Selected Publications of Kaoru Kurosawa (2005)


· Kaoru Kurosawa, Swee-Huay Heng,
     ”Identity-Based Identification Without Random Oracles",

ICCSA (2) 2005, pp.603-613 (2005)

 

·  Yvo Desmedt, Kaoru Kurosawa,
      ”Electronic Voting: Starting Over? ",

ISC 2005, pp.329-343 (2005)

 

· Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa,
    ”A Provably Secure and Effcient Verifiable Shuffle based on a Variant of the

Paillier Cryptosystem",

 J. UCS 11(6), pp.986-1010 (2005)

 

·  Kaoru KUROSAWA and Swee-Huay HENG,
       ”3-move Undeniable Signature Scheme",

   Eurocrypt'2005, pp. 181-197(2005)


·  Masayuki Abe and Rosario Gennaro and Kaoru Kurosawa and Victor Shoup,
      Tag-KEM/DEM: A New Framework for Hybrid Encryption

and A New Analysis of Kurosawa-Desmedt KEM",

   Eurocrypt'2005, pp. 128-146 (2005)

 

· Masayuki Abe, Rosario Gennaro and Kaoru Kurosawa
   
"Tag-KEM/DEM: A new framework for hybrid encryption",
   Technical Report

 

·  Kaoru KUROSAWA and Swee-Huay HENG,

       Identity-Based Identification Without Random Oracles",

    The full version of ISH '05 (accepted)


·  Tetsu IWATA and Kaoru KUROSAWA,
        ”How to enhance the security of the 3GPP confidentiality and integrity algorithms”,

   FSE’2005, pp. 268-283 (2005)

 

·  Wakaha Ogata, Kaoru Kurosawa and Swee-Huay Heng,
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
",

The full version of PKC’2005, pp.328-345  (2005)

 

·  Yasuhiro OHTAKI, Masaru KAMADA and Kaoru KUROSAWA,

        A Scheme for Partial Disclosure of Transaction Log”,

 IEICE, E88-A, [1], pp.222-229 (2005)

·  Tetsu IWATA and Kaoru KUROSAWA,
On the security of a MAC by Mitchell“,

IEICE, E88-A, [1], pp.25-32 (2005)

·  Kaoru KUROSAWA, Tetsu IWATA, and Quang Viet DUONG

        ” How to improve interpolation attack”,

IEICE, E88-A, [1], pp.9-15(2005)


[Kaoru Kurosawa's home page]  
kurosawa@mx.ibaraki.ac.jp