|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Tag-KEM from Set Partial Domain One-Way Permutations Masayuki ABE Yang CUI Hideki IMAI Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A
No. 1
pp. 42-52
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Public Key Cryptography Keyword: Tag-KEM, hybrid encryption, OAEP, SAEP, | | Summary | Full Text:PDF | |
|
Small Secret Key Attack on a Takagi's Variant of RSA Kouichi ITOH Noboru KUNIHIRO Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A
No. 1
pp. 33-41
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Public Key Cryptography Keyword: lattice, LLL, trivariate polynomial, RSA, | | Summary | Full Text:PDF | |
|
|
|
Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA Noboru KUNIHIRO Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A
No. 9
pp. 2356-2364
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: RSA, factoring, LLL algorithm, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
k-Resilient Identity-Based Encryption in the Standard Model Swee-Huay HENG Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A
No. 1
pp. 39-46
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Public Key Cryptography Keyword: identity-based encryption, standard model, | | Summary | Full Text:PDF | |
|
|
|
|
|
A Scheme for Partial Disclosure of Transaction Log Yasuhiro OHTAKI Masaru KAMADA Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A
No. 1
pp. 222-229
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Application Keyword: computer forensics, transaction log, privacy, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
On Parallel Hash Functions Based on Block-Ciphers Toshihiko MATSUO Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A
No. 1
pp. 67-74
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Symmetric Cipher Keyword: hash function, block cipher, | | Summary | Full Text:PDF | |
|
|
|
How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer Kaoru KUROSAWA Quang Viet DUONG | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A
No. 1
pp. 141-146
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Protocol Keyword: oblivious transfer, Diffie-Hellman assumption, | | Summary | Full Text:PDF | |
|
TMAC: Two-Key CBC MAC Kaoru KUROSAWA Tetsu IWATA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A
No. 1
pp. 46-53
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Symmetric Cipher Keyword: cryptography, CBC MAC, block cipher, provable security, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
|
|
On the Randomness of Chambers and Gollmann Keystream Generator Fumio SATO Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A
No. 1
pp. 303-310
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: cryptography, stream cipher, self-decimation system, | | Summary | Full Text:PDF | |
|
Highly Nonlinear Vector Boolean Functions Takashi SATOH Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/05/25
Vol. E82-A
No. 5
pp. 807-814
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: Boolean function, bent function, balancedness, nonlinearity, | | Summary | Full Text:PDF | |
|
|
|
Practical and Proven Zero-Knowledge Constant Round Variants of GQ and Schnorr Yvo G. DESMEDT Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A
No. 1
pp. 69-76
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: zero-knowledge, constant round, low complexity, GQ, Schnorr, | | Summary | Full Text:PDF | |
|
Generalization of Higher Order SAC to Vector Output Boolean Functions Kaoru KUROSAWA Takashi SATOH | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A
No. 1
pp. 41-47
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: Strict Avalanche Criterion (SAC), vector output function, | | Summary | Full Text:PDF | |
|
|
|
Attack on Yagisawa Cryptosystem Kaoru KUROSAWA Takashi SATOH | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A
No. 1
pp. 107-108
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: Yagisawa cryptosystem, Kannan's algorithm, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
|
|
|
|
4-Move Perfect ZKIP for Some Promise Problems Kaoru KUROSAWA Wakaha OGATA Shigeo TSUJII | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A
No. 1
pp. 34-41
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Keyword: perfect ZKIP, promise problem, promised BPP, | | Summary | Full Text:PDF | |
|
|
|
|
|
|
|
|
|
Collision Free-Hash Function Based on the r-th Residue Cryptosystem Kaoru KUROSAWA Hirofumi KASAI Shigeo TSUJII | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/08/25
Vol. E74-A
No. 8
pp. 2114-2117
Type of Manuscript:
Special Section PAPER (Special Issue on Cryptography and Information Security) Category: Keyword:
| | Summary | Full Text:PDF | |
|
Zero Knowledge Interactive Proof System for Modulo Operations Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/08/25
Vol. E74-A
No. 8
pp. 2124-2128
Type of Manuscript:
Special Section PAPER (Special Issue on Cryptography and Information Security) Category: Keyword:
| | Summary | Full Text:PDF | |
|
A General Method to Construct Public Key Residue Cryptosystems Kaoru KUROSAWA Shigeo TSUJI | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E
No. 7
pp. 1068-1072
Type of Manuscript:
Special Section PAPER (Special Issue on Cryptography and Information Security) Category: Public-Key Systems Keyword:
| | Summary | Full Text:PDF | |
|
An Attacking Method for Multiplicative Knapsack Type Public Key Cryptosystem Based on Finite Field Kaoru KUROSAWA Toshiya ITOH Hiroo SHIGETA Shigeo TSUJII | Publication: IEICE TRANSACTIONS (1976-1990)
Publication Date: 1987/01/25
Vol. E70-E
No. 1
pp. 37-41
Type of Manuscript:
PAPER Category: Information and Communication Theory Keyword:
| | Summary | Full Text:PDF | |
|