Efficient anonymous channel and all/nothing election scheme C Park, K Itoh, K Kurosawa Workshop on the Theory and Application of of Cryptographic Techniques, 248-259, 1993 | 445 | 1993 |
Omac: One-key cbc mac T Iwata, K Kurosawa International Workshop on Fast Software Encryption, 129-153, 2003 | 426 | 2003 |
A new paradigm of hybrid encryption scheme K Kurosawa, Y Desmedt Annual International Cryptology Conference, 426-442, 2004 | 400 | 2004 |
UC-secure searchable symmetric encryption K Kurosawa, Y Ohtaki International conference on financial cryptography and data security, 285-298, 2012 | 286 | 2012 |
Optimum traitor tracing and asymmetric schemes K Kurosawa, Y Desmedt International Conference on the Theory and Applications of Cryptographic …, 1998 | 267 | 1998 |
Oblivious keyword search W Ogata, K Kurosawa Journal of complexity 20 (2-3), 356-371, 2004 | 209 | 2004 |
Multi-recipient public-key encryption with shortened ciphertext K Kurosawa International Workshop on Public Key Cryptography, 48-63, 2002 | 195 | 2002 |
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM M Abe, R Gennaro, K Kurosawa, V Shoup Annual international conference on the theory and applications of …, 2005 | 181 | 2005 |
How to break a practical MIX and design a new one Y Desmedt, K Kurosawa International Conference on the Theory and Applications of Cryptographic …, 2000 | 171 | 2000 |
A relationship between linear complexity and k-error linear complexity K Kurosawa, F Sato, T Sakata, W Kishimoto IEEE Transactions on Information Theory 46 (2), 694-698, 2000 | 169 | 2000 |
Fault tolerant anonymous channel W Ogata, K Kurosawa, K Sako, K Takatani International Conference on Information and Communications Security, 440-444, 1997 | 167 | 1997 |
Tag-KEM/DEM: A new framework for hybrid encryption M Abe, R Gennaro, K Kurosawa Journal of Cryptology 21 (1), 97-130, 2008 | 124 | 2008 |
Birthday paradox for multi-collisions K Suzuki, D Tonien, K Kurosawa, K Toyota International conference on information security and cryptology, 29-40, 2006 | 115 | 2006 |
New eigamal type threshold digital signature scheme C Park, K Kurosawa IEICE transactions on fundamentals of electronics, communications and …, 1996 | 111 | 1996 |
Tmac: Two-key cbc mac K Kurosawa, T Iwata Cryptographers’ Track at the RSA Conference, 33-49, 2003 | 110 | 2003 |
From digital signature to ID-based identification/signature K Kurosawa, SH Heng International Workshop on Public Key Cryptography, 248-261, 2004 | 106 | 2004 |
How to update documents verifiably in searchable symmetric encryption K Kurosawa, Y Ohtaki International Conference on Cryptology and Network Security, 309-328, 2013 | 105 | 2013 |
Nonperfect secret sharing schemes and matroids K Kurosawa, K Okada, K Sakano, W Ogata, S Tsujii Workshop on the Theory and Application of of Cryptographic Techniques, 126-141, 1993 | 105 | 1993 |
Optimum secret sharing scheme secure against cheating W Ogata, K Kurosawa, DR Stinson SIAM Journal on Discrete Mathematics 20 (1), 79-95, 2006 | 98 | 2006 |
New combinatorial designs and their applications to authentication codes and secret sharing schemes W Ogata, K Kurosawa, DR Stinson, H Saido Discrete Mathematics 279 (1-3), 383-405, 2004 | 95 | 2004 |