Volgen
Kaoru Kurosawa
Kaoru Kurosawa
Geverifieerd e-mailadres voor vc.ibaraki.ac.jp
Titel
Geciteerd door
Geciteerd door
Jaar
Efficient anonymous channel and all/nothing election scheme
C Park, K Itoh, K Kurosawa
Workshop on the Theory and Application of of Cryptographic Techniques, 248-259, 1993
4451993
Omac: One-key cbc mac
T Iwata, K Kurosawa
International Workshop on Fast Software Encryption, 129-153, 2003
4262003
A new paradigm of hybrid encryption scheme
K Kurosawa, Y Desmedt
Annual International Cryptology Conference, 426-442, 2004
4002004
UC-secure searchable symmetric encryption
K Kurosawa, Y Ohtaki
International conference on financial cryptography and data security, 285-298, 2012
2862012
Optimum traitor tracing and asymmetric schemes
K Kurosawa, Y Desmedt
International Conference on the Theory and Applications of Cryptographic …, 1998
2671998
Oblivious keyword search
W Ogata, K Kurosawa
Journal of complexity 20 (2-3), 356-371, 2004
2092004
Multi-recipient public-key encryption with shortened ciphertext
K Kurosawa
International Workshop on Public Key Cryptography, 48-63, 2002
1952002
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
M Abe, R Gennaro, K Kurosawa, V Shoup
Annual international conference on the theory and applications of …, 2005
1812005
How to break a practical MIX and design a new one
Y Desmedt, K Kurosawa
International Conference on the Theory and Applications of Cryptographic …, 2000
1712000
A relationship between linear complexity and k-error linear complexity
K Kurosawa, F Sato, T Sakata, W Kishimoto
IEEE Transactions on Information Theory 46 (2), 694-698, 2000
1692000
Fault tolerant anonymous channel
W Ogata, K Kurosawa, K Sako, K Takatani
International Conference on Information and Communications Security, 440-444, 1997
1671997
Tag-KEM/DEM: A new framework for hybrid encryption
M Abe, R Gennaro, K Kurosawa
Journal of Cryptology 21 (1), 97-130, 2008
1242008
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
International conference on information security and cryptology, 29-40, 2006
1152006
New eigamal type threshold digital signature scheme
C Park, K Kurosawa
IEICE transactions on fundamentals of electronics, communications and …, 1996
1111996
Tmac: Two-key cbc mac
K Kurosawa, T Iwata
Cryptographers’ Track at the RSA Conference, 33-49, 2003
1102003
From digital signature to ID-based identification/signature
K Kurosawa, SH Heng
International Workshop on Public Key Cryptography, 248-261, 2004
1062004
How to update documents verifiably in searchable symmetric encryption
K Kurosawa, Y Ohtaki
International Conference on Cryptology and Network Security, 309-328, 2013
1052013
Nonperfect secret sharing schemes and matroids
K Kurosawa, K Okada, K Sakano, W Ogata, S Tsujii
Workshop on the Theory and Application of of Cryptographic Techniques, 126-141, 1993
1051993
Optimum secret sharing scheme secure against cheating
W Ogata, K Kurosawa, DR Stinson
SIAM Journal on Discrete Mathematics 20 (1), 79-95, 2006
982006
New combinatorial designs and their applications to authentication codes and secret sharing schemes
W Ogata, K Kurosawa, DR Stinson, H Saido
Discrete Mathematics 279 (1-3), 383-405, 2004
952004
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20