Kazue Sako

According to our database1, Kazue Sako authored at least 27 papers between 1994 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2011
Verifiable Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Public Key Cryptography.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Nyberg-Rueppel Signature Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Goldwasser-Micali Encryption Scheme.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Digital Signature Schemes.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology.
Proceedings of the HOST 2011, 2011

2010
An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization.
Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

RLCPS Preface.
Proceedings of the Financial Cryptography and Data Security, 2010

2009
k-Times Anonymous Authentication.
IEICE Transactions, 2009

IC card-based single sign-on system that remains secure under card analysis.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

2007
An Efficient Publicly Verifiable Mix-Net for Long Inputs.
IEICE Transactions, 2007

2006
k-Times Anonymous Authentication with a Constant Proving Cost.
Proceedings of the Public Key Cryptography, 2006

An Efficient Publicly Verifiable Mix-Net for Long Inputs.
Proceedings of the Financial Cryptography and Data Security, 2006

Using group signatures for identity management and its implementation.
Proceedings of the 2006 Workshop on Digital Identity Management, 2006

2005
Semantic Security.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Probabilistic Public-Key Encryption.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Electronic Voting Schemes.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004
k-Times Anonymous Authentication (Extended Abstract).
Proceedings of the Advances in Cryptology, 2004

2002
An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
An Efficient Scheme for Proving a Shuffle.
Proceedings of the Advances in Cryptology, 2001

2000
An Auction Protocol Which Hides Bids of Losers.
Proceedings of the Public Key Cryptography, 2000

Efficient Receipt-Free Voting Based on Homomorphic Encryption.
Proceedings of the Advances in Cryptology, 2000

1999
Implementation of a Digital Lottery Server on WWW.
Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1997
Fault tolerant anonymous channel.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
Designated Verifier Proofs and Their Applications.
Proceedings of the Advances in Cryptology, 1996

1995
Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth.
Proceedings of the Advances in Cryptology, 1995

1994
Secure Voting Using Partially Compatible Homomorphisms.
Proceedings of the Advances in Cryptology, 1994


  Loading...