Yasuyuki MURAKAMI


A Note on Security of Public-Key Cryptosystem Provably as Secure as Subset Sum Problem
Shinsuke HAMASHO Yasuyuki MURAKAMI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 298-299
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
subset sum problemprovable securityattack
 Summary | Full Text:PDF(72.3KB)

Security of a Class of Knapsack Public-Key Cryptosystems against Low-Density Attack
Takeshi NASAKO Yasuyuki MURAKAMI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 2889-2892
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
knapsack PKCGaussian integerslow-density attack
 Summary | Full Text:PDF(117.1KB)

New Product-Sum Type Public-Key Cryptosystems with Selectable Encryption Key Based on Chinese Remainder Theorem
Kiyoko KATAYANAGI Yasuyuki MURAKAMI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/02/01
Vol. E85-A  No. 2  pp. 472-480
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
public-key cryptosystemproduct-sum type cryptosystemlow-density attackChinese remainder theoremselectable encryption key
 Summary | Full Text:PDF(241.6KB)

A New Product-Sum Public-Key Cryptosystem Using Message Extension
Kiyoko KATAYANAGI Yasuyuki MURAKAMI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/10/01
Vol. E84-A  No. 10  pp. 2482-2487
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
product-sum public-key cryptosystemChinese remainder theoremlow-density attackhigh densitymessage extension
 Summary | Full Text:PDF(222KB)

A New Product-Sum Type Public Key Cryptosystem Based on Reduced Bases
Daisuke SUZUKI Yasuyuki MURAKAMI Ryuichi SAKAI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 326-330
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
low-density attackproduct-sum type public key cryptosystemsreduced base
 Summary | Full Text:PDF(284.3KB)

New Multiplicative Knapsack-Type Public Key Cryptosystems
Shinya KIUCHI Yasuyuki MURAKAMI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 188-196
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Morii-Kasahara cryptosystemSchalkwijk algorithmhigh ratefast encryptiondiscrete logarithm problem
 Summary | Full Text:PDF(354.2KB)

A New Probabilistic ID-Based Non-interactive Key Sharing Scheme
Yasuyuki MURAKAMI Ryuichi SAKAI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 2-9
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
IDkey sharingnon-interactiveID-based non-interactive key sharing scheme (ID-NIKS)linear attackcollusion attack
 Summary | Full Text:PDF(429.7KB)

New Methods of Generating Primes Secure against Both P-1 and P+1 Methods
Yoshizo SATO Yasuyuki MURAKAMI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/10/25
Vol. E82-A  No. 10  pp. 2161-2166
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
prime generationP-1 methodP+1 methodtrial division method
 Summary | Full Text:PDF(456.1KB)