Kaoru Kurosawa
Kaoru Kurosawa
Verified email at
Cited by
Cited by
Omac: One-key cbc mac
T Iwata, K Kurosawa
Fast Software Encryption: 10th International Workshop, FSE 2003, Lund …, 2003
Efficient anonymous channel and all/nothing election scheme
C Park, K Itoh, K Kurosawa
Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application …, 1994
A new paradigm of hybrid encryption scheme
K Kurosawa, Y Desmedt
Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004
UC-secure searchable symmetric encryption
K Kurosawa, Y Ohtaki
Financial Cryptography and Data Security: 16th International Conference, FC …, 2012
Optimum traitor tracing and asymmetric schemes
K Kurosawa, Y Desmedt
International Conference on the Theory and Applications of Cryptographic …, 1998
Multi-recipient public-key encryption with shortened ciphertext
K Kurosawa
Public Key Cryptography: 5th International Workshop on Practice and Theory …, 2002
Oblivious keyword search
W Ogata, K Kurosawa
Journal of complexity 20 (2-3), 356-371, 2004
Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM
M Abe, R Gennaro, K Kurosawa, V Shoup
Annual international conference on the theory and applications of …, 2005
How to break a practical MIX and design a new one
Y Desmedt, K Kurosawa
Advances in Cryptology—EUROCRYPT 2000: International Conference on the …, 2000
A relationship between linear complexity and k-error linear complexity
K Kurosawa, F Sato, T Sakata, W Kishimoto
IEEE Transactions on Information Theory 46 (2), 694-698, 2000
Fault tolerant anonymous channel
W Ogata, K Kurosawa, K Sako, K Takatani
Information and Communications Security: First International Conference …, 1997
Birthday paradox for multi-collisions
K Suzuki, D Tonien, K Kurosawa, K Toyota
Information Security and Cryptology–ICISC 2006: 9th International Conference …, 2006
Tag-KEM/DEM: A new framework for hybrid encryption
M Abe, R Gennaro, K Kurosawa
Journal of Cryptology 21, 97-130, 2008
How to Update Documents Verifiably in Searchable Symmetric Encryption
K Kurosawa, Y Ohtaki
Cryptology and Network Security: 12th International Conference, CANS 2013 …, 2013
From digital signature to ID-based identification/signature
K Kurosawa, SH Heng
Public Key Cryptography–PKC 2004: 7th International Workshop on Theory and …, 2004
Tmac: Two-key cbc mac
K Kurosawa, T Iwata
Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003
Nonperfect secret sharing schemes and matroids
K Kurosawa, K Okada, K Sakano, W Ogata, S Tsujii
Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application …, 1994
New eigamal type threshold digital signature scheme
C Park, K Kurosawa
IEICE transactions on fundamentals of electronics, communications and …, 1996
New combinatorial designs and their applications to authentication codes and secret sharing schemes
W Ogata, K Kurosawa, DR Stinson, H Saido
Discrete Mathematics 279 (1-3), 383-405, 2004
Optimum secret sharing scheme secure against cheating
W Ogata, K Kurosawa, DR Stinson
SIAM Journal on Discrete Mathematics 20 (1), 79-95, 2006
The system can't perform the operation now. Try again later.
Articles 1–20