Yasuyuki Murakami

According to our database1, Yasuyuki Murakami authored at least 22 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
High-Density Knapsack Cryptosystem Using Shifted-Odd and Super-Increasing Sequence.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

2023
Packer Identification Method for Multi-Layer Executables Using Entropy Analysis with <i>k</i>-Nearest Neighbor Algorithm.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

2020
Packer Identification Method for Multi-layer Executables with k-Nearest Neighbor of Entropies.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2018
Equivalent Secret Key Attack against Knapsack PKC based on Subset Sum Decision Problem.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Security of Knapsack Cryptosystem Using Subset-Sum Decision Problem against Alternative-Solution Attack.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

2016
An implementation of hybrid-type inter-organization cryptosystem using ElGamal PKC.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2015
Hybrid inter-organization cryptosystem using ElGamal cryptosystem.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

An implementation of inter-organization cryptosystem based on RSA cryptosystem.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

2014
A Note on Security of Public-Key Cryptosystem Provably as Secure as Subset Sum Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A knapsack public-key cryptosystem using two random sequences.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2012
Security analysis of shifted odd knapsack public key encryption scheme.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

A public-key cryptosystem based on decision version of subset sum problem.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2010
A knapsack public-key cryptosystem with cyclic code over $GF(2)$.
JSIAM Lett., 2010

An ID-based key sharing scheme based on discrete logarithm problem over a product of three primes.
JSIAM Lett., 2010

A new construction method of knapsack PKC using linear transformation and Chinese remainder theorem.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
Relationship between weight of plaintext and successful attacks in knapsack cryptosystems.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

A New Construction of Knapsack Pkc by Using a Random Sequence.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Security of a Class of Knapsack Public-Key Cryptosystems against Low-Density Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Knapsack Public-Key Cryptosystem Using Chinese Remainder Theorem.
IACR Cryptol. ePrint Arch., 2007

2006
Consumer Network and Market Dynamics.
Proceedings of the 2006 Joint Conference on Information Sciences, 2006

2005
Murakami-Kasahara ID-based Key Sharing Scheme Revisited - In Comparison with Maurer-Yacobi Schemes -.
IACR Cryptol. ePrint Arch., 2005

2002
New Product-Sum Type Public-Key Cryptosystems with Selectable Encryption Key Based on Chinese Remainder Theorem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002


  Loading...