#### Filter Results:

- Full text PDF available (125)

#### Publication Year

1986

2017

- This year (3)
- Last 5 years (25)
- Last 10 years (64)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Kaoru Kurosawa, Yvo Desmedt
- CRYPTO
- 2004

In this paper, we show that a key encapsulation mechanism (KEM) does not have to be IND-CCA secure in the construction of hybrid encryption schemes, as was previously believed. That is, we present a more efficient hybrid encryption scheme than Shoup [12] by using a KEM which is not necessarily IND-CCA secure. Nevertheless, our scheme is secure in the sense… (More)

- Choonsik Park, Kazutomo Itoh, Kaoru Kurosawa
- EUROCRYPT
- 1993

- Kaoru Kurosawa, Fumio Sato, Takahiro Sakata, Wataru Kishimoto
- IEEE Trans. Information Theory
- 2000

The k-error linear complexity of a periodic sequence of period N is deened as the smallest linear complexity that can be obtained by changing k or fewer bits of the sequence per period. This paper shows a relationship between the linear complexity and the minimum value k for which the k-error linear complexity is strictly less than the linear complexity.

- Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup
- EUROCRYPT
- 2005

- Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii
- EUROCRYPT
- 1993

This paper shows that nonperfect secret sharing schemes (NSS) have matroid structures and presents a direct link between the secret sharing matroids and entropy for both perfect and nonperfect schemes. We deene natural classes of NSS and derive a lower bound of jVij for those classes. \Ideal" nonperfect schemes are deened based on this lower bound. We prove… (More)

- Quang Viet Duong, Kaoru Kurosawa
- IACR Cryptology ePrint Archive
- 2004

- Tetsu Iwata, Kaoru Kurosawa
- ASIACRYPT
- 1999

We rst show that a Feistel type block cipher is broken if the round function is approximated by a low degree vectorial Boolean function. The proposed attack is a generalization of the higher order diierential attack to a probabilistic one. We next introduce a notion of higher order bent functions in order to prevent our attack. We then show their explicit… (More)

- Kaoru Kurosawa, Takashi Satoh
- EUROCRYPT
- 1997

A Boolean function f satisses PC(l) of order k if f(x) f(x) is balanced for any such that 1 W () l even if any k input bits are kept constant, where W () denotes the Hamming weight of. This paper shows the rst design method of such functions which provides deg(f) 3. More than that, we show how to design \balanced" such functions. High nonlinearity and large… (More)

- Kaoru Kurosawa, Yvo Desmedt
- EUROCRYPT
- 1998

A traceability scheme is a broadcast encryption scheme such that a data supplier T can trace malicious authorized users (traitors) who gave a decryption key to an unauthorized user (pirate). This paper rst derives lower bounds on the sizes of keys and ciphertexts. These bounds are all tight because an optimum one-time use scheme is also presented. We then… (More)

- Wakaha Ogata, Kaoru Kurosawa, Douglas R. Stinson
- SIAM J. Discrete Math.
- 1996

Tompa and Woll considered a problem of cheaters in (k; n) threshold secret sharing schemes. We rst derive a tight lower bound on the size of shares jVij for this problem: jVij (jSj 0 1)= + 1, where Vi denotes the set of shares of participant Pi, S denotes the set of secrets, and denotes the cheating probability. We next present an optimum scheme which meets… (More)