Kaoru Kurosawa
Kaoru Kurosawa
Verified email at vc.ibaraki.ac.jp
Title
Cited by
Cited by
Year
Efficient anonymous channel and all/nothing election scheme
C Park, K Itoh, K Kurosawa
Workshop on the Theory and Application of of Cryptographic Techniques, 248-259, 1993
4361993
Omac: One-key cbc mac
T Iwata, K Kurosawa
International Workshop on Fast Software Encryption, 129-153, 2003
4042003
A new paradigm of hybrid encryption scheme
K Kurosawa, Y Desmedt
Annual International Cryptology Conference, 426-442, 2004
3882004
Optimum traitor tracing and asymmetric schemes
K Kurosawa, Y Desmedt
International Conference on the Theory and Applications of Cryptographic …, 1998
2581998
UC-secure searchable symmetric encryption
K Kurosawa, Y Ohtaki
International Conference on Financial Cryptography and Data Security, 285-298, 2012
2572012
Oblivious keyword search
W Ogata, K Kurosawa
Journal of complexity 20 (2-3), 356-371, 2004
2032004
Multi-recipient public-key encryption with shortened ciphertext
K Kurosawa
International Workshop on Public Key Cryptography, 48-63, 2002
1852002
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
M Abe, R Gennaro, K Kurosawa, V Shoup
Annual international conference on the theory and applications of …, 2005
1712005
A relationship between linear complexity and k-error linear complexity
K Kurosawa, F Sato, T Sakata, W Kishimoto
IEEE Transactions on Information Theory 46 (2), 694-698, 2000
1702000
How to break a practical MIX and design a new one
Y Desmedt, K Kurosawa
International Conference on the Theory and Applications of Cryptographic …, 2000
1692000
Fault tolerant anonymous channel
W Ogata, K Kurosawa, K Sako, K Takatani
International Conference on Information and Communications Security, 440-444, 1997
1631997
Tag-KEM/DEM: A new framework for hybrid encryption
M Abe, R Gennaro, K Kurosawa
Journal of Cryptology 21 (1), 97-130, 2008
1232008
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
International Conference on Information Security and Cryptology, 29-40, 2006
1122006
New eigamal type threshold digital signature scheme
C Park, K Kurosawa
IEICE transactions on fundamentals of electronics, communications and …, 1996
1051996
Tmac: Two-key cbc mac
K Kurosawa, T Iwata
Cryptographers’ Track at the RSA Conference, 33-49, 2003
1002003
From digital signature to ID-based identification/signature
K Kurosawa, SH Heng
International Workshop on Public Key Cryptography, 248-261, 2004
982004
Nonperfect secret sharing schemes and matroids
K Kurosawa, K Okada, K Sakano, W Ogata, S Tsujii
Workshop on the Theory and Application of of Cryptographic Techniques, 126-141, 1993
981993
How to update documents verifiably in searchable symmetric encryption
K Kurosawa, Y Ohtaki
International Conference on Cryptology and Network Security, 309-328, 2013
932013
Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption
G Hanaoka, K Kurosawa
International Conference on the Theory and Application of Cryptology and …, 2008
932008
Almost ideal contrast visual cryptography with reversing
DQ Viet, K Kurosawa
Cryptographers’ Track at the RSA Conference, 353-365, 2004
932004
The system can't perform the operation now. Try again later.
Articles 1–20