Kaoru Kurosawa
According to our database1,
Kaoru Kurosawa
authored at least 210 papers
between 1986 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
2022
Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2021
Proceedings of the Advances in Information and Computer Security, 2021
2020
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions.
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) Assumptions.
Proceedings of the Advances in Information and Computer Security, 2019
Proceedings of the Advances in Information and Computer Security, 2019
2018
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the Advances in Information and Computer Security, 2018
2017
IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions.
Int. J. Appl. Cryptogr., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the Financial Cryptography and Data Security, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
2016
Proceedings of the Advances in Information and Computer Security, 2016
2015
Inf. Process. Lett., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Financial Cryptography and Data Security, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
2013
How to Factor N<sub>1</sub> and N<sub>2</sub> When p<sub>1</sub>=p<sub>2</sub> mod 2<sup>t</sup>.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the Information Theoretic Security - 7th International Conference, 2013
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013
Proceedings of the Applied Cryptography and Network Security, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Round-efficient perfectly secure message transmission scheme against general adversary.
Des. Codes Cryptogr., 2012
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
IEEE Trans. Inf. Theory, 2011
How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Information Theoretic Security - 5th International Conference, 2011
2010
Power of a public random permutation and its application to authenticated encryption.
IEEE Trans. Inf. Theory, 2010
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack.
J. Cryptol., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.
Proceedings of the Advances in Information and Computer Security, 2010
Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk).
Proceedings of the Cryptology and Network Security - 9th International Conference, 2010
2009
IEEE Trans. Inf. Theory, 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
2008
A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions.
IEEE Trans. Inf. Theory, 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.
IACR Cryptol. ePrint Arch., 2008
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort.
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification.
Proceedings of the Information Theoretic Security, Third International Conference, 2008
Proceedings of the Topics in Cryptology, 2008
2007
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security.
IEEE Trans. Inf. Theory, 2007
Quantum Inf. Process., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IACR Cryptol. ePrint Arch., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security, 10th International Conference, 2007
2006
IEEE Trans. Inf. Theory, 2006
IEEE Trans. Inf. Theory, 2006
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security.
Int. J. Inf. Sec., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Information Hiding, 8th International Workshop, 2006
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006
Proceedings of the Advances in Cryptology, 2006
2005
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem.
J. Univers. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Information Security, 8th International Conference, 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
Proceedings of the Computational Science and Its Applications, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
Proceedings of the Advances in Cryptology, 2005
2004
IEEE Trans. Inf. Theory, 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IACR Cryptol. ePrint Arch., 2004
New combinatorial designs and their applications to authentication codes and secret sharing schemes.
Discret. Math., 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Topics in Cryptology, 2004
Proceedings of the Advances in Cryptology, 2004
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Efficient Public Key Steganography Secure Against Adaptively Chosen Stegotext Attacks.
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Information Security, 6th International Conference, 2003
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
Proceedings of the Cryptography and Coding, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Advances in Cryptology, 2002
2001
J. Cryptol., 2001
IACR Cryptol. ePrint Arch., 2001
Bounds and Combinatorial Structure of Multi-Receiver-Codes.
Des. Codes Cryptogr., 2001
Combinatorial Bounds on Authentication Codes with Arbitration.
Des. Codes Cryptogr., 2001
Proceedings of the Public Key Cryptography, 2001
Proceedings of the Algorithms and Computation, 12th International Symposium, 2001
2000
IEEE Trans. Inf. Theory, 2000
How to Encrypt Long Messages without Large Size Symmetric/Asymmetric Encryption Schemes.
IACR Cryptol. ePrint Arch., 2000
Combinatorial Classification of Optimal Authentication Codes with Arbitration.
Des. Codes Cryptogr., 2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Proceedings of the Advances in Cryptology, 2000
Key Agreement Protocol Securer than DLOG.
Proceedings of the International Colloquium on Words, 2000
1999
IEEE Trans. Inf. Theory, 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Algebraic multidimensional phase unwrapping and zero distribution of complex polynomials-characterization of multivariate stable polynomials.
IEEE Trans. Signal Process., 1998
J. Univers. Comput. Sci., 1998
Des. Codes Cryptogr., 1998
Proceedings of the Sequences and their Applications, 1998
Proceedings of the Sequences and their Applications, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
Proceedings of the Information Security and Privacy, Third Australasian Conference, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria.
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997
1996
Proceedings of the Advances in Cryptology, 1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995
Proceedings of the Advances in Cryptology, 1995
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995
1994
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994
A Necessary Condition for Linear Phase in Two Dimensional Perfect Reconstruction QMF Banks.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994
1993
A fast stability test for multidimensional systems.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993
Stability and zeros of a complex polynomial.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
1992
Proceedings of the Algorithms and Computation, Third International Symposium, 1992
1991
Proceedings of the Advances in Cryptology, 1991
1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
IEEE Trans. Acoust. Speech Signal Process., 1989
A polynomial time validation method for channel boundedness of communication protocols (2 processes).
Syst. Comput. Jpn., 1989
1988
A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations.
Syst. Comput. Jpn., 1988
Syst. Comput. Jpn., 1988
Public Key Cryptosystem using a reciprocal number with the same Intractability as Factoring a Large number.
Cryptologia, 1988
1986
An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC.
Proceedings of the IEEE International Conference on Communications: Integrating the World Through Communications, 1986
Proceedings of the IEEE International Conference on Acoustics, 1986