Control in Stream Ciphers. IEICE Transactions 90-A(9): 1780-1787 (2007)
[j16]Kouichi Sakurai, Kazuhide Fukushima: Actual Condition and Issues for Mobile Security System. JIPS 3(2): 54-63 (2007)
[c124]Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai: A Policy Language for the Extended Reference Monitor in Trusted Operating Systems. ARES 2007: 1160-1166
[c123]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391
[c122]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments. APWeb/WAIM Workshops 2007: 211-216
[c121]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. ATC 2007: 249-258
[c120]Sang-Soo Yeo, Kouichi Sakurai, Jin Kwak: A Practical Proxy Device for Protecting RFID Tag's Identifier. BLISS 2007: 55-58
[c119]Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai: Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving. IPC 2007: 299-302
[c118]Yuji Kugisaki, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai: Bot Detection Based on Traffic Analysis. IPC 2007: 303-306
[c117]Sang-Soo Yeo, Kouichi Sakurai, Sung-Eon Cho, KiSung Yang, Sung Kwon Kim: Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard. ISPA Workshops 2007: 245-254
[c116]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai: Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208
[c115]Satoshi Hada, Kouichi Sakurai: A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption. IWSEC 2007: 1-12
[c114]Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai: Enforcement of Integrated Security Policy in Trusted Operating Systems. IWSEC 2007: 214-229
[c113]Tai-Hoon Kim, Kouichi Sakurai, Sun-myung Hwang: Induction and Implementation of Security Requirements in Each System Block. MMM (2) 2007: 694-701
[c112]Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai: An Approach of Program Analysis Prevention for Information Protection. MUE 2007: 35-40
[c111]Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai: Analysis of Privacy Disclosure in DNS Query. MUE 2007: 952-957
[c110]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment. PAKDD Workshops 2007: 502-514
[c109]Kenichi Takahashi, Yoshiki Mitsuyuki, Tsunenori Mine, Kouichi Sakurai, Makoto Amamiya: Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System. PRIMA 2007: 134-145
[c108]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: K2: A Stream Cipher Algorithm using Dynamic Feedback Control. SECRYPT 2007: 204-213
[c107]Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai: On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network. UIC 2007: 382-391
[c106]Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya: An Approach of Trusted Program Generation for User-Responsible Privacy. UIC 2007: 1159-1170- 2006
[j15]Yasuyuki Sakai, Kouichi Sakurai: Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems. IEICE Transactions 89-A(1): 231-237 (2006)
[c105]Fumiaki Nagano, Kohei Tatara, Kouichi Sakurai, Toshihiro Tabata: An Intrusion Detection System using Alteration of Data. AINA (1) 2006: 243-248
[c104]Zhan Wang, Yoshiaki Hori, Kouichi Sakurai: Application and Evaluation of Bayesian Filter for Chinese Spam. Inscrypt 2006: 253-263
[c103]Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange. Communications and Multimedia Security 2006: 87-96
[c102]Kenichi Takahashi, Kouichi Sakurai: A Framework for the User-Oriented Personal Information Protection. Security and Management 2006: 12-19
[c101]Yoshifumi Ueshige, Kouichi Sakurai: A Proposal of One-Time Biometric Authentication. Security and Management 2006: 78-83
[c100]Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won: An RFID System Based MCLT System with Improved Privacy. EUC Workshops 2006: 579-590
[c99]Jong-Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee: Distributing Security-Mediated PKI Revisited. EuroPKI 2006: 31-44
[c98]Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai: A Proactive Secret Sharing for Server Assisted Threshold Signatures. HPCC 2006: 250-259
[c97]Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee: Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. International Conference on Computational Science (1) 2006: 977-980
[c96]Hyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai: Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems. ISPEC 2006: 235-247
[c95]
[c94]Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai: Actively Modifying Control Flow of Program for Efficient Anormaly Detection. KES (2) 2006: 737-744
[c93]Kenji Imamoto, Kouichi Sakurai: Off-line verification of one-time ID in distributed environment. PST 2006: 60
[c92]Kenji Imamoto, Kouichi Sakurai: Enhanced Privacy in Key-Exchange Protocols by One-time ID. SecPerU 2006: 63-68
[c91]Yufeng Wang, Wendong Wang, Kouichi Sakurai, Yoshiaki Hori: On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance. UIC 2006: 1008-1018
[c90]Erwan Le Malécot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai: Interactively combining 2D and 3D visualization for network traffic monitoring. VizSEC 2006: 123-127
[e1]Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura (Eds.): Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings. Lecture Notes in Computer Science 4266, Springer 2006, ISBN 3-540-47699-7
[i4]Jeong Ok Kwon, Ik Rae Jeong, Kouichi Sakurai, Dong Hoon Lee: Password-Authenticated Multi-Party Key Exchange with Different Passwords. IACR Cryptology ePrint Archive 2006: 476 (2006)- 2005
[j14]Kenji Imamoto, Kouichi Sakurai: Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic. Electr. Notes Theor. Comput. Sci. 135(1): 79-94 (2005)
[j13]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai: PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis. IEICE Transactions 88-A(1): 39-48 (2005)
[j12]Yasuyuki Sakai, Kouichi Sakurai: On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks. IEICE Transactions 88-A(1): 154-160 (2005)
[j11]Satoshi Koga, Kouichi Sakurai: Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost. IEICE Transactions 88-A(1): 247-254 (2005)
[j10]Hyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai: A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment. IEICE Transactions 88-A(1): 270-279 (2005)
[j9]Wook Shin, Jeong-Gun Lee, Hong Kook Kim, Kouichi Sakurai: Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling. IEICE Transactions 88-A(1): 327-330 (2005)
[j8]Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Side Channel Cryptanalysis on XTR Public Key Cryptosystem. IEICE Transactions 88-A(5): 1214-1223 (2005)
[j7]Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai: Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers. IEICE Transactions 88-A(10): 2778-2791 (2005)
[c89]
[c88]Ryuzou Nishi, Hitoshi Morioka, Kouichi Sakurai: Trends and Issues for Security of Home-Network Based on Power Line Communication. AINA 2005: 655-660
[c87]Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya: A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability. EUC Workshops 2005: 433-442
[c86]Tatsuya Toyofuku, Toshihiro Tabata, Kouichi Sakurai: Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow. EUC Workshops 2005: 916-925
[c85]Junichiro Saito, Kenji Imamoto, Kouichi Sakurai: Reassignment Scheme of an RFID Tag's Key for Owner Transfer. EUC Workshops 2005: 1303-1312
[c84]Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee: Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. FSE 2005: 243-254
[c83]Kenji Imamoto, Jianying Zhou, Kouichi Sakurai: An Evenhanded Certified Email System for Contract Signing. ICICS 2005: 1-13
[c82]Guilin Wang, Feng Bao, Kenji Imamoto, Kouichi Sakurai: Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery. ICICS 2005: 40-52
[c81]Yasuyuki Sakai, Kouichi Sakurai: Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. ICICS 2005: 169-180
[c80]Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai: Some Remarks on Security of Receipt-Free E-auction. ICITA (2) 2005: 560-563
[c79]SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, GungGil Park, Jaecheol Ryou: The Improved Risk Analysis Mechanism in the Practical Risk Analysis System. ICOIN 2005: 835-842
[c78]Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai: Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet. ICPADS (2) 2005: 235-239
[c77]Ryuzou Nishi, Kouichi Sakurai: Group key distribution scheme for reducing required rekey message size. ICPADS (2) 2005: 280-284
[c76]Yoshifumi Ueshige, Kouichi Sakurai: A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository. IWAP 2005: 155-168- 2004
[j6]Kenji Imamoto, Kouichi Sakurai: Analysis and Design for Private Message Board Systems. IEICE Transactions 87-A(1): 204-211 (2004)
[c75]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai: Pseudorandomness of SPN-Type Transformations. ACISP 2004: 212-223
[c74]Dong-Guk Han, Jongin Lim, Kouichi Sakurai: On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. ACISP 2004: 454-465
[c73]Satoshi Koga, Kouichi Sakurai: A Merging Method of Certification Authorities Without Using Cross-Certifications. AINA (2) 2004: 174-177
[c72]Kenji Imamoto, Kouichi Sakurai: A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model. AINA (1) 2004: 327-333
[c71]Yasuyuki Sakai, Kouichi Sakurai: A New Attack with Side Channel Leakage During Exponent Recoding Computations. CHES 2004: 298-311
[c70]Junichiro Saito, Jae-Cheol Ryou, Kouichi Sakurai: Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags. EUC 2004: 879-890
[c69]Satoshi Koga, Jae-Cheol Ryou, Kouichi Sakurai: Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation. EuroPKI 2004: 85-97
[c68]Toshihiro Tabata, Kouichi Sakurai: Design of Intrusion Detection System at User Level with System-Call Interposing. ICETE (2) 2004: 263-268
[c67]Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. ICICS 2004: 305-317
[c66]Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee: On the Pseudorandomness of a Modification of KASUMI Type Permutations. ICISC 2004: 313-329
[c65]Kwon Il Lee, Kouichi Sakurai, Jun Seok Lee, Jae-Cheol Ryou: A DRM Framework for Secure Distribution of Mobile Contents. ICOIN 2004: 905-914
[c64]Satoshi Koga, Kouichi Sakurai: A Distributed Online Certificate Status Protocol with a Single Public Key. Public Key Cryptography 2004: 389-401
[c63]Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai: A Probabilistic Method for Detecting Anomalous Program Behavior. WISA 2004: 87-98
[c62]Manabu Iwanaga, Toshihiro Tabata, Kouichi Sakurai: Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment. WISA 2004: 135-143
[c61]Kenji Imamoto, Kouichi Sakurai: Key-Exchange Protocol Using Pre-agreed Session-ID. WISA 2004: 375-387
[i3]Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai: A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model. IACR Cryptology ePrint Archive 2004: 69 (2004)
[i2]Dong-Guk Han, Jongin Lim, Kouichi Sakurai: On security of XTR public key cryptosystems against Side Channel Attacks. IACR Cryptology ePrint Archive 2004: 123 (2004)
[i1]Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee: Security Analysis of a 2/3-rate Double Length Compression Function in Black-Box Model. IACR Cryptology ePrint Archive 2004: 328 (2004)- 2003
[c60]Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park: Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. ACNS 2003: 265-279
[c59]Yasuyuki Sakai, Kouichi Sakurai: Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. ACNS 2003: 319-330
[c58]Michael W. David, Kouichi Sakurai: Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity. AINA 2003: 716-722
[c57]Kenji Imamoto, Kouichi Sakurai: Certified E-mail Systems Using Public Notice Board. DEXA Workshops 2003: 460-464
[c56]Kazuhide Fukushima, Kouichi Sakurai: A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation. WISA 2003: 303-316
[c55]Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park: An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme. WWW (Posters) 2003- 2002
[c54]Katsuyuki Okeya, Kouichi Sakurai: On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. ACISP 2002: 420-435
[c53]Kouichi Sakurai, Tsuyoshi Takagi: On the Security of a Modified Paillier Public-Key Primitive. ACISP 2002: 436-448
[c52]Katsuyuki Okeya, Kouichi Sakurai: Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick. CHES 2002: 564-578
[c51]Soichi Furuya, Kouichi Sakurai: Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. ICICS 2002: 327-341
[c50]Kouichi Sakurai, Tsuyoshi Takagi: A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. ICISC 2002: 359-373
[c49]Kenji Imamoto, Kouichi Sakurai: A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. INDOCRYPT 2002: 326-338
[c48]Katsuyuki Okeya, Kouichi Sakurai: A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. ISC 2002: 389-401
[c47]Yasuyuki Sakai, Kouichi Sakurai: Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. ISC 2002: 484-500
[c46]Kouichi Sakurai, Tsuyoshi Takagi: New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Public Key Cryptography 2002: 1-16
[c45]Soichi Furuya, Kouichi Sakurai: Single-Path Authenticated-Encryption Scheme Based on Universal Hashing. Selected Areas in Cryptography 2002: 94-109- 2001
[c44]Katsuyuki Okeya, Kouichi Sakurai: Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve. CHES 2001: 126-141
[c43]Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi: An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. ICISC 2001: 51-71
[c42]Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai: Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. ICISC 2001: 81-102
[c41]Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai: A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. ICISC 2001: 428-439
[c40]Yasuyuki Sakai, Kouichi Sakurai: On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. Selected Areas in Cryptography 2001: 268-283
[c39]Daisuke Hirakiuchi, Kouichi Sakurai: English vs. Sealed Bid in Anonymous Electronic Auction Protocols. WETICE 2001: 171-176- 2000
[c38]Yasuyuki Sakai, Kouichi Sakurai: Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance. ACISP 2000: 59-73
[c37]Kouichi Sakurai, Shingo Miyazaki: An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme. ACISP 2000: 385-399
[c36]Katsuyuki Okeya, Kouichi Sakurai: Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. INDOCRYPT 2000: 178-190
[c35]Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai: Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications. Public Key Cryptography 2000: 238-257
[c34]Toro Inoue, Kouichi Sakurai: Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes. Public Key Cryptography 2000: 391-404
[c33]Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: On zero-knowledge proofs (extended abstract): ``from membership to decision''. STOC 2000: 255-264
1990 – 1999
- 1999
[j5]Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya: Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages. J. Cryptology 12(3): 197-223 (1999)
[c32]Shingo Miyazaki, Kouichi Sakurai, Moti Yung: On Threshold RSA-Signing with no Dealer. ICISC 1999: 197-207
[c31]Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto: A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. ICISC 1999: 221-235
[c30]Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai: Toward Fair International Key Escrow. Public Key Cryptography 1999: 171-187- 1998
[j4]Eisuke Dannoura, Kouichi Sakurai: An Improvement on El-Yaniv-Fiat-Karp-Turpin's Money-Making Bi-Directional Trading Strategy. Inf. Process. Lett. 66(1): 27-33 (1998)
[j3]Kouichi Sakurai, Hiroki Shizuya: A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems. J. Cryptology 11(1): 29-43 (1998)
[c29]Yasuyuki Sakai, Kouichi Sakurai: Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n. ASIACRYPT 1998: 80-94
[c28]Shingo Miyazaki, Kouichi Sakurai: A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem. Financial Cryptography 1998: 296-308
[c27]Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it. ISAAC 1998: 59-68
[c26]Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka: Secure Hyperelliptic Cryptosystems and Their Performances. Public Key Cryptography 1998: 164-181
[c25]Michael W. David, Kouichi Sakurai: Security Issues for Contactless Smart Cards. Public Key Cryptography 1998: 247-252
[c24]Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols. STACS 1998: 511-521- 1997
[j2]Kouichi Sakurai: Practical Proofs of Knowledge without Relying on Theoretical Proofs of Membership on Languages. Theor. Comput. Sci. 181(2): 317-335 (1997)
[c23]Masahiro Mambo, Eiji Okamoto, Kouichi Sakurai: Protection of Data and Delegated Keys in Digital Distribution. ACISP 1997: 271-282
[c22]Kouichi Sakurai, Souichi Furuya: Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method. FSE 1997: 114-133
[c21]Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung: Zero-knowledge proofs of decision power: new protocols and optimal round-complexity. ICICS 1997: 17-27
[c20]Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka: On weak RSA-keys produced from Pretty Good Privacy. ICICS 1997: 314-324
[c19]Eisuke Dannoura, Kouichi Sakurai: On-Line Versus Off-Line in Money-Making Strategies with BROKERAGE. ISAAC 1997: 173-182
[c18]Kouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue: A Key Escrow System with Protecting User's Privacy by Blind Decoding. ISW 1997: 147-157- 1996
[j1]Akio Yanbe, Kouichi Sakurai: A Short Certificate of the Number of Universal Optimal Strategies for Stopping Simple Stochastic Games. Inf. Process. Lett. 57(1): 17-24 (1996)
[c17]Kouichi Sakurai: A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes. ASIACRYPT 1996: 159-172
[c16]Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto: How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem. ASIACRYPT 1996: 322-333
[c15]Akio Yanbe, Kouichi Sakurai: On the Complexity of Computational Problems Associated with Simple Stochastic Games (Extended Abstract). COCOON 1996: 310-322
[c14]Mike Burmester, Yvo Desmedt, Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya, Moti Yung: A Progress Report on Subliminal-Free Channels. Information Hiding 1996: 157-168
[c13]Kouichi Sakurai, Yoshinori Yamane: Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection. Information Hiding 1996: 257-264
[c12]Kouichi Sakurai, Yuliang Zheng: Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). ISAAC 1996: 376-385- 1995
[c11]Kouichi Sakurai: On Separating Proofs of Knowledge from Proofs of Membership of Languages and Its Application to Secure Identification Schemes (Extended Abstract). COCOON 1995: 496-509
[c10]Kouichi Sakurai, Hiroki Shizuya: Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems. EUROCRYPT 1995: 341-355- 1992
[c9]Kouichi Sakurai, Toshiya Itoh: Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes. AUSCRYPT 1992: 231-243
[c8]Kouichi Sakurai, Toshiya Itoh: On Bit Correlations Among Preimages of "Many to One" One-Way Functions. AUSCRYPT 1992: 435-446
[c7]Kouichi Sakurai, Toshiya Itoh: On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract). CRYPTO 1992: 246-259
[c6]Tatsuaki Okamoto, Kouichi Sakurai, Hiroki Shizuya: How Intractable Is the Discrete Logarithm for a General Finite Group? EUROCRYPT 1992: 420-428- 1991
[c5]Takeshi Saito, Kaoru Kurosawa, Kouichi Sakurai: 4 Move Perfect ZKIP of Knowledge with No Assumption. ASIACRYPT 1991: 321-330
[c4]Toshiya Itoh, Kouichi Sakurai: On the Complexity of Constant Round ZKIP of Possession of Knowledge. ASIACRYPT 1991: 331-345
[c3]Toshiya Itoh, Kouichi Sakurai, Hiroki Shizuya: Any Language in IP Has a Divertable ZKIP. ASIACRYPT 1991: 382-396
[c2]Tatsuaki Okamoto, Kouichi Sakurai: Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems. CRYPTO 1991: 267-278
[c1]Hiroki Shizuya, Toshiya Itoh, Kouichi Sakurai: On the Complexity of Hyperelliptic Discrete Logarithm Problem. EUROCRYPT 1991: 337-351
Coauthor Index
[j49] [j43] [c201] [c198] [c196] [c184] [j41] [j40] [c177] [c176] [c173] [c172] [c171] [c167] [c164] [j36] [j35] [j33] [c160] [c151] [c149] [c148] [j27] [j25] [c144] [c142] [c141] [c140] [c137] [c136] [j23] [j22] [j20] [c133] [c131] [c128] [c127] [c122] [c121] [c119] [c118] [c111] [c110] [c107] [c104] [c91] [c90] [c78]
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:07 CEST by the dblp team



