Follow
Kaoru Kurosawa
Kaoru Kurosawa
Verified email at vc.ibaraki.ac.jp
Title
Cited by
Cited by
Year
Omac: One-key cbc mac
T Iwata, K Kurosawa
Fast Software Encryption: 10th International Workshop, FSE 2003, Lund …, 2003
4832003
Efficient anonymous channel and all/nothing election scheme
C Park, K Itoh, K Kurosawa
Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application …, 1994
4671994
A new paradigm of hybrid encryption scheme
K Kurosawa, Y Desmedt
Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004
4272004
UC-secure searchable symmetric encryption
K Kurosawa, Y Ohtaki
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
3302012
Optimum traitor tracing and asymmetric schemes
K Kurosawa, Y Desmedt
International Conference on the Theory and Applications of Cryptographic …, 1998
2771998
Multi-recipient public-key encryption with shortened ciphertext
K Kurosawa
Public Key Cryptography: 5th International Workshop on Practice and Theory …, 2002
2302002
Oblivious keyword search
W Ogata, K Kurosawa
Journal of complexity 20 (2-3), 356-371, 2004
2192004
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
M Abe, R Gennaro, K Kurosawa, V Shoup
Annual international conference on the theory and applications of …, 2005
1932005
A relationship between linear complexity and k-error linear complexity
K Kurosawa, F Sato, T Sakata, W Kishimoto
IEEE Transactions on Information Theory 46 (2), 694-698, 2000
1742000
How to break a practical MIX and design a new one
Y Desmedt, K Kurosawa
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
1742000
Fault tolerant anonymous channel
W Ogata, K Kurosawa, K Sako, K Takatani
Information and Communications Security: First International Conference …, 1997
1741997
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
Information Security and Cryptology–ICISC 2006: 9th International Conference …, 2006
1452006
How to Update Documents Verifiably in Searchable Symmetric Encryption
K Kurosawa, Y Ohtaki
Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013
1302013
Tag-KEM/DEM: A new framework for hybrid encryption
M Abe, R Gennaro, K Kurosawa
Journal of Cryptology 21, 97-130, 2008
1292008
From digital signature to ID-based identification/signature
K Kurosawa, SH Heng
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
1222004
Tmac: Two-key cbc mac
K Kurosawa, T Iwata
Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003
1202003
New EIGamal type threshold digital signature scheme
C Park, K Kurosawa
IEICE transactions on fundamentals of electronics, communications and …, 1996
1111996
Nonperfect secret sharing schemes and matroids
K Kurosawa, K Okada, K Sakano, W Ogata, S Tsujii
Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application …, 1994
1101994
New combinatorial designs and their applications to authentication codes and secret sharing schemes
W Ogata, K Kurosawa, DR Stinson, H Saido
Discrete Mathematics 279 (1-3), 383-405, 2004
1092004
Optimum secret sharing scheme secure against cheating
W Ogata, K Kurosawa, DR Stinson
SIAM Journal on Discrete Mathematics 20 (1), 79-95, 2006
1062006
The system can't perform the operation now. Try again later.
Articles 1–20