Kouichi Sakurai

According to our database1, Kouichi Sakurai authored at least 397 papers between 1991 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Sec. Appl., 2019

Attacking convolutional neural network using differential evolution.
IPSJ Trans. Computer Vision and Applications, 2019

Analyzing the Effect of Moving Target Defense for a Web System.
IJNC, 2019

Theory and application of computationally independent one-way functions: Interactive proof of ability - Revisited.
IACR Cryptology ePrint Archive, 2019

Universal Rules for Fooling Deep Neural Networks based Text Classification.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

Implementing Lightweight IoT-IDS on Raspberry Pi Using Correlation-Based Feature Selection and Its Performance Evaluation.
Proceedings of the Advanced Information Networking and Applications, 2019

Simulation of Secure Volunteer Computing by Using Blockchain.
Proceedings of the Advanced Information Networking and Applications, 2019

Deniable Secret Handshake Protocol - Revisited.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Light Weight Write Mechanism for Cloud Data.
IEEE Trans. Parallel Distrib. Syst., 2018

Proof of Disease: A Blockchain Consensus Protocol for Accurate Medical Decisions and Reducing the Disease Burden.
Proceedings of the 2018 IEEE SmartWorld, 2018

Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.
Proceedings of the Information Security Practice and Experience, 2018

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters.
Proceedings of the Information Systems Security - 14th International Conference, 2018

Neural Cryptography Based on the Topology Evolving Neural Networks.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Tracing MIRAI Malware in Networked System.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Empirical Evaluation on Robustness of Deep Convolutional Neural Networks Activation Functions Against Adversarial Perturbation.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

A New Design for Evaluating Moving Target Defense System.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Suppressing Chain Size of Blockchain-Based Information Sharing for Swarm Robotic Systems.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Detecting Distributed Cyber Attacks in SDN Based on Automatic Thresholding.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Feature Selection for Machine Learning-Based Early Detection of Distributed Cyber Attacks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

Lightweight Classification of IoT Malware Based on Image Recognition.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Analysis of Variance of Graph-Clique Mining for Scalable Proof of Work.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

Active Attack Against Oblivious RAM.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions.
The Journal of Supercomputing, 2017

Bitcoin Block Withholding Attack: Analysis and Mitigation.
IEEE Trans. Information Forensics and Security, 2017

Secure combinatorial key predistribution scheme for sensor networks by regulating frequencies: magneto optic sensors.
Concurrency and Computation: Practice and Experience, 2017

A scalable attribute-set-based access control with both sharing and full-fledged delegation of access privileges in cloud computing.
Computers & Electrical Engineering, 2017

Secure and Light Weight Fine-grained Access Mechanism for Outsourced Data.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A Detection System for Distributed DoS Attacks Based on Automatic Extraction of Normal Mode and Its Performance Evaluation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Evasion Attacks Against Statistical Code Obfuscation Detectors.
Proceedings of the Advances in Information and Computer Security, 2017

How to sign multiple versions of digital documents.
Proceedings of the International Workshop on Big Data and Information Security, 2017

Improved proxy re-encryption scheme for symmetric key cryptography.
Proceedings of the International Workshop on Big Data and Information Security, 2017

A new security middleware architecture based on fog computing and cloud to support IoT constrained devices.
Proceedings of the 1st International Conference on Internet of Things and Machine Learning, 2017

Improving the accuracy of signature authentication using the eight principles of Yong.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

On unconditionally binding code-based commitment schemes.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

C&C session detection using random forest.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Parameter manipulation attack prevention and detection by using web application deception proxy.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

A proposal of event study methodology with Twitter sentimental analysis for risk management.
Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication, 2017

Host independent and distributed detection system of the network attack by using OpenFlow.
Proceedings of the 2017 International Conference on Information Networking, 2017

Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

Effectively Protect Your Privacy: Enabling Flexible Privacy Control on Web Tracking.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Packet in Message Based DDoS Attack Detection in SDN Network Using OpenFlow.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

2016
Character-based symmetric searchable encryption and its implementation and experiment on mobile devices.
Security and Communication Networks, 2016

Authentication in mobile cloud computing: A survey.
J. Network and Computer Applications, 2016

A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints.
J. Internet Serv. Inf. Secur., 2016

Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures.
IACR Cryptology ePrint Archive, 2016

A Behavior-Based Online Engine for Detecting Distributed Cyber-Attacks.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

CCA-Secure Keyed-Fully Homomorphic Encryption.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Expressive Rating Scheme by Signatures with Predications on Ratees.
Proceedings of the Network and System Security - 10th International Conference, 2016

On the Robustness of Visual Cryptographic Schemes.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Yet Another Note on Block Withholding Attack on Bitcoin Mining Pools.
Proceedings of the Information Security - 19th International Conference, 2016

A Proposal for Cyber-Attack Trace-Back Using Packet Marking and Logging.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

A Behavior-Based Method for Detecting DNS Amplification Attacks.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Cyberbullying detection using parent-child relationship between comments.
Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, 2016

Cross-group Secret Sharing for Secure Cloud Storage Service.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

A Study of Security Management with Cyber Insurance.
Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, 2016

Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters.
Proceedings of the Information Theoretic Security - 9th International Conference, 2016

Retricoin: Bitcoin based on compact proofs of retrievability.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

SQL Injection Attack Detection Method Using Expectation Criterion.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

A Comprehensive Security Analysis Checksheet for OpenFlow Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

A Machine Learning Based Approach for Detecting DRDoS Attacks and Its Performance Evaluation.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

An Identity Preserving Access Control Scheme with Flexible System Privilege Revocation in Cloud Computing.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Analysis of "Receipt-Freeness" and "Coercion-Resistance" in Biometric Authentication Protocols.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

A Traceable Signcryption Scheme for Secure Sharing of Data in Cloud Storage.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
A note on the security of KHL scheme.
Theor. Comput. Sci., 2015

Provably Secure Anonymous Authentication Scheme for Roaming Service in Global Mobility Networks.
J. Inf. Sci. Eng., 2015

Foreword.
IEICE Transactions, 2015

Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security.
IACR Cryptology ePrint Archive, 2015

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems.
IACR Cryptology ePrint Archive, 2015

A multivariate quadratic challenge toward post-quantum generation cryptography.
ACM Comm. Computer Algebra, 2015

Plaintext checkable encryption with designated checker.
Adv. in Math. of Comm., 2015

Proposal of multi-value cell structure for high-density two-dimensional codes and evaluation of readability using smartphones.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Computational Soundness of Uniformity Properties for Multi-party Computation Based on LSSS.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Application of NTRU Using Group Rings to Partial Decryption Technique.
Proceedings of the Trusted Systems - 7th International Conference, 2015

Hybrid Encryption Scheme Using Terminal Fingerprint and Its Application to Attribute-Based Encryption Without Key Misuse.
Proceedings of the Information and Communication Technology, 2015

Detection of Android ad library focusing on HTTP connections and view object redraw behaviors.
Proceedings of the 2015 International Conference on Information Networking, 2015

Attribute-Based Two-Tier Signatures: Definition and Construction.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

A Multivariate Encryption Scheme with Rainbow.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields.
Proceedings of the Third International Symposium on Computing and Networking, 2015

Evaluation of Matching Accuracy of Template Matching Using a Steganography Algorithm.
Proceedings of the Third International Symposium on Computing and Networking, 2015

On the Application of Clique Problem for Proof-of-Work in Cryptocurrencies.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

A Proposal for Detecting Distributed Cyber-Attacks Using Automatic Thresholding.
Proceedings of the 10th Asia Joint Conference on Information Security, 2015

Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Collaborative agglomerative document clustering with limited information disclosure.
Security and Communication Networks, 2014

Efficient variant of Rainbow using sparse secret keys.
JoWUA, 2014

Detection of Privacy Sensitive Information Retrieval Using API Call Logging Mechanism within Android Framework.
JNW, 2014

Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units.
J. Internet Serv. Inf. Secur., 2014

Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search.
IEICE Transactions, 2014

Security of Multivariate Signature Scheme Using Non-commutative Rings.
IEICE Transactions, 2014

Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation.
IEICE Transactions, 2014

Fast Implementation of KCipher-2 for Software and Hardware.
IEICE Transactions, 2014

An Efficient t-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency.
IACR Cryptology ePrint Archive, 2014

An enhanced audio ownership protection scheme based on visual cryptography.
EURASIP J. Information Security, 2014

Reconstructing and Visualizing Evidence of Artifact from Firefox SessionStorage.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2014

Evaluation of the Identity and Compatibility of Multi-valued Cells in Two-Dimensional Codes Using Smartphones.
Proceedings of the 7th IEEE International Conference on Service-Oriented Computing and Applications, 2014

Securing Sensor Networks by Moderating Frequencies.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Fine-Grained Conditional Proxy Re-Encryption and Application.
Proceedings of the Provable Security - 8th International Conference, 2014

Evaluation of a Zero-Watermarking-Type Steganography.
Proceedings of the Digital-Forensics and Watermarking - 13th International Workshop, 2014

Identity-Embedding Method for Decentralized Public-Key Infrastructure.
Proceedings of the Trusted Systems - 6th International Conference, 2014

A Zero-Watermarking-Like Steganography and Potential Applications.
Proceedings of the 2014 Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2014

A method of digital rights management based on Bitcoin protocol.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

Efficient Variant of Rainbow without Triangular Matrix Representation.
Proceedings of the Information and Communication Technology, 2014

Implementation of Efficient Operations over GF(232) Using Graphics Processing Units.
Proceedings of the Information and Communication Technology, 2014

Privacy-aware cloud-based input method editor.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units.
Proceedings of the Second International Symposium on Computing and Networking, 2014

Towards 'Receipt-Freeness' in Remote Biometric Authentication.
Proceedings of the Fifth International Conference on Emerging Security Technologies, 2014

Attribute-based signatures without pairings via the fiat-shamir paradigm.
Proceedings of the ASIAPKC'14, 2014

A Parameterless Learning Algorithm for Behavior-Based Detection.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

Acquisition of Evidence of Web Storage in HTML5 Web Browsers from Memory Image.
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

2013
Evolution of cooperation in reputation system by group-based scheme.
The Journal of Supercomputing, 2013

Reliable workflow scheduling with less resource redundancy.
Parallel Computing, 2013

A Behavior-based Method for Detecting Distributed Scan Attacks in Darknets.
JIP, 2013

Confidentiality of 2D Code using Infrared with Cell-level Error Correction.
IJIMAI, 2013

Exploiting reference images for image splicing verification.
Digital Investigation, 2013

Efficient implementation for QUAD stream cipher with GPUs.
Comput. Sci. Inf. Syst., 2013

Botnet command and control based on Short Message Service and human mobility.
Computer Networks, 2013

Detection of Android API Call Using Logging Mechanism within Android Framework.
Proceedings of the Security and Privacy in Communication Networks, 2013

Multivariate Signature Scheme Using Quadratic Forms.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Efficient Computing over GF(2^16) Using Graphics Processing Unit.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A proposal for the privacy leakage verification tool for Android application developers.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Supporting Secure Provenance Update by Keeping "Provenance" of the Provenance.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

Security Model and Analysis of FHMQV, Revisited.
Proceedings of the Information Security and Cryptology - 9th International Conference, 2013

A variant of rainbow with shorter secret key and faster signature generation.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Upper bound of the length of information embedd in RSA public key efficiently.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Performance Evaluation of Information Theoretic Secure Multi-channel Transmission on Multihop Wireless Network.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013

Detecting HTTP-Based Botnet Based on Characteristic of the C & C Session Using by SVM.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

2012
Managing Insider Security Threats (MIST 2012 Volume 1).
JoWUA, 2012

Security Analysis of Offline E-cash Systems with Malicious Insider.
JoWUA, 2012

Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network.
JNW, 2012

Flexible service selection with user-specific QoS support in service-oriented architecture.
J. Network and Computer Applications, 2012

Detecting Information Leakage via a HTTP Request Based on the Edit Distance.
J. Internet Serv. Inf. Secur., 2012

A Finite Equivalence of Verifiable Multi-secret Sharing.
Int. J. Comput. Intell. Syst., 2012

Securing Provenance of Distributed Processes in an Untrusted Environment.
IEICE Transactions, 2012

DSSH: Digital signature based secure handover for network-based mobility management.
Comput. Syst. Sci. Eng., 2012

A repeated game approach for analyzing the collusion on selective forwarding in multihop wireless networks.
Computer Communications, 2012

Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

Analysis and Improvement of Privacy-Preserving Frequent Item Protocol for Accountable Computation Framework.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Behavior-Based Detection Method for Outbreaks of Low-Rate Attacks.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

Barrier: a lightweight hypervisor for protecting kernel integrity via memory isolation.
Proceedings of the ACM Symposium on Applied Computing, 2012

Secure Keyword Search Using Bloom Filter with Specified Character Positions.
Proceedings of the Provable Security - 6th International Conference, 2012

An Image Splicing Detection Based on Interpolation Analysis.
Proceedings of the Advances in Multimedia Information Processing - PCM 2012, 2012

Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.
Proceedings of the Advances in Information and Computer Security, 2012

Image Splicing Verification Based on Pixel-Based Alignment Method.
Proceedings of the Digital Forensics and Watermaking - 11th International Workshop, 2012

Information Hiding of Two-dimensional Code by Multi-layer Optical.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

Preventing the Access of Fraudulent WEB Sites by Using a Special Two-Dimensional Code.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Proposal of the Hierarchical File Server Groups for Implementing Mandatory Access Control.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

A Method for Embedding Secret Key Information in RSA Public Key and Its Application.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Cooperatively securing network coding against pollution attacks with incentive mechanism.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

Analysis of Methods for Detecting Compromised Nodes and its Countermeasures.
Proceedings of the International Conference on IT Convergence and Security, 2012

Reducing the Key Size of Rainbow Using Non-commutative Rings.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic.
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

Differential Fault Analysis of Full LBlock.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2012

Improving Cost-Efficiency through Failure-Aware Server Management and Scheduling in Cloud.
Proceedings of the Cloud Computing and Services Science - Second International Conference, 2012

On Revenue Driven Server Management in Cloud.
Proceedings of the CLOSER 2012 - Proceedings of the 2nd International Conference on Cloud Computing and Services Science, Porto, Portugal, 18, 2012

Communication-Efficient Anonymous Routing Protocol for Wireless Sensor Networks Using Single Path Tree Topology.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

A Differential Game Approach to Mitigating Primary User Emulation Attacks in Cognitive Radio Networks.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

2011
Guest editorial: Trusted computing and communications.
Security and Communication Networks, 2011

FineTrust: a fine-grained trust model for peer-to-peer networks.
Security and Communication Networks, 2011

Enhancing MISP with Fast Mobile IPv6 Security.
Mobile Information Systems, 2011

Enhancing SVO Logic for Mobile IPv6 Security Protocols.
JoWUA, 2011

Addressing Insider Threats and Information Leakage.
JoWUA, 2011

Towards formal analysis of wireless LAN security with MIS protocol.
IJAHUC, 2011

Efficient Context-Sensitive Intrusion Detection Based on State Transition Table.
IEICE Transactions, 2011

A SMS-Based Mobile Botnet Using Flooding Algorithm.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Towards Optimal Revocation and Tracing Schemes - The Power of the Ternary Tree.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

A Study of Communication Route Selection Considering Route Security.
Proceedings of the 11th Annual International Symposium on Applications and the Internet, 2011

A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

General Fault Attacks on Multivariate Public Key Cryptosystems.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter.
Proceedings of the Seventh International Conference on Mobile Ad-hoc and Sensor Networks, 2011

Realizing Fine-Grained and Flexible Access Control to Outsourced Data with Attribute-Based Cryptosystems.
Proceedings of the Information Security Practice and Experience, 2011

Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks.
Proceedings of the Trusted Systems - Third International Conference, 2011

Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Towards Countermeasure of Insider Threat in Network Security.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

Traceback Framework against Botmaster by Sharing Network Communication Pattern Information.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Design and Implementation of a Forced Encryption Kernel Module.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Robust and Compression-Combined Digital Image Encryption Method Based on Compressive Sensing.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

An Efficient Key Generation Method in Audio Zero-Watermarking.
Proceedings of the Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2011

A generic evaluation method for key management schemes in wireless sensor network.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Integrity for the In-flight web page based on a fragile watermarking chain scheme.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Revocation and Tracing Based on Ternary Tree: Towards Optimal Broadcast Encryption Scheme.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Achieving cooperative detection against Sybil attack in wireless ad hoc networks: A game theoretic approach.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

Securing Location-Aware Services Based on Online/Offline Signatures in VANETs.
Proceedings of the Availability, Reliability and Security for Business, Enterprise and Health Information Systems, 2011

2010
Analysis of Existing Privacy-Preserving Protocols in Domain Name System.
IEICE Transactions, 2010

ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
IEICE Transactions, 2010

Foreword.
IEICE Transactions, 2010

Towards a Fairness Multimedia Transmission Using Layered-Based Multicast Protocol.
IEICE Transactions, 2010

Improved Subset Difference Method with Ternary Tree.
IEICE Transactions, 2010

Distributed Paillier Cryptosystem without Trusted Dealer.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries.
Proceedings of the SECRYPT 2010, 2010

Adaptive and Composable Non-interactive String-commitment Protocols.
Proceedings of the SECRYPT 2010, 2010

Behavior Control Based on Dynamic Code Translation.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Model-Based Intrusion Detection by Abstract Interpretation.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Study of Log File Dispersion Management Method.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

SPSE: A flexible QoS-based service scheduling algorithm for service-oriented Grid.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Design and Implementation of Document Access Control Model Based on Role and Security Policy.
Proceedings of the Trusted Systems - Second International Conference, 2010

A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs - (Work-in-Progress).
Proceedings of the Trusted Systems - Second International Conference, 2010

Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Adaptive and Composable Non-interactive String-Commitment Protocols.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Fault tolerant scheduling with dynamic number of replicas in heterogeneous system.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

Modeling and Containment of Search Worms Targeting Web Applications.
Proceedings of the Detection of Intrusions and Malware, 2010

Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Darknet Monitoring on Real-Operated Networks.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Adaptive and Composable Non-committing Encryptions.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
An Enhanced Security Protocol for Fast Mobile IPv6.
IEICE Transactions, 2009

A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6.
IEICE Transactions, 2009

Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Transactions, 2009

Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes.
IEICE Transactions, 2009

Foreword.
IEICE Transactions, 2009

Modeling Security Bridge Certificate Authority Architecture.
IEICE Transactions, 2009

A New Secret Sharing Scheme Based on the Multi-Dealer.
IEICE Transactions, 2009

An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation.
IEICE Transactions, 2009

Grouping Provenance Information to Improve Efficiency of Access Control.
Proceedings of the Advances in Information Security and Assurance, 2009

Formal Verification for Access Control in Web Information Sharing System.
Proceedings of the Advances in Information Security and Assurance, 2009

Efficient Intrusion Detection Based on Static Analysis and Stack Walks.
Proceedings of the Advances in Information and Computer Security, 2009

Comments on Kang-Park's Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

Importance of Data Standardization in Privacy-Preserving K-Means Clustering.
Proceedings of the Database Systems for Advanced Applications, 2009

A Signature Scheme Associated with Universal Re-signcryption.
Proceedings of the The Forth International Conference on Availability, 2009

Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets.
Proceedings of the The Forth International Conference on Availability, 2009

Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft's Security Management Guide.
Proceedings of the The Forth International Conference on Availability, 2009

Secrecy Capacity of Wireless LAN.
Proceedings of the The Forth International Conference on Availability, 2009

Security Analysis for P2P Routing Protocols.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Optimization of Group Key Management Structure with a Client Join-Leave Mechanism.
JIP, 2008

Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment.
J. Comput. Sci. Technol., 2008

Achieving evenhandedness in certified email system for contract signing.
Int. J. Inf. Sec., 2008

Reliable Key Distribution Scheme for Lossy Channels.
IEICE Transactions, 2008

Toward a Scalable Visualization System for Network Traffic Monitoring.
IEICE Transactions, 2008

Analysis of Program Obfuscation Schemes with Variable Encoding Technique.
IEICE Transactions, 2008

Ternary Subset Difference Method and Its Quantitative Analysis.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

FPGA-Targeted Hardware Implementations of K2.
Proceedings of the SECRYPT 2008, 2008

Monitoring Unused IP Addresses on Segments Managed by DHCP.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Intrusion Detection Using Third-Parties Support.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

Trust Similarity Measure in Trust Model for P2P Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Invalidation of Mailing List Address to Block Spam Mails.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Thoughts on Multi-Disciplinary Inspired Research on Open Network and Information System.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Key Distribution Scheme Using Matched Filter Resistant against DoS Attack.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Granularity Considering in a Trust Model for P2P Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree.
Proceedings of the Advanced Data Mining and Applications, 4th International Conference, 2008

A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
Proceedings of the The Third International Conference on Availability, 2008

2007
Actual Condition and Issues for Mobile Security System.
JIPS, 2007

On Effectiveness of Clock Control in Stream Ciphers.
IEICE Transactions, 2007

Efficient verifier-based password-authenticated key exchange in the three-party setting.
Computer Standards & Interfaces, 2007

On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

An Approach of Trusted Program Generation for User-Responsible Privacy.
Proceedings of the Ubiquitous Intelligence and Computing, 4th International Conference, 2007

Studying on Economic-Inspired Mechanisms for Routing and Forwarding in Wireless Ad Hoc Network.
Proceedings of the Theory and Applications of Models of Computation, 2007

K2: A Stream Cipher Algorithm using Dynamic Feedback Control.
Proceedings of the SECRYPT 2007, 2007

Design and Implementation of Security Mechanisms for a Hierarchical Community-Based Multi-Agent System.
Proceedings of the Agent Computing and Multi-Agent Systems, 2007

Study on Trust Inference and Emergence of Economical Small-World Phenomena in P2P Environment.
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Analysis of Privacy Disclosure in DNS Query.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

An Approach of Program Analysis Prevention for Information Protection.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

Induction and Implementation of Security Requirements in Each System Block.
Proceedings of the Advances in Multimedia Modeling, 2007

Enforcement of Integrated Security Policy in Trusted Operating Systems.
Proceedings of the Advances in Information and Computer Security, 2007

A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2007

Two-Party Privacy-Preserving Agglomerative Document Clustering.
Proceedings of the Information Security Practice and Experience, 2007

Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard.
Proceedings of the Frontiers of High Performance Computing and Networking ISPA 2007 Workshops, 2007

Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

Bot Detection Based on Traffic Analysis.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

K2 Stream Cipher.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Economic-Inspired Truthful Reputation Feedback Mechanism in P2P Networks.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

A Practical Proxy Device for Protecting RFID Tag's Identifier.
Proceedings of the 2007 ECSIS Symposium on Bio-inspired, 2007

An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

A Policy Language for the Extended Reference Monitor in Trusted Operating Systems.
Proceedings of the The Second International Conference on Availability, 2007

2006
Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems.
IEICE Transactions, 2006

Password-Authenticated Multi-Party Key Exchange with Different Passwords.
IACR Cryptology ePrint Archive, 2006

Interactively combining 2D and 3D visualization for network traffic monitoring.
Proceedings of the 3rd Workshop on Visualization for Computer Security (VizSEC 2006), 2006

On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance.
Proceedings of the Ubiquitous Intelligence and Computing, Third International Conference, 2006

Enhanced Privacy in Key-Exchange Protocols by One-time ID.
Proceedings of the Second International Workshop on Security, 2006

Off-line verification of one-time ID in distributed environment.
Proceedings of the 2006 International Conference on Privacy, 2006

Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i.
Proceedings of the 3rd international conference on Mobile technology, 2006

Actively Modifying Control Flow of Program for Efficient Anormaly Detection.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Ciphertext-Auditable Public Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2006

Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems.
Proceedings of the Information Security Practice and Experience, 2006

Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks.
Proceedings of the Computational Science, 2006

A Proactive Secret Sharing for Server Assisted Threshold Signatures.
Proceedings of the High Performance Computing and Communications, 2006

Distributing Security-Mediated PKI Revisited.
Proceedings of the Public Key Infrastructure, 2006

An RFID System Based MCLT System with Improved Privacy.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

A Proposal of One-Time Biometric Authentication.
Proceedings of the 2006 International Conference on Security & Management, 2006

A Framework for the User-Oriented Personal Information Protection.
Proceedings of the 2006 International Conference on Security & Management, 2006

One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange.
Proceedings of the Communications and Multimedia Security, 2006

Application and Evaluation of Bayesian Filter for Chinese Spam.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

An Intrusion Detection System using Alteration of Data.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling.
IEICE Transactions, 2005

On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks.
IEICE Transactions, 2005

PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis.
IEICE Transactions, 2005

Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost.
IEICE Transactions, 2005

Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers.
IEICE Transactions, 2005

A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment.
IEICE Transactions, 2005

Side Channel Cryptanalysis on XTR Public Key Cryptosystem.
IEICE Transactions, 2005

Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic.
Electr. Notes Theor. Comput. Sci., 2005

A Study on a Framework of Online Biometric Authentication with Verification of Personal Repository.
Proceedings of the Applied Public Key Infrastructure, 2005

Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Group key distribution scheme for reducing required rekey message size.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

The Improved Risk Analysis Mechanism in the Practical Risk Analysis System.
Proceedings of the Information Networking, 2005

Some Remarks on Security of Receipt-Free E-auction.
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005

Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

An Evenhanded Certified Email System for Contract Signing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Reassignment Scheme of an RFID Tag's Key for Owner Transfer.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

Grouping Proof for RFID Tags.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Trends and Issues for Security of Home-Network Based on Power Line Communication.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

2004
Analysis and Design for Private Message Board Systems.
IEICE Transactions, 2004

A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model.
IACR Cryptology ePrint Archive, 2004

A Probabilistic Method for Detecting Anomalous Program Behavior.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Some Fitting of Naive Bayesian Spam Filtering for Japanese Environment.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Key-Exchange Protocol Using Pre-agreed Session-ID.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

A Distributed Online Certificate Status Protocol with a Single Public Key.
Proceedings of the Public Key Cryptography, 2004

A DRM Framework for Secure Distribution of Mobile Contents.
Proceedings of the Information Networking, 2004

On the Pseudorandomness of a Modification of KASUMI Type Permutations.
Proceedings of the Information Security and Cryptology, 2004

Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Design of Intrusion Detection System at User Level with System-Call Interposing.
Proceedings of the ICETE 2004, 2004

Pre-production Methods of a Response to Certificates with the Common Status - Design and Theoretical Evaluation.
Proceedings of the Public Key Infrastructure, 2004

Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags.
Proceedings of the Embedded and Ubiquitous Computing, 2004

A New Attack with Side Channel Leakage During Exponent Recoding Computations.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

A Merging Method of Certification Authorities Without Using Cross-Certifications.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Pseudorandomness of SPN-Type Transformations.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

On Security of XTR Public Key Cryptosystems Against Side Channel Attacks.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
An Approach to Materialize Digital Fingerprinting Based on Proxy Signature Scheme.
Proceedings of the Twelfth International World Wide Web Conference - Posters, 2003

A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation.
Proceedings of the Information Security Applications, 4th International Workshop, 2003

A multiple power analysis breaks the advanced version of the randomized addition-subtraction chains countermeasure against side channel attacks.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003

Certified E-mail Systems Using Public Notice Board.
Proceedings of the 14th International Workshop on Database and Expert Systems Applications (DEXA'03), 2003

Combating Cyber Terrorism: Countering Cyber Terrorist Advantages of Surprise and Anonymity.
Proceedings of the 17th International Conference on Advanced Information Networking and Applications (AINA'03), 2003

Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation.
Proceedings of the Applied Cryptography and Network Security, 2003

Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Single-Path Authenticated-Encryption Scheme Based on Universal Hashing.
Proceedings of the Selected Areas in Cryptography, 2002

New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive.
Proceedings of the Public Key Cryptography, 2002

Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.
Proceedings of the Information Security, 5th International Conference, 2002

A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks.
Proceedings of the Information Security, 5th International Conference, 2002

A Certified E-mail System with Receiver's Selective Usage of Delivery Authority.
Proceedings of the Progress in Cryptology, 2002

A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem.
Proceedings of the Information Security and Cryptology, 2002

Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

On the Security of a Modified Paillier Public-Key Primitive.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
English vs. Sealed Bid in Anonymous Electronic Auction Protocols.
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication.
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001

A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.
Proceedings of the Information Security and Cryptology, 2001

Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring.
Proceedings of the Information Security and Cryptology, 2001

An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
Proceedings of the Information Security and Cryptology, 2001

Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
On zero-knowledge proofs (extended abstract): "from membership to decision".
Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, 2000

Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications.
Proceedings of the Public Key Cryptography, 2000

Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes.
Proceedings of the Public Key Cryptography, 2000

Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack.
Proceedings of the Progress in Cryptology, 2000

An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages.
J. Cryptology, 1999

Toward Fair International Key Escrow.
Proceedings of the Public Key Cryptography, 1999

A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.
Proceedings of the Information Security and Cryptology, 1999

On Threshold RSA-Signing with no Dealer.
Proceedings of the Information Security and Cryptology, 1999

1998
A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems.
J. Cryptology, 1998

An Improvement on El-Yaniv-Fiat-Karp-Turpin's Money-Making Bi-Directional Trading Strategy.
Inf. Process. Lett., 1998

Result-Indistinguishable Zero-Knowledge Proofs: Increased Power and Constant-Round Protocols.
Proceedings of the STACS 98, 1998

Secure Hyperelliptic Cryptosystems and Their Performances.
Proceedings of the Public Key Cryptography, 1998

Security Issues for Contactless Smart Cards.
Proceedings of the Public Key Cryptography, 1998

Checking Programs Discreetly: Demonstrating Result-Correctness Efficiently while Concealing it.
Proceedings of the Algorithms and Computation, 9th International Symposium, 1998

A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem.
Proceedings of the Financial Cryptography, 1998

Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2n.
Proceedings of the Advances in Cryptology, 1998

1997
Practical Proofs of Knowledge without Relying on Theoretical Proofs of Membership on Languages.
Theor. Comput. Sci., 1997

A Key Escrow System with Protecting User's Privacy by Blind Decoding.
Proceedings of the Information Security, First International Workshop, 1997

On-Line Versus Off-Line in Money-Making Strategies with BROKERAGE.
Proceedings of the Algorithms and Computation, 8th International Symposium, 1997

On weak RSA-keys produced from Pretty Good Privacy.
Proceedings of the Information and Communication Security, First International Conference, 1997

Zero-knowledge proofs of decision power: new protocols and optimal round-complexity.
Proceedings of the Information and Communication Security, First International Conference, 1997

Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

Protection of Data and Delegated Keys in Digital Distribution.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
A Short Certificate of the Number of Universal Optimal Strategies for Stopping Simple Stochastic Games.
Inf. Process. Lett., 1996

Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract).
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996

Blind Decoding, Blind Undeniable Signatures, and Their Applications to Privacy Protection.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

A Progress Report on Subliminal-Free Channels.
Proceedings of the Information Hiding, First International Workshop, Cambridge, UK, May 30, 1996

On the Complexity of Computational Problems Associated with Simple Stochastic Games (Extended Abstract).
Proceedings of the Computing and Combinatorics, Second Annual International Conference, 1996

A Hidden Cryptographic Assunmption in No-Transferable Indentification Schemes.
Proceedings of the Advances in Cryptology, 1996

How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem.
Proceedings of the Advances in Cryptology, 1996

1995
Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems.
Proceedings of the Advances in Cryptology, 1995

On Separating Proofs of Knowledge from Proofs of Membership of Languages and Its Application to Secure Identification Schemes (Extended Abstract).
Proceedings of the Computing and Combinatorics, First Annual International Conference, 1995

1992
How Intractable Is the Discrete Logarithm for a General Finite Group?
Proceedings of the Advances in Cryptology, 1992

On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract).
Proceedings of the Advances in Cryptology, 1992

On Bit Correlations Among Preimages of "Many to One" One-Way Functions.
Proceedings of the Advances in Cryptology, 1992

Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes.
Proceedings of the Advances in Cryptology, 1992

1991
On the Complexity of Hyperelliptic Discrete Logarithm Problem.
Proceedings of the Advances in Cryptology, 1991

Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems.
Proceedings of the Advances in Cryptology, 1991

4 Move Perfect ZKIP of Knowledge with No Assumption.
Proceedings of the Advances in Cryptology, 1991

Any Language in IP Has a Divertable ZKIP.
Proceedings of the Advances in Cryptology, 1991

On the Complexity of Constant Round ZKIP of Possession of Knowledge.
Proceedings of the Advances in Cryptology, 1991


  Loading...