Kaoru Kurosawa
Kaoru Kurosawa
Adresse e-mail validée de vc.ibaraki.ac.jp
Titre
Citée par
Citée par
Année
Efficient anonymous channel and all/nothing election scheme
C Park, K Itoh, K Kurosawa
Workshop on the Theory and Application of of Cryptographic Techniques, 248-259, 1993
4241993
A new paradigm of hybrid encryption scheme
K Kurosawa, Y Desmedt
Annual International Cryptology Conference, 426-442, 2004
3792004
Omac: One-key cbc mac
T Iwata, K Kurosawa
International Workshop on Fast Software Encryption, 129-153, 2003
3792003
Optimum traitor tracing and asymmetric schemes
K Kurosawa, Y Desmedt
International Conference on the Theory and Applications of Cryptographic …, 1998
2561998
UC-secure searchable symmetric encryption
K Kurosawa, Y Ohtaki
International Conference on Financial Cryptography and Data Security, 285-298, 2012
2262012
Oblivious keyword search
W Ogata, K Kurosawa
Journal of complexity 20 (2-3), 356-371, 2004
1942004
Multi-recipient public-key encryption with shortened ciphertext
K Kurosawa
International Workshop on Public Key Cryptography, 48-63, 2002
1792002
How to break a practical MIX and design a new one
Y Desmedt, K Kurosawa
International Conference on the Theory and Applications of Cryptographic …, 2000
1682000
A relationship between linear complexity and k-error linear complexity
K Kurosawa, F Sato, T Sakata, W Kishimoto
IEEE Transactions on Information Theory 46 (2), 694-698, 2000
1642000
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
M Abe, R Gennaro, K Kurosawa, V Shoup
Annual International Conference on the Theory and Applications of …, 2005
1632005
Fault tolerant anonymous channel
W Ogata, K Kurosawa, K Sako, K Takatani
International Conference on Information and Communications Security, 440-444, 1997
1551997
Tag-KEM/DEM: A new framework for hybrid encryption
M Abe, R Gennaro, K Kurosawa
Journal of Cryptology 21 (1), 97-130, 2008
1202008
New eigamal type threshold digital signature scheme
C Park, K Kurosawa
IEICE transactions on fundamentals of electronics, communications and …, 1996
1091996
Tmac: Two-key cbc mac
K Kurosawa, T Iwata
Cryptographers’ Track at the RSA Conference, 33-49, 2003
1012003
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
International Conference on Information Security and Cryptology, 29-40, 2006
962006
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption
G Hanaoka, K Kurosawa
International Conference on the Theory and Application of Cryptology and …, 2008
952008
Nonperfect secret sharing schemes and matroids
K Kurosawa, K Okada, K Sakano, W Ogata, S Tsujii
Workshop on the Theory and Application of of Cryptographic Techniques, 126-141, 1993
951993
Almost ideal contrast visual cryptography with reversing
DQ Viet, K Kurosawa
Cryptographers’ Track at the RSA Conference, 353-365, 2004
902004
New combinatorial designs and their applications to authentication codes and secret sharing schemes
W Ogata, K Kurosawa, DR Stinson, H Saido
Discrete Mathematics 279 (1-3), 383-405, 2004
882004
From digital signature to ID-based identification/signature
K Kurosawa, SH Heng
International Workshop on Public Key Cryptography, 248-261, 2004
882004
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20