Cryptographers' World
 

Kouichi Sakurai


Author's Web Page Link

34 papers in database with 521 citations Star

H-number: 13

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Mike Burmester,  Yvo Desmedt,  Toshiya Itoh,  Kouichi Sakurai,  Hiroki Shizuya,  Divertible and Subliminal-Free Zero-Knowledge Proofs for Languages, Journal of Cryptology, Volume 12(3), pp. 197 - 223, Springer, 1999.

[Cited 5 times ]

2. Kouichi Sakurai,  Hiroki Shizuya,  A Structural Comparison of the Computational Difficulty of Breaking Discrete Log Cryptosystems, Journal of Cryptology, Volume 11(1), pp. 29 - 43, Springer, 1998.

[Cited 13 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Mridul Nandi,  Wonil Lee,  Kouichi Sakurai,  Sangjin Lee,  Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model, pp. 243 - 254, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 32 times ]

2. Yasuyuki Sakai,  Kouichi Sakurai,  A New Attack with Side Channel Leakage During Exponent Recoding Computations, pp. 298 - 311, CHES 2004.

[Electronic Edition][Cited 6 times ]

3. Satoshi Koga,  Kouichi Sakurai,  A Distributed Online Certificate Status Protocol with a Single Public Key, pp. 389 - 401, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 8 times ]

4. Jae-Gwi Choi,  Kouichi Sakurai,  Ji-Hwan Park,  Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party, pp. 265 - 279, ACNS 2003.

[Electronic Edition][Cited 44 times ]

5. Yasuyuki Sakai,  Kouichi Sakurai,  Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation, pp. 319 - 330, ACNS 2003.

[Electronic Edition][No citation]

6. Kenji Imamoto,  Kouichi Sakurai,  A Certified E-mail System with Receiver's Selective Usage of Delivery Authority, pp. 326 - 338, INDOCRYPT 2002.

[Electronic Edition][Cited 14 times ]

7. Katsuyuki Okeya,  Kouichi Sakurai,  Fast Multi-scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy Using Montgomery Trick, pp. 564 - 578, CHES 2002.

[Electronic Edition][Cited 12 times ]

8. Soichi Furuya,  Kouichi Sakurai,  Single-Path Authenticated-Encryption Scheme Based on Universal Hashing, pp. 94 - 109, SAC 2002.

[Electronic Edition][Cited 2 times ]

9. Kouichi Sakurai,  Tsuyoshi Takagi,  New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive, pp. 1 - 16, PKC 2002.

[Electronic Edition][Cited 18 times ]

10. Yasuyuki Sakai,  Kouichi Sakurai,  On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication, pp. 268 - 283, SAC 2001.

[Electronic Edition][Cited 5 times ]

11. Katsuyuki Okeya,  Kouichi Sakurai,  Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve, pp. 126 - 141, CHES 2001.

[Electronic Edition][Cited 34 times ]

12. Katsuyuki Okeya,  Kouichi Sakurai,  Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack, pp. 178 - 190, INDOCRYPT 2000.

[Electronic Edition][Cited 116 times Red StarRed Star]

13. Toro Inoue,  Kouichi Sakurai,  Making Hash Functions From Block Ciphers Secure and Efficient by Using Convolutional Codes, pp. 391 - 404, PKC 2000.

[Electronic Edition][Cited 1 times ]

14. Katsuyuki Okeya,  Hiroyuki Kurumatani,  Kouichi Sakurai,  Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications, pp. 238 - 257, PKC 2000.

[Electronic Edition][Cited 46 times ]

15. Shingo Miyazaki,  Ikuko Kuroda,  Kouichi Sakurai,  Toward Fair International Key Escrow, pp. 171 - 187, PKC 1999.

[Electronic Edition][Cited 1 times ]

16. Yasuyuki Sakai,  Kouichi Sakurai,  Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F, pp. 80 - 94, ASIACRYPT 1998.

[Electronic Edition][Cited 31 times ]

17. Shingo Miyazaki,  Kouichi Sakurai,  A More Efficient Untraceable E-Cash System with Partially Blind Signatures Based on the Discrete Logarithm Problem, pp. 296 - 308, FC 1998.

[Electronic Edition][Cited 13 times ]

18. Yasuyuki Sakai,  Kouichi Sakurai,  Hirokazu Ishizuka,  Secure Hyperelliptic Cryptosystems and Their Performances, pp. 164 - 181, PKC 1998.

[Electronic Edition][Cited 24 times ]

19. Michael W. David,  Kouichi Sakurai,  Security Issues for Contactless Smart Cards, pp. 247 - 252, PKC 1998.

[Electronic Edition][Cited 4 times ]

20. Kouichi Sakurai,  Soichi Furuya,  Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method, pp. 114 - 133, FSE 1997.

[Electronic Edition][Cited 7 times ]

21. Kouichi Sakurai,  A Hidden Cryptographic Assumption in No-Transferable Identification Schemes, pp. 159 - 172, ASIACRYPT 1996.

[Electronic Edition][Cited 1 times ]

22. Masahiro Mambo,  Kouichi Sakurai,  Eiji Okamoto,  How to Utilize the Transformability of Digital Signatures for Solving the Oracle Problem, pp. 322 - 333, ASIACRYPT 1996.

[Electronic Edition][Cited 6 times ]

23. Kouichi Sakurai,  Hiroki Shizuya,  Relationships Among the Computational Powers of Breaking Discrete Log Cryptosystems, pp. 341 - 355, EUROCRYPT 1995.

[Electronic Edition][Cited 18 times ]

24. Kouichi Sakurai,  Toshiya Itoh,  On Bit Correlations Among Preimages of "Many to One" One-Way Functions, pp. 435 - 446, ASIACRYPT 1992.

[Electronic Edition][Cited 2 times ]

25. Kouichi Sakurai,  Toshiya Itoh,  Subliminal Channels for Signature Transfer and Their Application to Signature Distribution Schemes, pp. 231 - 243, ASIACRYPT 1992.

[Electronic Edition][Cited 3 times ]

26. Tatsuaki Okamoto,  Kouichi Sakurai,  Hiroki Shizuya,  How Intractable Is the Discrete Logarithm for a General Finite Group?, pp. 420 - 428, EUROCRYPT 1992.

[Electronic Edition][Cited 1 times ]

27. Kouichi Sakurai,  Toshiya Itoh,  On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract), pp. 246 - 259, CRYPTO 1992.

[Electronic Edition][Cited 8 times ]

28. Takeshi Saito,  Kaoru Kurosawa,  Kouichi Sakurai,  4 Move Perfect ZKIP of Knowledge with No Assumption, pp. 321 - 330, ASIACRYPT 1991.

[Electronic Edition][Cited 6 times ]

29. Toshiya Itoh,  Kouichi Sakurai,  On the Complexity of Constant Round ZKIP of Possession of Knowledge, pp. 331 - 345, ASIACRYPT 1991.

[Electronic Edition][Cited 13 times ]

30. Toshiya Itoh,  Kouichi Sakurai,  Hiroki Shizuya,  Any Language in IP Has a Divertible ZKIP, pp. 382 - 396, ASIACRYPT 1991.

[Electronic Edition][Cited 11 times ]

31. Tatsuaki Okamoto,  Kouichi Sakurai,  Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems, pp. 267 - 278, CRYPTO 1991.

[Electronic Edition][Cited 8 times ]

32. Hiroki Shizuya,  Toshiya Itoh,  Kouichi Sakurai,  On the Complexity of Hyperelliptic Discrete Logarithm Problem, pp. 337 - 351, EUROCRYPT 1991.

[Electronic Edition][Cited 8 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...