What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kaoru Kurosawa
Google Scholar
106
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/eurocrypt
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search.
Reo Eriguchi
Kaoru Kurosawa
Koji Nuida
2022
conf/tcc
On the Optimal Communication Complexity of Error-Correcting Multi-server PIR.
Reo Eriguchi
Kaoru Kurosawa
Koji Nuida
2021
conf/iwsec
Optimum Attack on 3-Round Feistel-2 Structure.
Takanori Daiza
Kaoru Kurosawa
2019
conf/wisa
A Note on the Invisibility and Anonymity of Undeniable Signature Schemes.
Jia-Ch'ng Loh
Swee-Huay Heng
Syh-Yuan Tan
Kaoru Kurosawa
2019
conf/iwsec
How to Solve Multiple Short-Exponent Discrete Logarithm Problem.
Kaoru Kurosawa
Akinaga Ueda
Hayato Matsuhashi
Yusuke Sakagami
2019
conf/iwsec
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) Assumptions.
Toi Tomita
Wakaha Ogata
Kaoru Kurosawa
2019
conf/asiacrypt
How to Correct Errors in Multi-server PIR.
Kaoru Kurosawa
2018
conf/iwsec
(Short Paper) How to Solve DLOG Problem with Auxiliary Input.
Akinaga Ueda
Hayato Tada
Kaoru Kurosawa
2018
conf/iwsec
How to Prove KDM Security of BHHO.
Hayato Tada
Akinaga Ueda
Kaoru Kurosawa
2017
conf/fc
Efficient No-dictionary Verifiable Searchable Symmetric Encryption.
Wakaha Ogata
Kaoru Kurosawa
2017
conf/acns
More Efficient Construction of Bounded KDM Secure Encryption.
Kaoru Kurosawa
Rie Habuka
2016
conf/iwsec
UC-Secure Dynamic Searchable Symmetric Encryption Scheme.
Kaoru Kurosawa
Keisuke Sasaki
Kiyohiko Ohta
Kazuki Yoneyama
2015
conf/acisp
IBE Under k k -LIN with Shorter Ciphertexts and Private Keys.
Kaoru Kurosawa
Le Trieu Phong
2015
conf/ctrsa
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints.
Koji Nuida
Naoto Itakura
Kaoru Kurosawa
2015
conf/eurocrypt
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces.
Koji Nuida
Kaoru Kurosawa
2014
conf/fc
Garbled Searchable Symmetric Encryption.
Kaoru Kurosawa
2014
conf/ctrsa
2-Pass Key Exchange Protocols from CPA-Secure KEM.
Kaoru Kurosawa
Jun Furukawa
2014
conf/africacrypt
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited.
Kaoru Kurosawa
Le Trieu Phong
2013
conf/acns
Leakage Resilient IBE and IPE under the DLIN Assumption.
Kaoru Kurosawa
Le Trieu Phong
2013
conf/iwsec
How to Factor N 1 and N 2 When $p_1=p_2 \bmod 2^t$.
Kaoru Kurosawa
Takuma Ueda
2013
conf/cans
How to Update Documents Verifiably in Searchable Symmetric Encryption.
Kaoru Kurosawa
Yasuhiro Ohtaki
2012
conf/acisp
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions.
Kaoru Kurosawa
Ryo Nojima
Le Trieu Phong
2012
conf/fc
UC-Secure Searchable Symmetric Encryption.
Kaoru Kurosawa
Yasuhiro Ohtaki
2011
conf/acns
Generic Fully Simulatable Adaptive Oblivious Transfer.
Kaoru Kurosawa
Ryo Nojima
Le Trieu Phong
2011
conf/acns
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary.
Ashish Choudhury
Kaoru Kurosawa
Arpita Patra
2010
journals/joc
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack.
Yvo Desmedt
Rosario Gennaro
Kaoru Kurosawa
Victor Shoup
2010
conf/iwsec
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.
Yusuke Sakai
Goichiro Hanaoka
Kaoru Kurosawa
Kazuo Ohta
2010
conf/cans
Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk).
Kaoru Kurosawa
2009
conf/asiacrypt
Simple Adaptive Oblivious Transfer without Random Oracle.
Kaoru Kurosawa
Ryo Nojima
2009
conf/africacrypt
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes.
Le Trieu Phong
Kaoru Kurosawa
Wakaha Ogata
2008
journals/joc
Tag-KEM/DEM: A New Framework for Hybrid Encryption.
Masayuki Abe
Rosario Gennaro
Kaoru Kurosawa
2008
conf/ctrsa
Small Secret Key Attack on a Variant of RSA (Due to Takagi).
Kouichi Itoh
Noboru Kunihiro
Kaoru Kurosawa
2008
conf/eurocrypt
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme.
Kaoru Kurosawa
Kazuhiro Suzuki
2008
conf/asiacrypt
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption.
Goichiro Hanaoka
Kaoru Kurosawa
2007
conf/pkc
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA.
Noboru Kunihiro
Kaoru Kurosawa
2007
conf/iwsec
How to Find Many Collisions of 3-Pass HAVAL.
Kazuhiro Suzuki
Kaoru Kurosawa
2006
conf/acisp
Tag-KEM from Set Partial Domain One-Way Permutations.
Masayuki Abe
Yang Cui
Hideki Imai
Kaoru Kurosawa
2006
conf/icisc
Birthday Paradox for Multi-collisions.
Kazuhiro Suzuki
Dongvu Tonien
Kaoru Kurosawa
Koji Toyota
2006
conf/ih
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks.
Tri Van Le
Kaoru Kurosawa
2006
conf/pkc
New Online/Offline Signature Schemes Without Random Oracles.
Kaoru Kurosawa
Katja Schmidt-Samoa
2006
conf/pkc
The Power of Identification Schemes.
Kaoru Kurosawa
Swee-Huay Heng
2006
conf/asiacrypt
New Approach for Selectively Convertible Undeniable Signature Schemes.
Kaoru Kurosawa
Tsuyoshi Takagi
2005
conf/fse
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms.
Tetsu Iwata
Kaoru Kurosawa
2005
conf/pkc
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme.
Wakaha Ogata
Kaoru Kurosawa
Swee-Huay Heng
2005
conf/eurocrypt
3-Move Undeniable Signature Scheme.
Kaoru Kurosawa
Swee-Huay Heng
2005
conf/eurocrypt
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
Masayuki Abe
Rosario Gennaro
Kaoru Kurosawa
Victor Shoup
2004
conf/acisp
How to Re-use Round Function in Super-Pseudorandom Permutation.
Tetsu Iwata
Kaoru Kurosawa
2004
conf/acisp
How to Remove MAC from DHIES.
Kaoru Kurosawa
Toshihiko Matsuo
2004
conf/crypto
A New Paradigm of Hybrid Encryption Scheme.
Kaoru Kurosawa
Yvo Desmedt
2004
conf/acns
Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security.
Lan Nguyen
Reihaneh Safavi-Naini
Kaoru Kurosawa
2004
conf/pkc
From Digital Signature to ID-based Identification/Signature.
Kaoru Kurosawa
Swee-Huay Heng
2004
conf/pkc
Short Exponent Diffie-Hellman Problems.
Takeshi Koshiba
Kaoru Kurosawa
2004
conf/ctrsa
Almost Ideal Contrast Visual Cryptography with Reversing.
Quang Viet Duong
Kaoru Kurosawa
2004
conf/ctrsa
k-Resilient Identity-Based Encryption in the Standard Model.
Swee-Huay Heng
Kaoru Kurosawa
2003
conf/fse
OMAC: One-Key CBC MAC.
Tetsu Iwata
Kaoru Kurosawa
2003
conf/acisp
On Parallel Hash Functions Based on Block-Cipher.
Toshihiko Matsuo
Kaoru Kurosawa
2003
conf/acisp
Square Hash with a Small Key Size.
Swee-Huay Heng
Kaoru Kurosawa
2003
conf/acisp
On the Pseudorandomness of KASUMI Type Permutations.
Tetsu Iwata
Tohru Yagi
Kaoru Kurosawa
2003
conf/icisc
On the Security of a New Variant of OMAC.
Tetsu Iwata
Kaoru Kurosawa
2003
conf/ctrsa
TMAC: Two-Key CBC MAC.
Kaoru Kurosawa
Tetsu Iwata
2003
conf/asiacrypt
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
Kaoru Kurosawa
Katja Schmidt-Samoa
Tsuyoshi Takagi
2003
conf/asiacrypt
Some RSA-Based Encryption Schemes with Tight Security Reduction.
Kaoru Kurosawa
Tsuyoshi Takagi
2002
conf/fse
Non-cryptographic Primitive for Pseudorandom Permutation.
Tetsu Iwata
Tomonobu Yoshino
Kaoru Kurosawa
2002
conf/icisc
On the Universal Hash Functionsin Luby-Rackoff Cipher.
Tetsu Iwata
Kaoru Kurosawa
2002
conf/esorics
Bit-Slice Auction Circuit.
Kaoru Kurosawa
Wakaha Ogata
2002
conf/pkc
Linear Code Implies Public-Key Traitor Tracing.
Kaoru Kurosawa
Takuya Yoshida
2002
conf/pkc
Multi-recipient Public-Key Encryption with Shortened Ciphertext.
Kaoru Kurosawa
2002
conf/asiacrypt
Bounds for Robust Metering Schemes and Their Relationship with A-code.
Wakaha Ogata
Kaoru Kurosawa
2001
journals/joc
Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications.
Kaoru Kurosawa
Thomas Johansson
Douglas R. Stinson
2001
conf/fse
Round Security and Super-Pseudorandomness of MISTY Type Structure.
Tetsu Iwata
Tomonobu Yoshino
Tomohiro Yuasa
Kaoru Kurosawa
2001
conf/pkc
IND-CCA Public Key Schemes Equivalent to Factoring n=pq.
Kaoru Kurosawa
Wakaha Ogata
Toshihiko Matsuo
Shuichi Makishima
2001
conf/sacrypt
New Covering Radius of Reed-Muller Codes for t-Resilient Functions.
Tetsu Iwata
Takayuki Yoshiwara
Kaoru Kurosawa
2000
conf/fse
On the Pseudorandomness of the AES Finalists - RC6 and Serpent.
Tetsu Iwata
Kaoru Kurosawa
2000
conf/eurocrypt
How to Break a Practical MIX and Design a New One.
Yvo Desmedt
Kaoru Kurosawa
2000
conf/asiacrypt
Attack for Flash MIX.
Masashi Mitomo
Kaoru Kurosawa
2000
conf/asiacrypt
Provably Secure Metering Scheme.
Wakaha Ogata
Kaoru Kurosawa
2000
conf/sacrypt
Root Finding Interpolation Attack.
Kaoru Kurosawa
Tetsu Iwata
Quang Viet Duong
1999
journals/joc
On a Fallacious Bound for Authentication Codes.
Carlo Blundo
Alfredo De Santis
Kaoru Kurosawa
Wakaha Ogata
1999
conf/asiacrypt
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions.
Tetsu Iwata
Kaoru Kurosawa
1999
conf/asiacrypt
On Cryptographically Secure Vectorial Boolean Functions.
Takashi Satoh
Tetsu Iwata
Kaoru Kurosawa
1998
conf/acisp
A Comment on the Efficiency of Secret Sharing Scheme over Any Finite Abelian Group.
Yvo Desmedt
Brian King
Wataru Kishimoto
Kaoru Kurosawa
1998
conf/eurocrypt
Optimum Traitor Tracing and Asymmetric Schemes.
Kaoru Kurosawa
Yvo Desmedt
1998
conf/asiacrypt
Some Bounds and a Construction for Secure Broadcast Encryption.
Kaoru Kurosawa
Takuya Yoshida
Yvo Desmedt
Mike Burmester
1997
conf/acisp
Characterisation of (k, n) Multi-receiver Authentication.
Kaoru Kurosawa
Satoshi Obana
1997
conf/icics
Fault tolerant anonymous channel.
Wakaha Ogata
Kaoru Kurosawa
Kazue Sako
Kazunori Takatani
1997
conf/icics
A<sup>2</sup>-code = Affine resolvable = BIBD.
Satoshi Obana
Kaoru Kurosawa
1997
conf/eurocrypt
Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria.
Kaoru Kurosawa
Takashi Satoh
1997
conf/eurocrypt
Almost k-wise Independent Sample Spaces and Their Cryptologic Applications.
Kaoru Kurosawa
Thomas Johansson
Douglas R. Stinson
1996
conf/eurocrypt
Optimum Secret Sharing Scheme Secure against Cheating.
Wakaha Ogata
Kaoru Kurosawa
1996
conf/asiacrypt
Generalization of Higher Order SAC to Vector Output Boolean Functions.
Kaoru Kurosawa
Takashi Satoh
1995
conf/crypto
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes.
Kaoru Kurosawa
Satoshi Obana
Wakaha Ogata
1995
conf/eurocrypt
Combinatorial Bounds for Authentication Codes with Arbitration.
Kaoru Kurosawa
Satoshi Obana
1994
conf/crypto
New Bound on Authentication Code with Arbitration.
Kaoru Kurosawa
1994
conf/asiacrypt
Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes.
Koji Okada
Kaoru Kurosawa
1994
conf/asiacrypt
Low Exponent Attack against Elliptic Curve RSA.
Kaoru Kurosawa
Koji Okada
Shigeo Tsujii
1994
conf/asiacrypt
Security of the Center in Key Distribution Schemes.
Kaoru Kurosawa
Koji Okada
Keiichi Sakano
1994
conf/asiacrypt
Combinatorial Interpretation of Secret Sharing Schemes.
Kaoru Kurosawa
Koji Okada
1993
conf/eurocrypt
Efficient Anonymous Channel and All/Nothing Election Scheme.
Choonsik Park
Kazutomo Itoh
Kaoru Kurosawa
1993
conf/eurocrypt
Nonperfect Secret Sharing Schemes and Matroids.
Kaoru Kurosawa
Koji Okada
Keiichi Sakano
Wakaha Ogata
Shigeo Tsujii
1993
conf/eurocrypt
On Key Distribution and Authentication in Mobile Radio Networks.
Choonsik Park
Kaoru Kurosawa
Tatsuaki Okamoto
Shigeo Tsujii
1992
conf/asiacrypt
Privacy for Multi-Party Protocols.
Takashi Satoh
Kaoru Kurosawa
Shigeo Tsujii
1992
conf/asiacrypt
Nonperfect Secret Sharing Schemes.
Wakaha Ogata
Kaoru Kurosawa
Shigeo Tsujii
1991
conf/asiacrypt
On Claw Free Families.
Wakaha Ogata
Kaoru Kurosawa
1991
conf/asiacrypt
4 Move Perfect ZKIP of Knowledge with No Assumption.
Takeshi Saito
Kaoru Kurosawa
Kouichi Sakurai
1990
conf/crypto
Multi-Language Zero Knowledge Interactive Proof Systems.
Kaoru Kurosawa
Shigeo Tsujii
1990
conf/eurocrypt
General Public Key Residue Cryptosystems and Mental Poker Protocols.
Kaoru Kurosawa
Yutaka Katayama
Wakaha Ogata
Shigeo Tsujii
Coauthors
Akinaga Ueda
(3)
Alfredo De Santis
(1)
Arpita Patra
(1)
Ashish Choudhury
(1)
Brian King
(1)
Carlo Blundo
(1)
Choonsik Park
(2)
Dongvu Tonien
(1)
Douglas R. Stinson
(2)
Goichiro Hanaoka
(2)
Hayato Matsuhashi
(1)
Hayato Tada
(2)
Hideki Imai
(1)
Jia-Ch'ng Loh
(1)
Jun Furukawa
(1)
Kaoru Kurosawa
(106)
Katja Schmidt-Samoa
(2)
Kazue Sako
(1)
Kazuhiro Suzuki
(3)
Kazuki Yoneyama
(1)
Kazunori Takatani
(1)
Kazuo Ohta
(1)
Kazutomo Itoh
(1)
Keiichi Sakano
(2)
Keisuke Sasaki
(1)
Kiyohiko Ohta
(1)
Koji Nuida
(4)
Koji Okada
(5)
Koji Toyota
(1)
Kouichi Itoh
(1)
Kouichi Sakurai
(1)
Lan Nguyen
(1)
Le Trieu Phong
(6)
Masashi Mitomo
(1)
Masayuki Abe
(3)
Mike Burmester
(1)
Naoto Itakura
(1)
Noboru Kunihiro
(2)
Quang Viet Duong
(2)
Reihaneh Safavi-Naini
(1)
Reo Eriguchi
(2)
Rie Habuka
(1)
Rosario Gennaro
(3)
Ryo Nojima
(3)
Satoshi Obana
(4)
Shigeo Tsujii
(7)
Shuichi Makishima
(1)
Swee-Huay Heng
(7)
Syh-Yuan Tan
(1)
Takanori Daiza
(1)
Takashi Satoh
(4)
Takayuki Yoshiwara
(1)
Takeshi Koshiba
(1)
Takeshi Saito
(1)
Takuma Ueda
(1)
Takuya Yoshida
(2)
Tatsuaki Okamoto
(1)
Tetsu Iwata
(14)
Thomas Johansson
(2)
Tohru Yagi
(1)
Toi Tomita
(1)
Tomohiro Yuasa
(1)
Tomonobu Yoshino
(2)
Toshihiko Matsuo
(3)
Tri Van Le
(1)
Tsuyoshi Takagi
(3)
Victor Shoup
(2)
Wakaha Ogata
(16)
Wataru Kishimoto
(1)
Yang Cui
(1)
Yasuhiro Ohtaki
(2)
Yusuke Sakagami
(1)
Yusuke Sakai
(1)
Yutaka Katayama
(1)
Yvo Desmedt
(6)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to