Kouichi SAKURAI


FOREWORD
Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 1-2
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(208.5KB)

Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation
Yuto NAKANO Shinsaku KIYOMOTO Yutaka MIYAKE Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/10/01
Vol. E97-D  No. 10  pp. 2576-2585
Type of Manuscript:  INVITED PAPER (Special Section on Frontiers of Internet of Things)
Category: 
Keyword: 
access pattern protectionoblivious RAMprivate information retrieval
 Summary | Full Text:PDF(441.5KB)

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search
Fangming ZHAO Takashi NISHIDE Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/07/01
Vol. E97-D  No. 7  pp. 1790-1803
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
cryptographic cloud storagemultiple usersaccess controlencrypted keyword search
 Summary | Full Text:PDF(453.5KB)

Security of Multivariate Signature Scheme Using Non-commutative Rings
Takanori YASUDA Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 245-252
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundations
Keyword: 
Multivariate Public Key Cryptosystemdigital signaturerainbownon-commutative ringpost-quantum cryptography
 Summary | Full Text:PDF(595.1KB)

Fast Implementation of KCipher-2 for Software and Hardware
Yuto NAKANO Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Tsukasa ISHIGURO Yutaka MIYAKE Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/01/01
Vol. E97-D  No. 1  pp. 43-52
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
stream cipherKCipher-2software implementationhardware implementation
 Summary | Full Text:PDF(641.2KB)

General Fault Attacks on Multivariate Public Key Cryptosystems
Yasufumi HASHIMOTO Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 196-205
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
post-quantum cryptographymultivariate public-key cryptosystemsfault attacks
 Summary | Full Text:PDF(359.9KB)

Securing Provenance of Distributed Processes in an Untrusted Environment
Amril SYALIM Takashi NISHIDE Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/07/01
Vol. E95-D  No. 7  pp. 1894-1907
Type of Manuscript:  PAPER
Category: Data Engineering, Web Information Systems
Keyword: 
provenance securityaccess control modeldatabase encryption
 Summary | Full Text:PDF(642.8KB)

Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
Jingyu HUA Mingchu LI Yizhi REN Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 255-264
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Network Security
Keyword: 
intrusion detectionstate transition tablestatic analysisstack walks
 Summary | Full Text:PDF(2MB)

Improved Subset Difference Method with Ternary Tree
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 2034-2044
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
broadcast encryptionsubset difference methodternary tree
 Summary | Full Text:PDF(806.8KB)

Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol
Heru SUKOCO Yoshiaki HORI Hendrawan  Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/11/01
Vol. E93-D  No. 11  pp. 2953-2961
Type of Manuscript:  Special Section PAPER (Special Section on Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
TCP friendlyReceiver-driven Layered Multicastnetwork simulatorParetoquality of servicejitterthroughputpacket loss ratiofairnessconvergence time
 Summary | Full Text:PDF(2MB)

Analysis of Existing Privacy-Preserving Protocols in Domain Name System
Fangming ZHAO Yoshiaki HORI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1031-1043
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
domain name system (DNS)privacyprivate information retrievalrandom noise
 Summary | Full Text:PDF(376.1KB)

ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
Ilsun YOU Jong-Hyouk LEE Kouichi SAKURAI Yoshiaki HORI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1096-1105
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
F-HMIPv6 securityCGABAN-logic
 Summary | Full Text:PDF(1.6MB)

FOREWORD
Guojun WANG Laurence T.YANG Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/03/01
Vol. E93-D  No. 3  pp. 409-410
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(100.8KB)

An Enhanced Security Protocol for Fast Mobile IPv6
Ilsun YOU Kouichi SAKURAI Yoshiaki HORI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/10/01
Vol. E92-D  No. 10  pp. 1979-1982
Type of Manuscript:  Special Section LETTER (Special Section on New Technologies and their Applications of the Internet)
Category: DRM and Security
Keyword: 
FMIPv6 securityMIPv6secure neighbor discoverycryptographically generated addressBAN-logic
 Summary | Full Text:PDF(493.4KB)

Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
Chunhua SU Feng BAO Jianying ZHOU Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8  pp. 1868-1871
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
data clusteringprivacy-preservingrandom data perturbation
 Summary | Full Text:PDF(144KB)

Modeling Security Bridge Certificate Authority Architecture
Yizhi REN Mingchu LI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/06/01
Vol. E92-A  No. 6  pp. 1544-1547
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
PKIbridge certificate authoritysecurity
 Summary | Full Text:PDF(408.2KB)

A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
Ilsun YOU Kouichi SAKURAI Yoshiaki HORI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/06/01
Vol. E92-B  No. 6  pp. 2287-2290
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
Fast Mobile IPv6 securitySEND protocolCGABAN-logic
 Summary | Full Text:PDF(644.3KB)

FOREWORD
Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 765-765
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(52.7KB)

An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
Yongrui CUI Mingchu LI Yizhi REN Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/05/01
Vol. E92-A  No. 5  pp. 1339-1346
Type of Manuscript:  PAPER
Category: Graphs and Networks
Keyword: 
reputationvirtual organization formationgridcollusion attacks
 Summary | Full Text:PDF(317.7KB)

A New Secret Sharing Scheme Based on the Multi-Dealer
Cheng GUO Mingchu LI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/05/01
Vol. E92-A  No. 5  pp. 1373-1378
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
secret sharingmulti-dealerfactoring problemdiscrete logarithmthreshold scheme
 Summary | Full Text:PDF(192.1KB)

Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
Chunhua SU Feng BAO Jianying ZHOU Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/04/01
Vol. E92-A  No. 4  pp. 1246-1250
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
privacy-preservingk-means clusteringsecurity analysis
 Summary | Full Text:PDF(81.3KB)

Reliable Key Distribution Scheme for Lossy Channels
Ryuzou NISHI Yoshiaki HORI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1485-1488
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Key Management
Keyword: 
key managementkey distributionwireless communication systemspower line communication systems
 Summary | Full Text:PDF(184.6KB)

Toward a Scalable Visualization System for Network Traffic Monitoring
Erwan LE MALECOT Masayoshi KOHARA Yoshiaki HORI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1300-1310
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Network Security
Keyword: 
visualizationinteractivitynetworkmonitoringsecurity
 Summary | Full Text:PDF(1.1MB)

Analysis of Program Obfuscation Schemes with Variable Encoding Technique
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 316-329
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
program obfuscationvariable encoding techniqueanalysis
 Summary | Full Text:PDF(377.1KB)

On Effectiveness of Clock Control in Stream Ciphers
Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1780-1787
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
stream cipherclock controlirregular clocking
 Summary | Full Text:PDF(262.7KB)

Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems
Yasuyuki SAKAI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 231-237
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Side Channel Analysis
Keyword: 
side channel analysiselliptic curve cryptosystemmodular reductiongeneralized Mersenne primeunified code
 Summary | Full Text:PDF(102.5KB)

Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers
Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/10/01
Vol. E88-A  No. 10  pp. 2778-2791
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
stream cipherGuess-and-Determine attackAA5clock control
 Summary | Full Text:PDF(714.2KB)

Side Channel Cryptanalysis on XTR Public Key Cryptosystem
Dong-Guk HAN Tetsuya IZU Jongin LIM Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5  pp. 1214-1223
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
XTR public key cryptosystemside channel attacksSPAdata-bit DPAaddress-bit DPAdoubling attackrefined power analysiszero-value attack
 Summary | Full Text:PDF(221.9KB)

Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling
Wook SHIN Jeong-Gun LEE Hong Kook KIM Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 327-330
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Coloured Petri Netaccess controlrolebehavior
 Summary | Full Text:PDF(307.7KB)

Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost
Satoshi KOGA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 247-254
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
Public Key InfrastructureOnline Certificate Status Protocoldistributed OCSPkey-insulated signature scheme
 Summary | Full Text:PDF(221.4KB)

A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment
Hyung-Chan KIM R.S. RAMAKRISHNA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 270-279
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
role based access controlmulti-domain securitytrusted operating systemsdistributed systems security
 Summary | Full Text:PDF(410.1KB)

PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis
Wonil LEE Mridul NANDI Palash SARKAR Donghoon CHANG Sangjin LEE Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 39-48
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
hash functionblock cipherblack-box modelprovable security
 Summary | Full Text:PDF(266KB)

On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks
Yasuyuki SAKAI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 154-160
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
side channel attackexponent recodingRSA cryptosystemselliptic curve cryptosystems
 Summary | Full Text:PDF(126.9KB)

FOREWORD
Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 977-977
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(39.2KB)

Analysis and Design for Private Message Board Systems
Kenji IMAMOTO Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 204-211
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Applications
Keyword: 
message boardcertified e-mailprivacyanonymitynotice boardSend-and-Forget
 Summary | Full Text:PDF(232.7KB)

An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication
Yasuyuki SAKAI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1135-1146
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemsscalar multiplication
 Summary | Full Text:PDF(276.6KB)

A Simple Power Attack on a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems
Katsuyuki OKEYA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1171-1180
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemsside channel attacksrandomized addition-subtraction chains countermeasureSPA attacktiming attack
 Summary | Full Text:PDF(319.8KB)

Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystems
Katsuyuki OKEYA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 98-112
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Ciphers
Keyword: 
elliptic curve cryptographymulti-scalar multiplicationprecomputationMontgomery tricksimultaneous
 Summary | Full Text:PDF(305.4KB)

Speeding Up Elliptic Scalar Multiplication Using Multidoubling
Yasuyuki SAKAI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/05/01
Vol. E85-A  No. 5  pp. 1075-1083
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemscalar multiplicationMontgomery formmultidoublingfast implementation
 Summary | Full Text:PDF(259.9KB)

A Scalar Multiplication Algorithm with Recovery of the y-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems
Katsuyuki OKEYA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 84-93
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
elliptic curve cryptosystemMontgomery formfast scalar multiplicationy-coordinate recovery
 Summary | Full Text:PDF(267.9KB)

On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer
Shingo MIYAZAKI Kouichi SAKURAI Moti YUNG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/05/01
Vol. E84-A  No. 5  pp. 1177-1183
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
distributed cryptosystemthreshold RSAno dealerthreshold signaturethreshold decryption
 Summary | Full Text:PDF(259.4KB)

Efficient Scalar Multiplications on Elliptic Curves with Direct Computations of Several Doublings
Yasuyuki SAKAI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 120-129
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
elliptic curve cryptosystemscalar multiplicationwindow methodcoordinate systemimplementation
 Summary | Full Text:PDF(248.6KB)

A Theory of Demonstrating Program Result-Correctness with Cryptographic Applications
Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/01/01
Vol. E84-D  No. 1  pp. 4-14
Type of Manuscript:  INVITED SURVEY PAPER
Category: 
Keyword: 
zero-knowledge proofprogram checkinggraph isomorphismquadratic residuosity
 Summary | Full Text:PDF(295KB)

On the Practical Performance of Hyperelliptic Curve Cryptosystems in Software Implementation
Yasuyuki SAKAI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/04/25
Vol. E83-A  No. 4  pp. 692-703
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hyperelliptic curve cryptosystemefficient implementationjacobianlagrange reduction
 Summary | Full Text:PDF(420.8KB)

A Progress Report on Lattice Based Public-Key Cryptosystems -- Theoretical Security versus Practical Cryptanalysis --
Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/03/25
Vol. E83-D  No. 3  pp. 570-579
Type of Manuscript:  INVITED SURVEY PAPER
Category: Parallel and Distributed Algorithms
Keyword: 
public-key cryptosystemsLattice reduction problemsLLL-algorithmCryptanalysis
 Summary | Full Text:PDF(277.6KB)

A Practical Off-Line Digital Money System with Partially Blind Signatures Based on the Discrete Logarithm Problem
Shingo MIYAZAKI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 106-108
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
partially blind signaturediscrete logarithmuntraceable electronic moneykey certificate
 Summary | Full Text:PDF(115KB)

On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis
Kouichi SAKURAI Yuliang ZHENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 19-24
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block ciphercryptographyData Encryption Standarddifferential cryptanalysislinear cryptanalysispseudorandom permutationsecuritysecret-key block cipher
 Summary | Full Text:PDF(580.7KB)

On the Complexity of the Discrete Logarithm for a General Finite Group
Tatsuaki OKAMOTO Kouichi SAKURAI Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 61-65
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
discrete logarithmcomputational complexitycryptography
 Summary | Full Text:PDF(504.7KB)

Subliminal Channels for Transferring Signatures: Yet Another Cryptographic Primitive
Kouichi SAKURAI Toshiya ITOH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1  pp. 31-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
subliminal channelsdigital signaturesFiat-Shamir scheme
 Summary | Full Text:PDF(766.5KB)

Constant Round Perfect ZKIP of Computational Ability
Toshiya ITOH Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/07/25
Vol. E76-A  No. 7  pp. 1225-1233
Type of Manuscript:  PAPER
Category: Information Security and Cryptography
Keyword: 
zero-knowledge interactive proof systemscomputational abilitypossession of knowledge
 Summary | Full Text:PDF(776.6KB)

A Characterization of Languages in Constant Round Perfect Zero-Knowledge Interactive Proofs
Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/04/25
Vol. E76-A  No. 4  pp. 546-554
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
interactive proof systemperfect zero-knowledgehonest verifier zero-knowledgeBlum integer
 Summary | Full Text:PDF(800.4KB)

On the Complexity of Constant Round ZKIP of Possession of Knowledge
Toshiya ITOH Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 31-39
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
zero-knowledge interactive proof systempossession of knowledgeprobabilistic polynomial time algorithm
 Summary | Full Text:PDF(862.1KB)

Practical Consequences of the Discrepancy between Zero-Knowledge Protocols and Their Parallel Execution
Kouichi SAKURAI Toshiya ITOH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 14-22
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
zero-knowledge interactive proof systemthe Fiat-Shamir schemeno-transferable information
 Summary | Full Text:PDF(769.9KB)

On the Complexity of Hyperelliptic Discrete Logarithm Problem
Hiroki SHIZUYA Toshiya ITOH Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/08/25
Vol. E74-A  No. 8  pp. 2129-2135
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: 
Keyword: 
 Summary | Full Text:PDF(533.8KB)

Language Membership versus Possession of Knowledge in Constant Round ZKIP
Kouichi SAKURAI Toshiya ITOH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/08/25
Vol. E74-A  No. 8  pp. 2118-2123
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: 
Keyword: 
 Summary | Full Text:PDF(459.9KB)