Kaoru KUROSAWA


Oblivious Polynomial Evaluation in the Exponent, Revisited
Naoto ITAKURA Kaoru KUROSAWA Kazuki YONEYAMA 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 26-33
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
oblivious polynomial evaluationDDH assumption
 Summary | Full Text:PDF(404KB)

Generic Fully Simulatable Adaptive Oblivious Transfer
Kaoru KUROSAWA Ryo NOJIMA Le Trieu PHONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 232-245
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundation
Keyword: 
adaptive OTfully-simulatableverifiable shufflespermutation networksloose homomorphism
 Summary | Full Text:PDF(690.1KB)

Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
Kaoru KUROSAWA Ryo NOJIMA Le Trieu PHONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 215-224
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
selectively convertible undeniable signaturesverifiable random functionstandard model
 Summary | Full Text:PDF(655.2KB)

Undeniable and Unpretendable Signatures
Le Trieu PHONG Kaoru KUROSAWA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 138-150
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Authentication
Keyword: 
anonymityundeniable signaturesselective/all conversionunpretendable signaturesanonymous auction
 Summary | Full Text:PDF(406.7KB)

How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
Yusuke SAKAI Goichiro HANAOKA Kaoru KUROSAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1293-1305
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key encryptionchosen-ciphertext securitykey encapsulation mechanism
 Summary | Full Text:PDF(435.6KB)

Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
Goichiro HANAOKA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 1994-2006
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryptionchosen-ciphertext securityDiffie-Hellman assumption
 Summary | Full Text:PDF(409.5KB)

New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
Le Trieu PHONG Kaoru KUROSAWA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 63-75
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
RSAundeniable signatureselective/all conversionstandard model
 Summary | Full Text:PDF(284.6KB)

Small Secret Key Attack on a Takagi's Variant of RSA
Kouichi ITOH Noboru KUNIHIRO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 33-41
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
latticeLLLtrivariate polynomialRSA
 Summary | Full Text:PDF(294KB)

Tag-KEM from Set Partial Domain One-Way Permutations
Masayuki ABE Yang CUI Hideki IMAI Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 42-52
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
Tag-KEMhybrid encryptionOAEPSAEP
 Summary | Full Text:PDF(282.9KB)

Almost Secure (1-Round, n-Channel) Message Transmission Scheme
Kaoru KUROSAWA Kazuhiro SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 105-112
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
private and reliable transmissioninformation theoretic securitycommunication efficiency
 Summary | Full Text:PDF(178.2KB)

Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
Noboru KUNIHIRO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9  pp. 2356-2364
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
RSAfactoringLLL algorithm
 Summary | Full Text:PDF(215.6KB)

Security of the Five-Round KASUMI Type Permutation
Tetsu IWATA Tohru YAGI Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 30-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
blockcipherKASUMIadaptive chosen plaintext and chosen ciphertext attacksprovable security
 Summary | Full Text:PDF(262.5KB)

Birthday Paradox for Multi-Collisions
Kazuhiro SUZUKI Dongvu TONIEN Kaoru KUROSAWA Koji TOYOTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 39-45
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
hash functionbirthday paradoxmulti-collisioncollision resistant
 Summary | Full Text:PDF(246.8KB)

How to Construct Super-Pseudorandom Permutations with Short Keys
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 2-13
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
Luby-Rackoff theorysuper-pseudorandomnessFeistel permutationMISTY-type permutation
 Summary | Full Text:PDF(265.6KB)

k-Resilient Identity-Based Encryption in the Standard Model
Swee-Huay HENG Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 39-46
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
identity-based encryptionstandard model
 Summary | Full Text:PDF(164.2KB)

A Network Game Based on Fair Random Numbers
Masaru KAMADA Kaoru KUROSAWA Yasuhiro OHTAKI Shusuke OKAMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/05/01
Vol. E88-D  No. 5  pp. 859-864
Type of Manuscript:  Special Section PAPER (Special Section on Cyberworlds)
Category: 
Keyword: 
real-time network gamebit commitmentfair random noise
 Summary | Full Text:PDF(316.5KB)

On the Security of a MAC by Mitchell
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 25-32
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
message authentication codeOMACsecurity proofssecurity gappseudorandom permutation
 Summary | Full Text:PDF(679.9KB)

A Scheme for Partial Disclosure of Transaction Log
Yasuhiro OHTAKI Masaru KAMADA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 222-229
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
computer forensicstransaction logprivacy
 Summary | Full Text:PDF(345.9KB)

How to Improve Interpolation Attack
Kaoru KUROSAWA Tetsu IWATA Quang Viet DUONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 9-15
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
block cipherinterpolation attackroot finding algorithmresultant
 Summary | Full Text:PDF(178.6KB)

On the Pseudorandomness of KASUMI Type Permutations
Tetsu IWATA Tohru YAGI Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1098-1109
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyblock cipherKASUMIpseudorandomnessprovable security
 Summary | Full Text:PDF(296.6KB)

On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1110-1118
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyf 8f 9modes of operationprovable securityblock cipherpseudorandom permutation
 Summary | Full Text:PDF(211.8KB)

How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer
Kaoru KUROSAWA Quang Viet DUONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 141-146
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
oblivious transferDiffie-Hellman assumption
 Summary | Full Text:PDF(223.3KB)

Square Hash with a Small Key Size
Swee-Huay HENG Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 54-59
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
message authentication codesuniversal hashsquare hash
 Summary | Full Text:PDF(203.6KB)

On Parallel Hash Functions Based on Block-Ciphers
Toshihiko MATSUO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 67-74
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
hash functionblock cipher
 Summary | Full Text:PDF(303KB)

TMAC: Two-Key CBC MAC
Kaoru KUROSAWA Tetsu IWATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 46-53
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
cryptographyCBC MACblock cipherprovable security
 Summary | Full Text:PDF(277.9KB)

On the Universal Hash Functions in Luby-Rackoff Cipher
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 60-66
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
cryptographyblock cipherFeistel permutationsuper-pseudorandomness
 Summary | Full Text:PDF(254.2KB)

An Electronic Voting Protocol Preserving Voter's Privacy
Hiroshi YAMAGUCHI Atsushi KITAZAWA Hiroshi DOI Kaoru KUROSAWA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/09/01
Vol. E86-D  No. 9  pp. 1868-1878
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
electronic votingprivacyprotocolcryptographic system
 Summary | Full Text:PDF(394.6KB)

Inclusion Relations of Boolean Functions Satisfying PC(l) of Order k
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 47-53
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
cryptographyBoolean functionpropagation characteristicinclusion relations
 Summary | Full Text:PDF(411.7KB)

Round Security and Super-Pseudorandomness of MISTY Type Structure
Tetsu IWATA Tomonobu YOSHINO Tomohiro YUASA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 2-10
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyblock cipherround securitysuper-pseudorandomnessMISTY type structure
 Summary | Full Text:PDF(304.5KB)

On the Randomness of Chambers and Gollmann Keystream Generator
Fumio SATO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 303-310
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographystream cipherself-decimation system
 Summary | Full Text:PDF(231.6KB)

Highly Nonlinear Vector Boolean Functions
Takashi SATOH Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/05/25
Vol. E82-A  No. 5  pp. 807-814
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
Boolean functionbent functionbalancednessnonlinearity
 Summary | Full Text:PDF(358.9KB)

Towards Secure and Fast Hash Functions
Takashi SATOH Mio HAGA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 55-62
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptanalysishash functionblock ciphermeet-in-the-middle attackbirthday attack
 Summary | Full Text:PDF(165.2KB)

Practical and Proven Zero-Knowledge Constant Round Variants of GQ and Schnorr
Yvo G. DESMEDT Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 69-76
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
zero-knowledgeconstant roundlow complexityGQSchnorr
 Summary | Full Text:PDF(165KB)

Generalization of Higher Order SAC to Vector Output Boolean Functions
Kaoru KUROSAWA Takashi SATOH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1  pp. 41-47
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Strict Avalanche Criterion (SAC)vector output function
 Summary | Full Text:PDF(482.9KB)

Analysis on Secret Sharing Schemes with Non-Graphical Access Structures
Koji OKADA Wakaha OGATA Keiichi SAKANO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 85-89
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
secret sharingshare sizenon-graphical
 Summary | Full Text:PDF(355.7KB)

Attack on Yagisawa Cryptosystem
Kaoru KUROSAWA Takashi SATOH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 107-108
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Yagisawa cryptosystemKannan's algorithm
 Summary | Full Text:PDF(105.2KB)

Information Theoretic Approach to Privacy for Multi-Party Protocols
Takashi SATOH Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 79-84
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
multi-terminal information theoryprivacymultiparty protocol
 Summary | Full Text:PDF(427KB)

Reshufflable and Laziness Tolerant Mental Card Game Protocol
Kaoru KUROSAWA Yutaka KATAYAMA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 72-78
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
mental pokerzero knowledgemultiparty protocolprobabilistic encryptionlaziness tolerant
 Summary | Full Text:PDF(480.6KB)

Combinatorial Bounds and Design of Broadcast Authentication
Hiroshi FUJII Wattanawong KACHEN Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/04/25
Vol. E79-A  No. 4  pp. 502-506
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptologyauthenticationcombinatorial design
 Summary | Full Text:PDF(403.7KB)

New EIGamal Type Threshold Digital Signature Scheme
Choonsik PARK Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 86-93
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
threshold digital signatureEIGamaldigital signature standardchosen message attack
 Summary | Full Text:PDF(601.4KB)

Authentication Codes Based on Association Schemes
Youjin SONG Kaoru KUROSAWA Shigeo TSUJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 126-130
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
authentication codeassociation schememessage grouping technique
 Summary | Full Text:PDF(407.5KB)

4-Move Perfect ZKIP for Some Promise Problems
Kaoru KUROSAWA Wakaha OGATA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1  pp. 34-41
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
perfect ZKIPpromise problempromised BPP
 Summary | Full Text:PDF(616.6KB)

A Key Distribution Protocol for Mobile Communication Systems
Choonsik PARK Kaoru KUROSAWA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1  pp. 77-81
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
mobile communicationkey distributionauthenticationlow exponent RSA
 Summary | Full Text:PDF(388.4KB)

On Claw Free Families
Wakaha OGATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1  pp. 72-80
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
claw freeone-way functionhomomorphic propertydigital signaturehash function
 Summary | Full Text:PDF(556.5KB)

5-Move Statistical Zero Knowledge
Kaoru KUROSAWA Masahiro MAMBO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 40-45
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
statistical ZKIPperfect ZKIPstandard ZKIPinvulnerable generatorclass K
 Summary | Full Text:PDF(529.1KB)

Communication Complexity of Perfect ZKIP for a Promise Problem
Kaoru KUROSAWA Takashi SATOH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 46-49
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
communication complexityperfect ZKIP promise problemquadratic residuosity
 Summary | Full Text:PDF(286.1KB)

Collision Free-Hash Function Based on the r-th Residue Cryptosystem
Kaoru KUROSAWA Hirofumi KASAI Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/08/25
Vol. E74-A  No. 8  pp. 2114-2117
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: 
Keyword: 
 Summary | Full Text:PDF(206KB)

Zero Knowledge Interactive Proof System for Modulo Operations
Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/08/25
Vol. E74-A  No. 8  pp. 2124-2128
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: 
Keyword: 
 Summary | Full Text:PDF(281.5KB)

A General Method to Construct Public Key Residue Cryptosystems
Kaoru KUROSAWA Shigeo TSUJI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1068-1072
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Public-Key Systems
Keyword: 
 Summary | Full Text:PDF(323.5KB)

An Attacking Method for Multiplicative Knapsack Type Public Key Cryptosystem Based on Finite Field
Kaoru KUROSAWA Toshiya ITOH Hiroo SHIGETA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1987/01/25
Vol. E70-E  No. 1  pp. 37-41
Type of Manuscript:  PAPER
Category: Information and Communication Theory
Keyword: 
 Summary | Full Text:PDF(327.7KB)