Cryptographers' World
 

Kaoru Kurosawa


Author's Web Page Link

66 papers in database with 2014 citations StarStarStar

Editor of 1 conference proceedings book

H-number: 24

Conference Proceedings

 
1. Kaoru Kurosawa, editor, Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings. Springer, 2007. ISBN 3-540-76899-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Masayuki Abe,  Rosario Gennaro,  Kaoru Kurosawa,  Tag-KEM/DEM: A New Framework for Hybrid Encryption, Journal of Cryptology, Volume 21(1), pp. 97 - 130, Springer, 2008.

[Cited 76 times Red Star]

2. Kaoru Kurosawa,  Satoshi Obana,  Combinatorial Bounds on Authentication Codes with Arbitration, Designs, Codes and Cryptography, Volume 22(3), pp. 265 - 281, Springer, 2001.

[Electronic Edition][Cited 16 times ]

3. Satoshi Obana,  Kaoru Kurosawa,  Bounds and Combinatorial Structure of Multi-Receiver-Codes, Designs, Codes and Cryptography, Volume 22(1), pp. 47 - 63, Springer, 2001.

[Electronic Edition][No citation]

4. Kaoru Kurosawa,  Thomas Johansson,  Douglas R. Stinson,  Almost k-Wise Independent Sample Spaces and Their Cryptologic Applications, Journal of Cryptology, Volume 14(4), pp. 231 - 253, Springer, 2001.

[Cited 27 times ]

5. Satoshi Obana,  Kaoru Kurosawa,  Combinatorial Classification of Optimal Authentication Codes with Arbitration, Designs, Codes and Cryptography, Volume 20(3), pp. 281 - 305, Springer, 2000.

[Electronic Edition][Cited 1 times ]

6. Kaoru Kurosawa,  Wakaha Ogata,  Efficient Rabin-type Digital Signature Scheme, Designs, Codes and Cryptography, Volume 16(1), pp. 53 - 64, Springer, 1999.

[Electronic Edition][Cited 12 times ]

7. Carlo Blundo,  Alfredo De Santis,  Kaoru Kurosawa,  Wakaha Ogata,  On a Fallacious Bound for Authentication Codes, Journal of Cryptology, Volume 12(3), pp. 155 - 159, Springer, 1999.

[Cited 5 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Kaoru Kurosawa,  Ryo Nojima,  Simple Adaptive Oblivious Transfer without Random Oracle, pp. 334 - 346, ASIACRYPT 2009.

[Electronic Edition][Cited 4 times ]

2. Goichiro Hanaoka,  Kaoru Kurosawa,  Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption, pp. 308 - 325, ASIACRYPT 2008.

[Electronic Edition][Cited 31 times ]

3. Kaoru Kurosawa,  Kazuhiro Suzuki,  Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme, pp. 324 - 340, EUROCRYPT 2008.

[Electronic Edition][Cited 27 times ]

4. Kouichi Itoh,  Noboru Kunihiro,  Kaoru Kurosawa,  Small Secret Key Attack on a Variant of RSA (Due to Takagi), pp. 387 - 406, CT-RSA 2008.

[Electronic Edition][Cited 4 times ]

5. Noboru Kunihiro,  Kaoru Kurosawa,  Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA, pp. 412 - 425, PKC 2007.

[Electronic Edition][Cited 5 times ]

6. Kaoru Kurosawa,  Swee-Huay Heng,  The Power of Identification Schemes, pp. 364 - 377, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 14 times ]

7. Kaoru Kurosawa,  Katja Schmidt-Samoa,  New Online/Offline Signature Schemes Without Random Oracles, pp. 330 - 346, PKC 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

8. Kaoru Kurosawa,  Tsuyoshi Takagi,  New Approach for Selectively Convertible Undeniable Signature Schemes, pp. 428 - 443, ASIACRYPT 2006.

[Electronic Edition][Cited 15 times ]

9. Masayuki Abe,  Rosario Gennaro,  Kaoru Kurosawa,  Victor Shoup,  Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM, pp. 128 - 146, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 106 times Red StarRed Star]

10. Kaoru Kurosawa,  Swee-Huay Heng,  3-Move Undeniable Signature Scheme, pp. 181 - 197, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 33 times ]

11. Tetsu Iwata,  Kaoru Kurosawa,  How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms, pp. 268 - 283, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

12. Wakaha Ogata,  Kaoru Kurosawa,  Swee-Huay Heng,  The Security of the FDH Variant of Chaum's Undeniable Signature Scheme, pp. 328 - 345, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 38 times ]

13. Kaoru Kurosawa,  Yvo Desmedt,  A New Paradigm of Hybrid Encryption Scheme, pp. 426 - 442, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 167 times Red StarRed Star]

14. Lan Nguyen,  Reihaneh Safavi-Naini,  Kaoru Kurosawa,  Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security, pp. 61 - 75, ACNS 2004.

[Electronic Edition][Cited 31 times ]

15. Kaoru Kurosawa,  Swee-Huay Heng,  From Digital Signature to ID-based Identification/Signature, pp. 248 - 261, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 31 times ]

16. Takeshi Koshiba,  Kaoru Kurosawa,  Short Exponent Diffie-Hellman Problems, pp. 173 - 186, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

17. Quang Viet Duong,  Kaoru Kurosawa,  Almost Ideal Contrast Visual Cryptography with Reversing, pp. 353 - 365, CT-RSA 2004.

[Electronic Edition][Cited 30 times ]

18. Swee-Huay Heng,  Kaoru Kurosawa,  k-Resilient Identity-Based Encryption in the Standard Model, pp. 67 - 80, CT-RSA 2004.

[Electronic Edition][Cited 9 times ]

19. Tetsu Iwata,  Kaoru Kurosawa,  Stronger Security Bounds for OMAC, TMAC, and XCBC, pp. 402 - 415, INDOCRYPT 2003.

[Electronic Edition][Cited 15 times ]

20. Kaoru Kurosawa,  Tsuyoshi Takagi,  Some RSA-Based Encryption Schemes with Tight Security Reduction, pp. 19 - 36, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

21. Kaoru Kurosawa,  Katja Schmidt-Samoa,  Tsuyoshi Takagi,  A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems, pp. 474 - 491, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 4 times ]

22. Kaoru Kurosawa,  Tetsu Iwata,  TMAC: Two-Key CBC MAC, pp. 33 - 49, CT-RSA 2003.

[Electronic Edition][Cited 49 times ]

23. Tetsu Iwata,  Kaoru Kurosawa,  OMAC: One-Key CBC MAC, pp. 129 - 153, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 134 times Red StarRed Star]

24. Wakaha Ogata,  Kaoru Kurosawa,  Bounds for Robust Metering Schemes and Their Relationship with A^2-code, pp. 64 - 80, ASIACRYPT 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 3 times ]

25. Kaoru Kurosawa,  Multi-recipient Public-Key Encryption with Shortened Ciphertext, pp. 48 - 63, PKC 2002.

[Electronic Edition][Cited 51 times Red Star]

26. Kaoru Kurosawa,  Takuya Yoshida,  Linear Code Implies Public-Key Traitor Tracing, pp. 172 - 187, PKC 2002.

[Electronic Edition][Cited 35 times ]

27. Tetsu Iwata,  Tomonobu Yoshino,  Kaoru Kurosawa,  Non-cryptographic Primitive for Pseudorandom Permutation, pp. 149 - 163, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

28. Tetsu Iwata,  Takayuki Yoshiwara,  Kaoru Kurosawa,  New Covering Radius of Reed-Muller Codes for t-Resilient Functions, pp. 75 - 86, SAC 2001.

[Electronic Edition][Cited 17 times ]

29. Tetsu Iwata,  Tomonobu Yoshino,  Tomohiro Yuasa,  Kaoru Kurosawa,  Round Security and Super-Pseudorandomness of MISTY Type Structure, pp. 233 - 247, FSE 2001.

[Electronic Edition][Cited 20 times ]

30. Kaoru Kurosawa,  Wakaha Ogata,  Toshihiki Matsuo,  Shuichi Makishima,  IND-CCA Public Key Schemes Equivalent to Factoring n=pq, pp. 36 - 47, PKC 2001.

[Electronic Edition][Cited 7 times ]

31. Masashi Mitomo,  Kaoru Kurosawa,  Attack for Flash MIX, pp. 192 - 204, ASIACRYPT 2000.

[Electronic Edition][Cited 62 times Red Star]

32. Wakaha Ogata,  Kaoru Kurosawa,  Provably Secure Metering Scheme, pp. 388 - 398, ASIACRYPT 2000.

[Electronic Edition][Cited 31 times ]

33. Kaoru Kurosawa,  Tetsu Iwata,  Quang Viet Duong,  Root Finding Interpolation Attack, pp. 303 - 314, SAC 2000.

[Electronic Edition][Cited 4 times ]

34. Yvo Desmedt,  Kaoru Kurosawa,  How to Break a Practical MIX and Design a New One, pp. 557 - 572, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 101 times Red StarRed Star]

35. Tetsu Iwata,  Kaoru Kurosawa,  On the Pseudorandomness of the AES Finalists - RC6 and Serpent, pp. 231 - 243, FSE 2000.

[Electronic Edition][Cited 15 times ]

36. Takashi Satoh,  Tetsu Iwata,  Kaoru Kurosawa,  On Cryptographically Secure Vectorial Boolean Functions, pp. 20 - 28, ASIACRYPT 1999.

[Electronic Edition][Cited 12 times ]

37. Tetsu Iwata,  Kaoru Kurosawa,  Probabilistic Higher Order Differential Attack and Higher Order Bent Functions, pp. 62 - 74, ASIACRYPT 1999.

[Electronic Edition][Cited 22 times ]

38. Kaoru Kurosawa,  Takuya Yoshida,  Yvo Desmedt,  Mike Burmester,  Some Bounds and a Construction for Secure Broadcast Encryption, pp. 420 - 433, ASIACRYPT 1998.

[Electronic Edition][Cited 21 times ]

39. Kaoru Kurosawa,  Yvo Desmedt,  Optimum Traitor Tracing and Asymmetric Schemes, pp. 145 - 157, EUROCRYPT 1998.

[Electronic Edition][Cited 161 times Red StarRed Star]

40. Kaoru Kurosawa,  Thomas Johansson,  Douglas R. Stinson,  Almost k-wise Independent Sample Spaces and Their Cryptologic Applications, pp. 409 - 421, EUROCRYPT 1997.

[Electronic Edition][Cited 32 times ]

41. Kaoru Kurosawa,  Takashi Satoh,  Design of SAC/PC(l) of Order k Boolean Functions and Three Other Cryptographic Criteria, pp. 434 - 449, EUROCRYPT 1997.

[Electronic Edition][Cited 40 times ]

42. Kaoru Kurosawa,  Takashi Satoh,  Generalization of Higher Order SAC to Vector Output Boolean Functions, pp. 218 - 231, ASIACRYPT 1996.

[Electronic Edition][Cited 9 times ]

43. Wakaha Ogata,  Kaoru Kurosawa,  Optimum Secret Sharing Scheme Secure against Cheating, pp. 200 - 211, EUROCRYPT 1996.

[Electronic Edition][Cited 22 times ]

44. Kaoru Kurosawa,  Satoshi Obana,  Wakaha Ogata,  t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes, pp. 410 - 423, CRYPTO 1995.

[Electronic Edition][Cited 16 times ]

45. Kaoru Kurosawa,  Satoshi Obana,  Combinatorial Bounds for Authentication Codes with Arbitration, pp. 289 - 300, EUROCRYPT 1995.

[Electronic Edition][Cited 24 times ]

46. Kaoru Kurosawa,  Koji Okada,  Keiichi Sakano,  Security of the Center in Key Distribution Schemes, pp. 333 - 341, ASIACRYPT 1994.

[Electronic Edition][Cited 8 times ]

47. Kaoru Kurosawa,  Koji Okada,  Shigeo Tsujii,  Low Exponent Attack against Elliptic Curve RSA, pp. 376 - 383, ASIACRYPT 1994.

[Electronic Edition][Cited 24 times ]

48. Koji Okada,  Kaoru Kurosawa,  Lower Bound on the Size of Shares of Nonperfect Secret Sharing Schemes, pp. 33 - 41, ASIACRYPT 1994.

[Electronic Edition][Cited 14 times ]

49. Kaoru Kurosawa,  Koji Okada,  Combinatorial Interpretation of Secret Sharing Schemes, pp. 55 - 64, ASIACRYPT 1994.

[Electronic Edition][Cited 8 times ]

50. Kaoru Kurosawa,  New Bound on Authentication Code with Arbitration, pp. 140 - 149, CRYPTO 1994.

[Electronic Edition][Cited 21 times ]

51. Choonsik Park,  Kazutomo Itoh,  Kaoru Kurosawa,  Efficient Anonymous Channel and All/Nothing Election Scheme, pp. 248 - 259, EUROCRYPT 1993.

[Electronic Edition][Cited 191 times Red StarRed Star]

52. Kaoru Kurosawa,  Koji Okada,  Keiichi Sakano,  Wakaha Ogata,  Shigeo Tsujii,  Nonperfect Secret Sharing Schemes and Matroids, pp. 126 - 141, EUROCRYPT 1993.

[Electronic Edition][Cited 49 times ]

53. Choonsik Park,  Kaoru Kurosawa,  Tatsuaki Okamoto,  Shigeo Tsujii,  On Key Distribution and Authentication in Mobile Radio Networks, pp. 461 - 465, EUROCRYPT 1993.

[Electronic Edition][Cited 46 times ]

54. Wakaha Ogata,  Kaoru Kurosawa,  Shigeo Tsujii,  Nonperfect Secret Sharing Schemes, pp. 56 - 66, ASIACRYPT 1992.

[Electronic Edition][Cited 14 times ]

55. Takashi Satoh,  Kaoru Kurosawa,  Shigeo Tsujii,  Privacy for Multi-Party Protocols, pp. 252 - 260, ASIACRYPT 1992.

[Electronic Edition][No citation]

56. Wakaha Ogata,  Kaoru Kurosawa,  On Claw Free Families, pp. 111 - 123, ASIACRYPT 1991.

[Electronic Edition][Cited 6 times ]

57. Takeshi Saito,  Kaoru Kurosawa,  Kouichi Sakurai,  4 Move Perfect ZKIP of Knowledge with No Assumption, pp. 321 - 330, ASIACRYPT 1991.

[Electronic Edition][Cited 6 times ]

58. Kaoru Kurosawa,  Yutaka Katayama,  Wakaha Ogata,  Shigeo Tsujii,  General Public Key Residue Cryptosystems and Mental Poker Protocols, pp. 374 - 388, EUROCRYPT 1990.

[Electronic Edition][Cited 18 times ]

59. Kaoru Kurosawa,  Shigeo Tsujii,  Multi-Language Zero Knowledge Interactive Proof Systems, pp. 339 - 352, CRYPTO 1990.

[Electronic Edition][Cited 3 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...