Omac: One-key cbc mac T Iwata, K Kurosawa Fast Software Encryption: 10th International Workshop, FSE 2003, Lund …, 2003 | 485 | 2003 |
Efficient anonymous channel and all/nothing election scheme C Park, K Itoh, K Kurosawa Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application …, 1994 | 467 | 1994 |
A new paradigm of hybrid encryption scheme K Kurosawa, Y Desmedt Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004 | 428 | 2004 |
UC-secure searchable symmetric encryption K Kurosawa, Y Ohtaki Financial Cryptography and Data Security: 16th International Conference, FC …, 2012 | 330 | 2012 |
Optimum traitor tracing and asymmetric schemes K Kurosawa, Y Desmedt International Conference on the Theory and Applications of Cryptographic …, 1998 | 277 | 1998 |
Multi-recipient public-key encryption with shortened ciphertext K Kurosawa Public Key Cryptography: 5th International Workshop on Practice and Theory …, 2002 | 230 | 2002 |
Oblivious keyword search W Ogata, K Kurosawa Journal of complexity 20 (2-3), 356-371, 2004 | 219 | 2004 |
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM M Abe, R Gennaro, K Kurosawa, V Shoup Annual international conference on the theory and applications of …, 2005 | 193 | 2005 |
A relationship between linear complexity and k-error linear complexity K Kurosawa, F Sato, T Sakata, W Kishimoto IEEE Transactions on Information Theory 46 (2), 694-698, 2000 | 174 | 2000 |
How to break a practical MIX and design a new one Y Desmedt, K Kurosawa Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000 | 174 | 2000 |
Fault tolerant anonymous channel W Ogata, K Kurosawa, K Sako, K Takatani Information and Communications Security: First International Conference …, 1997 | 174 | 1997 |
Birthday paradox for multi-collisions K Suzuki, D Tonien, K Kurosawa, K Toyota Information Security and Cryptology–ICISC 2006: 9th International Conference …, 2006 | 145 | 2006 |
How to Update Documents Verifiably in Searchable Symmetric Encryption K Kurosawa, Y Ohtaki Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013 | 130 | 2013 |
Tag-KEM/DEM: A new framework for hybrid encryption M Abe, R Gennaro, K Kurosawa Journal of Cryptology 21, 97-130, 2008 | 130 | 2008 |
From digital signature to ID-based identification/signature K Kurosawa, SH Heng Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004 | 122 | 2004 |
Tmac: Two-key cbc mac K Kurosawa, T Iwata Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003 | 120 | 2003 |
New EIGamal type threshold digital signature scheme C Park, K Kurosawa IEICE transactions on fundamentals of electronics, communications and …, 1996 | 112 | 1996 |
Nonperfect secret sharing schemes and matroids K Kurosawa, K Okada, K Sakano, W Ogata, S Tsujii Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application …, 1994 | 110 | 1994 |
New combinatorial designs and their applications to authentication codes and secret sharing schemes W Ogata, K Kurosawa, DR Stinson, H Saido Discrete Mathematics 279 (1-3), 383-405, 2004 | 109 | 2004 |
Optimum secret sharing scheme secure against cheating W Ogata, K Kurosawa, DR Stinson SIAM Journal on Discrete Mathematics 20 (1), 79-95, 2006 | 106 | 2006 |