Zhang Zhongqiang,Junpei Kawamoto,Kouichi Sakurai, Recover the missing data by using Functional Data Analysis for detecting the illegal players of online game SCIS2016
Zhongqiang Zhang, Hiroaki Anada, Junpei Kawamoto, Kouichi Sakurai, Detection of Illegal Players in Massively Multiplayer Online Role Playing Game by Classification Algorithms AINA2015
Shinichi Matsumoto, Kouichi Sakurai, A Proposal for the Privacy Leakage Verification Tool for Android Application Developers International Journal of Advanced Computer Science, Vol 4, No 1 (2014)
Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, Efficient Variant of Rainbow without Triangular Matrix Representation ICT-EurAsia 2014
Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai, Implementation of Efficient Operations over GF(232) Using Graphics Processing Units ICT-EurAsia 2014
Motoki Kitahara, Junpei Kawamoto, Kouichi Sakurai, A Method of Digital Rights Management based on Bitcoin Protocol The 8th International Conference on Ubiquitous Information Management and Communication(IMCOM)
Junpei Kawamoto and Patricia L. Gillett, Frequency-based Constraint Relaxation for Private Query Processing in Cloud Databases the 27th Annual IEEE Canadian Conference on Electrical and Computer Engineering
Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai, Efficient Implementation for QUAD Stream Cipher with GPUs Computer Science and Information Systems. Volume 10, Issue 2, Special Issue on Advances on Mobile Collaborative Systems
Rimba Whidiana Ciptasari and Kouichi SAKURAI, Exploiting Reference Images In Exposing Geometrical Distortions International Journal of Multimedia and Its Application, AIRCC, Vol.5, No.3, DOI: 10.5121/ijma.2013.5301, June 2013
Rimba Whidiana Ciptasari, Kyung Hyune Rhee, and Kouichi Sakurai, Exploiting Reference Images for Image Splicing Verification Digital Investigation: International Journal of Digital Forensics & Incident Response, Elsevier, DOI:10.1016/j.diin.2013.06.014, July 2013.
Takanori Suga, Takashi Nishide, Kouichi Sakurai, Character-based symmetric searchable encryption and its implementation and experiment on mobile devices Security and Communication Networks, Sep., 2013
Satoshi Tanaka, Takanori Yasuda, Bo-Yin Yang, Chen-Mou Cheng, Kouichi Sakurai, Efficient Computing over $GF({2}^{16})$ using Graphics Processing Unit Seventh International Workshop on Advances in Information Security
Motoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai, Upper Bound of the Length of Efficiently Embeddable Information in RSA Modulus 2013 ACM Asia Public-Key Cryptography Workshop (AISAPKC 2013)
Rimba Whidiana Ciptasari, Kyung Hyune Rhee, and Kouichi Sakurai, Image Splicing Verification based on Pixel-based Alignment Method Proceedings of International Workshop on Digital-forensics and Watermarking (IWDW) LNCS 7809 pp. 198-212, Springer, Heidelberg
Kazumasa Yamauchi, Yoshiaki Hori, Kouichi Sakurai, Detecting HTTP-based Botnet based on Characteristic of the C&C session using by SVM The 8th Asia Joint Conference in Information Security(AsiaJCIS2013),July 2013
Yuuki Nishimoto, Naoya Kajiwara, Shinichi Matsumoto, Yoshiaki Hori, Kouichi Sakurai, Detection of Android API Call Using Logging Mechanism within Android Framework Proceedings of 4th International Workshop on Applications and Techniques in Information Security (ATIS), (12pages), September 2013
田中哲士, 安田貴徳, 櫻井幸一, Implementation of Efficient Operations over GF$({2}^{32})$ Using Graphics Processing Units The 8th International Workshop on Security
田中哲士, Bo-Yin Yang, Chen-Mou Cheng, 櫻井幸一, Accelerating of Solving Method for Non-linear Multivariate System with Graphics Processing Unit 第66回電気関係学会九州支部連合大会
田中哲士, 安田貴徳, 櫻井幸一, Implementation of Efficient Operations over $GF({2}^{32})$ using Graphics Processing Unit コンピュータセキュリティシンポジウム2013
Satoshi Tanaka, Takanori Yasuda, Kouichi Sakurai, Toward Calculating Multiplications over Large Finite Field The Sixth Workshop among Asian Information Security Labs (WAIS 2013)
Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai, Efficient Computation Method of Multivariate Quadratic Polynomial Systems for Cryptography on Graphics Processing Unit 2013 International Symposium on Information Science and Electrical Engineering
田中哲士, Bo-Yin Yang, Chen-Mou Cheng, 櫻井幸一, Efficient Solving of Multivariate Quadratic Polynomial System using GPU 安全・安心社会基盤構築のための代数構造 ?サイバー社会の信頼性確保のための数理学?
田中哲士, 安田貴徳, 櫻井幸一, Efficient Implementation of Multiplication on Extension Field Using GPU 安全・安心社会基盤構築のための代数構造 ?サイバー社会の信頼性確保のための数理学?
田中哲士, Solving Multivariate Quadratic Polynomial System by XL Algorithm on GPU ワークショップ 耐量子暗号とその周辺
Rimba Whidiana Ciptasari and Kouichi SAKURAI, Multimedia Copyright Protection Scheme based on the Direct Feature-based Method A book chapter in Kazuhiro Kondo (Eds.) Multimedia Information Hiding Technologies and Methodologies for Controlling Data, ch.19, pp.413?440, IGI Global
Na Ruan, Yizhi Ren, Yoshiaki Hori and Kouchi Sakurai, Analytic Hierarchy Process aided Key Management Schemes Evaluation in Wireless Sensor Network Journal of Networks, Vol. 7, No.1, Jan 2012
Na Ruan, Takashi Nishide, Yoshiaki Hori, Elliptic Curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs Journal of Information Processing, Vol.20, No.4, pp. 846-853, IPSJ
Laiping Zhao, Kouichi Sakurai, On Revenue Driven Server Management in Cloud The 2nd International Conference on Cloud computing and service science (CLOSER2012), Porto, Portugal, April, 2012.
趙亮、西出隆志、櫻井幸一, Differential Fault Analysis of Full LBlock 3rd international workshop on constructive side-channel analysis and secure design (COSADE2012), LNCS, Springer-Verlag
Jingyu Hua, Kouichi Sakurai, Barrier: A Lightweight Hypervisor For Protecting Kernel Integrity via Memory Isolation Proceeding of the 27th ACM Symposium On Applied Computing, Computer Security Track (SAC @ SEC 2012), ACM Press, Riva del Garda, Italy, 2012
Yoshiaki Hori, Takashi Nishide, Kouichi Sakurai, Towards Countermeasure Against Insider Threat on Network Security 3rd International Workshop on Managing Insider Security Threats (MIST), IEEE Computer Society, pp.634--636, Dec., 2011.
Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai, Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs Sixth International Workshop on Advances in Information Security(WAIS 2012)
Satoshi Tanaka, Tung Chou, Bo - Yin Yang, Chen - Mou Cheng, Kouichi Sakurai, Efficient Parallel Evaluation of Multivariate Quadratic Polynomials on GPUs The 13th International Workshop on Information Security Applications(WISA 2012)
Motoki Kitahara, Takashi Nishide, Kouichi Sakurai, A Method for Embedding Secret Key Information in RSA Public Key and Its Application Sixth International Workshop on Advances in Information Security
Rimba Whidiana Ciptasari, Kyung Hyune Rhee, and Kouichi Sakurai, An Image Splicing Detection based on Interpolation Analysis Proceedings of the 13th Pacific-Rim Conference on Multimedia (PCM), LNCS 7674, pp.390-401, Springer, Heidelberg.
Munkhbaatar Doyoddorj, Youngho Park, Kouichi Sakurai, Kyung-Hyune Rhee, Reversible Data Hiding with Large Capacity Based on the Differences of Center Pixels The Institute of Electronics, Information and Communication Engineers
趙亮、西出隆志、櫻井幸一, Differential Fault Analysis on LBlock with Non-uniform Differential Distribution 暗号と情報セキュリティシンポジウム(SCIS), 8 pages, 1月, 2012, 金沢
Agbefu Ralph Edem, Yoshiaki Hori, Kouichi Sakurai, Detection of drive by download based on URL and domain information Hinokuni
Agbefu Ralph Edem, Yoshiaki Hori, Kouichi Sakurai, Detection of drive by download based on URL and domain information Hinokuni
Motoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai, Efficiency of embedding information in RSA public key Forum "Math-for-industry" 2012
Motoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai, Efficiency of embedding information in RSA public key International Workshop on Security2012
菅 孝徳,西出 隆志,櫻井 幸一, Keyword Search with Specified Character Positions over Encrypted Data WAIS2012
Satoru Akimoto, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai, A Study of Collaborative Behavior Detection and Investigating Change of Attack using 3D-visualization with Observation of the Darknet Traffic
Na Ruan, Yoshiaki Hori, DoS attack-tolerant TESLA-based broadcast authentication protocol in Internet of Things Proceedings of the 2012 International Conference on Selected Topics in Mobile and Wireless Networking (iCOST2012), IEEE
Laiping Zhao, Kouichi Sakurai, Workflow Scheduling with Fault Tolerance Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications, IGI Global
Jingyu Hua, Mingchu Li, Yizhi Ren, Kouichi, Sakurai, Efficient Context-Sensitive Intrusion Detection Based on State Transition Table IEICE Trans. Fundamentals. VOL.E94-A, NO.1, pp.255-264, Januray, 2011
Atsufumi Moriyama, Hiroshi Ishinishi, Katsuichi Nakamura, Yoshiaki Hori, Precondition of A Routing Algorithm Dealing with Multiple Security Metrics IEICE Transactions on Communications, Vol. E94-B, No. 6, pp. 1625-1629, June 2011
Liang Zhao, Avishek Adhikari, Di Xiao, Kouichi Sakurai, On the security analysis of an image scrambling encryption of pixel bit and its improved scheme based on self-correlation encryption Communications in Nonlinear Science and Numerical Simulation
Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai, Flexible Service Selection with User-specific QoS Support in Service-Oriented Architecture Journal of Network and Computer Applications
Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai, Design and Implementation of a Forced Encryption Kernel Module 5th International Workshop on Advances in Information Security (WAIS), Seoul, Korea, June 30--July 2, 2011, pp.663--667, 2011, doi:10.1109/IMIS.2011.68.
Fangming ZHAO, Takashi NISHIIDE and Kouichi SAKURAI , Realizing Fine-grained and Flexible Access Control to Outsourced Data with Attribute-based Cryptosystems The 7th Information Security Practice and Experience Conference(ISPEC), May, 2011.
Peng Gao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai, Integrity for the In-flight Webpage Based on A Fragile Watermarking Chain Scheme The 5th International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2011), Feb., 2011
Liang Zhao, Avishek Adhikari, Di Xiao and Kouichi Sakurai, Security Improvement of a Pixel Bit Based Image Scrambling Encryption Scheme Through the Self-correlation Method The 6th China International Conference on Information Security and Cryptology (Inscrypt 2010), Science press of China, Shanghai, China, Oct., 2011, p.: 88-102
Laiping Zhao, Yizhi Ren, Kouichi Sakurai, A Resource Minimizing Scheduling Algorithm with Ensuring the Deadline and Reliability in Heterogeneous Systems The 25th International Conference on Advanced Information Networking and Applications (AINA-2011), Biopolis, Singapore, March 22 - 25, 2011.
Ruan Na, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai, A Generic Evaluation Method for Key Management Schemes in Wireless Sensor Network Proceedings of The 5th International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC2011), pp. 55:1--55:9, Seoul, Korea, Feb. 21-23, 2011
Yoshiro Fukushima, Yoshiaki Hori, Kouichi Sakurai, Proactive Blacklisting for Malicious Web Sites by Reputation Evaluation Based on Domain and IP Address Registration Proceedings of The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), pp. 352-361, Changsha, China, November 16-18, 2011
Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai, Performance Analysis of Key Management Schemes in Wireless Sensor Network Using Analytic Hierarchy Process Proceedings of The Second International Symposium on Mobile and Wireless Network Security (MWNS2011), pp.1739-1744, Changsha, China, November 16-18, 2011
Na Ruan, Takashi Nishide and Yoshiaki Hori, Threshold ElGamalbased Key Management scheme for distributed RSUs in VANET Proceedings of IEEE sponsored Intl Conf. on Selected Topics in Mobile & Wireless Networking (iCOST 2011), pp.128-133, 10-12 October 2011, Shanghai, China.
Fangming ZHAO, Takashi NISHIDE and Kouichi SAKURAI, Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control The 14th Annual International Conference on Information Security and Cryptology (ICISC), LNCS, Springer-Verlag, 2011
Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung-Hyune Rhee and Kouichi Sakurai, Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model Inscrypt2011
Chul Sur, Youngho Park, Takashi Nishide,Kouichi Sakurai, Kyung Hyune Rhee, Securing Location-Aware Services Based on Online/Offline Signatures in VANETs LNCS 6908, pp. 271?285, 2011.
Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Hiroshi Yoshiura, Batching Multiple Protocols to Improve Efficiency of Multi-party Computation 7th China International Conference on Information Security and Cryptology (Inscrypt’11), LNCS xxxx, pp.xx--xx, Springer-Verlag, Dec., 2011
Jingyu Hua, Kouichi Sakurai, A SMS-Based Mobile Botnet Using Flooding Algorithm Proceeding of the 5th Workshop in Information Security and Privacy (WISTP11), Springer LNCS 6633, pp. 264-279, Greece, June, 2011
Rimba Whidiana, Aulia Fajar, Fazmah Arif Yulianto, Kouichi Sakurai, An Efficient Key Generation Method In Audio Zero-Watermarking The Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2011), October 14-16, 2010, Dalian, China
Takashi Nishide, Kouichi Sakurai, Security of Offline Anonymous Electronic Cash Systems Against Insider Attacks By Untrusted Authorities Revisited 3rd International Workshop on Managing Insider Security Threats (MIST), IEEE Computer Society, pp.656--661, Dec., 2011.
Amril Syalim, Takashi Nishide, Kouichi Sakurai, Realizing Proxy Re-encryption in the Symmetric World The International Conference on Informatics Engineering & Information Science (ICIEIS), Malaysia, Nov.14--16, CCIS 251, pp.259--274, Springer-Verlag, 2011.
Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura, Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols 12th International Workshop on Information Security Applications (WISA’11), Jeju Island, Korea, August 22--24, 2011, LNCS 7115, pp.187--202, Springer-Verlag, 2011
Takashi Nishide, Shinichi Yoshinaga, Rishiraj Bhattacharyya, Mridul Nandi, Bimal Roy, and Kouichi Sakurai, New Multiple Encryption for Making Double Encryption Secure against Meet-in-the-Middle and Related-Key Attacks 12th International Workshop on Information Security Applications (WISA’11), Jeju Island, Korea, August 22-24, 2011
Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi, Anonymous Encryption with Partial-Order Subset Delegation Functionality 5th International Conference on Provable Security (ProvSec), Xi’an, China, October 16--18, 2011, LNCS 6980, pp.154--169, Springer-Verlag, 2011.
Seiichiro Mizoguchi, Keisuke Takemori, Yutaka Miyake, Yoshiaki Hori, Kouichi Sakurai, Traceback Framework against Botmaster by Sharing Network Traffic Information In proceedings of the Fifth international Workshop on Advances in Information Security (WAIS2011)
Fangming ZHAO, Takashi NISHIIDE and Kouichi SAKURAI , "Achieving Fine-grained and Flexible Access Control to Outsourced Data with Attribute-based Cryptosystems ", 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 1月, 2011.
Peng Gao, Seiichiro Mizoguchi, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai, "Enforcing Integrity Protection in WebPage Based on A Fragile Watermarking Chain Scheme", The 2011 Symposium on Cryptography and Information Security (SCIS2011), January
Aulia Fajar, Fazmah Arif Yulianto, Rimba Whidiana Ciptasari, Kouichi Sakurai, "An Efficient Key Generation Method in Zero-Watermarking for Audio", The 2011 Symposium on Cryptography and Information Security (SCIS), 5 pages, Jan, 2011
HAO Dong, SAKURAI Kouichi, "A Game Theoretical Analysis on Selective Forwarding Attacks in Mobile Ad Hoc Networks", 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 1月, 2011
Xiaojuan Liao, Dong Hao, Kouichi Sakurai, "A taxonomy of game theoretic approaches against attacks in wireless ad hoc networks", 暗号と情報セキュリティシンポジウム(SCIS), 8 pages, 1月, 2011
黄栄 櫻井幸一, "A Robust Digital Image Encryption Method based on Compressive Sensing", 暗号と情報セキュリティシンポジウム(SCIS), 8 pages, 1月,2011
Laiping Zhao, Kouichi Sakurai, "A Study on Recovery in Dynamic Scheduling for Heterogeneous Systems", The 4th Annual Meeting of Asian Association for Algorithms and Computation, accepted
Na Ruan, Takashi Nishide and Yoshiaki Hori, "A key management scheme against compromised RSU in VANET", The 64th Joint Conference of Electrical and Electronics Engineers in Kyushu (JCEEE 64th), 26- 27 September 2011, Saga, Japan.
Fangming ZHAO, Takashi NISHIDE and Kouichi SAKURAI, "Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control", In proceeding of the Computer Security Symposiu (CSS2011), October 2011.
西出隆志, 宮本大輔, 須崎有康, 吉岡克成, "Network and Distributed System Security Symposium 2011 参加報告", 第53回コンピュータセキュリティ研究発表会(CSEC), 6pages, 福岡, 5月, 2011.
Seiichiro Mizoguchi, Yoshiaki Hori, and Kouichi Sakurai, "Entropy based Network Behavior Characterization and Bot Detection", International Workshop on Security (IWSEC2011)
Yizhi Ren, Mingchu Li ,Kouichi Sakurai, "FineTrust: A Fine-grained Trust Model for P2P Networks", Wiley's Security and Communication Networks Journal, Volume 4, Issue 1, pp.61–69
Ilsun YOU, Jong-Hyouk LEE, Kouichi SAKURAI, Yoshiaki HORI, "ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6", IEICE TRANSACTIONS on Information and Systems Vol.E93-D No.5 pp.1096-1105, May 2010
Fangming ZHAO, Yoshiaki HORI, Kouichi SAKURAI, "Analysis of Existing Privacy-Preserving Protocols in Domain Name System", IEICE TRANSACTIONS on Information and Systems Vol.E93-D No.5 pp.1031-1043, May 2010
Heru SUKOCO, Yoshiaki HORI, Hendrawan, Kouichi SAKURAI, "Towards a Fairness Multimedia Transmission Using Layered-based Multicast Protocol", IEICE TRANSACTIONS on Information and Systems, Vol.E93-D, No.11, pp.2953-2961, November 2010
Jingyu Hua, Kouichi Sakurai, "Modeling and Containment of Search Worms Targeting Web Applications ", Proceeding of the 7th Conference on Detection of Intrusions and Malware & Vulnerability Assessment(DIMVA'10), Lecture Notes on Computer Science, Vol. 6201, pp.183-199. Bonn, Germany, July 2010
Jingyu Hua, Takashi Nishide, Kouichi Sakurai, "Model-Based Intrusion Detection by Abstract Interpretation", Proceeding of 10th Annual International Symposium on Applications and the Internet (SAINT'10), CSnP Workshop, pp.359-362, Seoul, Korea, July, 2010
Laiping Zhao, Yizhi Ren, Mingchu Li, Kouichi Sakurai, "SPSE_A Flexible QoS based Service Scheduling Algorithm for Service Oriented Grid", Proceedings of the 24th IEEE International Symposium on Parallel & Distributed Processing(IPDPS2010), HPGC workshop. pp.1-8 April 2010
Liang Zhao, Di Xiao, Kouichi Sakurai, "Image Encryption Design Based on Multi-dimensional Matrix Map and Partitioning Substitution and Diffusion-Integration Substitution Network Structure", Proceedings of the IEEE International Conference on Information Science and Applications(ICISA2010), Page(s): 1-8, IEEE CONFERENCE, Seoul, Korea, Apr., 2010, 10.1109/ICISA.2010.5480269
Daiki Nobayashi, Takashi Sera, Takeshi Ikenaga, Yutaka Nakamura, Yoshiaki Hori, "A Network Reconfiguration Scheme against Misbehaving Nodes", Proceedings of the 35th IEEE Conference on Local Computer Networks (LCN 2010), pp. 432-439, 8 pages, Denver, U.S.A., October 2010
Amril Syalim, Takashi Nishide, Kouichi Sakurai, "Preserving Integrity and Confidentiality of a Directed Acyclic Graph of Provenance", 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy (DBSec 2010) LNCS 6166 Springer, pp. 311-318, June, 2010
Kazuomi Noda, Yoshifumi Ueshige, Kouichi Sakurai, "Examination about the application to the color image of the digital watermark based on Benford's Law", The 5th Joint Workshop on Information Security, August, 2010
Takashi Nishide, Kouichi Sakurai, "Distributed Paillier Cryptosystem without Trusted Dealer", 11th International Workshop on Information Security Applications (WISA), LNCS 6513, pp.44--60, Springer-Verlag, August, 2011
Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai, "Adaptive and Composable Non-interactive String-Commitment Protocols", International Conference on Security and Cryptography (SECRYPT), pp.354--361, SciTePress, July, 2010
Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai, "Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries", International Conference on Security and Cryptography (SECRYPT), pp.389--398, SciTePress, July, 2010
Yoshiro Fukushima, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai, "A Behavior Based Malware Detection Scheme for Avoiding False Positive", Proceedings of 6th IEEE ICNP Workshop on Secure Network Protocols (NPSec), pp.79-84, Oct., 2010.
Liangjian MAO, Shuzhen YAO, Kai ZHANG, and Kouichi SAKURAI, "Design and Implementation of Document Access Control Model Based on Role and Security Policy", The Second International Conference on Trusted Systems, pp 21-30, Dec., 2010
Dong HAO, Yizhi REN, Kouichi SAKURAI, "A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs", The Second International Conference on Trusted Systems(INTRUST2010), LNCS, Page(s): 231--246, Springer-Verlag, Dec 2010, Beijing, China
Liang Zhao, Avishek Adhikari, Di Xiao and Kouichi Sakurai, "Cryptanalysis on an Image Scrambling Encryption Scheme Based on Pixel Bit", The 9th International Workshop on Digital Watermarking (IWDW2010), LNCS 6526, Page(s): 45--59, Springer-Verlag, Oct., 2010, Seoul, Korea
Liang Zhao, Avishek Adhikari and Kouichi Sakurai, "A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane", The 9th International Workshop on Digital Watermarking (IWDW2010), LNCS 6526, Page(s): 29--44, Springer-Verlag, Oct. 2010, Seoul, Korea
Laiping Zhao, Yizhi Ren, Yang Xiang, Kouichi Sakurai, "Fault-Tolerant Scheduling with Dynamic Number of Replicas in Heterogeneous Systems", 12th IEEE International Conference on High Performance Computing and Communications (HPCC2010), Melbourne, Australia. pp. 434-441, September 2010.
Seiichiro Mizoguchi, Yuji Kugisaki, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai, "Implementation and Evaluation of Bot Detection Scheme based on Data Transmission Intervals", The 6th workshop on Secure Network Protocols, pp.73--78, October
Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai, "Behavior Control based on Dynamic Code Translation", The First Workshop on Convergence Security and Privacy (CSnP 2010), pp.375-378 , July 2010.
Seiichiro Mizoguchi, Yoshiro Fukushima, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai, "Darknet Monitoring on Real-Operated Networks", The 5th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA), pp. 278--285, November
Laiping Zhao, Kouichi Sakurai, "A flexible user-centric resource scheduling algorithm", IPSJ SIG Technical Report, Vol.2010-AL-128 No.8
Laiping Zhao, Kouichi Sakurai, "A reliability analysis based scheduling algorithm in heterogeneous system", IPSJ SIG Technical Report, Vol.2010-AL-129 No.9
Hui Zhao, Mingchu Li, Yizhi Ren and Kouichi Sakurai, "Mechanized Analysis of Verifiable Multi-secret Sharing in the Applied Pi-calculus", The 2010 Symposium on Cryptography and Information Security (SCIS 2010)
Jingyu Hua, Takashi Nishide, Bimal Roy, Mingchu Li, Kouichi Sakurai, "A Theoretical Framework for Program-semantics-based Intrusion Detection by Abstract Interpretation", Proc. of the Symposium of Cryptography and Information Security (SCIS 2010), 19-22 January 2010, Kagawa, Japan
Chunhua Su, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai, "Efficient Adaptively Secure Oblivious Polynomial Evaluation with Universal Composability: If Homomorphic and Non-committing Encryption Exists", 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 1月, 2010.
西出隆志, Amril Syalim, 櫻井幸一, "IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy 2010 会議参加報告", コンピュータセキュリティシンポジウム(CSS), 6pages, 10月, 2010
Liangjian MAO Kouichi SAKURAI, "A Document Access Control Model Based on Role and Security Policy ", 情報通信システムセキュリティ研究会 (ICSS), 6pages, 11月, 2010
Fangming ZHAO, Takashi NISHIIDE and Kouichi SAKURAI , "Cryptographic Cloud Storage with Fine-grained and Flexible Access Control", コンピュータセキュリティシンポジウム (CSS2010), 6pages, 岡山,2010年10月.
Jingyu Hua, Kouichi Sakurai, "A Study on Worms Using Search Engine to Spread", IEICE Technical Report, vol. 109,no. 476, ICSS2009-67, pp. 29-34, Mar. 2010
Peng Gao, Takashi Nishide, Yoshiaki Hori, Kouichi Sakurai, "Integrity for the In-flight Web Page Using Fragile Watermarking", Forum on Information Technology 2010 (FIT2010),pp.247-250
Hao Dong, Yizhi Ren, Kouichi Sakurai, "On-Demand and Incentive-Compatible Surveillance Mechanism againstSuspicious Insiders in MANETs", 第63回電気関係学会九州支部連合大会 (JCEEE 63rd) 2010年9月25日〜9月26日
Laiping Zhao, Kouichi Sakurai, "Report on the 12th IEEE International Conference on High Performance Computing and Communications (HPCC2010)", IPSJ SIG Technical Report, Vol.2010-AL-132 No.3 Nov.2010
Laiping Zhao, Kouichi Sakurai, "On the Design of Fault Tolerant Scheduling Algorithm to Reduce the Resource Usage", IPSJ SIG Technical Report, Vol.2010-AL-132 No.7 Nov.2010
Na Ruan, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai, "A Evaluation Method for Key Management Schemes in WSN", 第63回電気関係学会九州支部連合大会 (JCEEE 63rd) 2010年9月25日〜9月26日
韓芸、堀良彰、櫻井幸一, "パケットフィルタポリシーの安全性解析と対策", 電子情報通信学会論文誌 B Vol.J92-B No.1 pp.370-373 (通信技術の未来を拓く学生論文特集号), January 2009
Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga, Yoshiaki Hori, "Development of Single Sign-On System with Hardware Token and Key Management Server", IEICE TRANSACTIONS on Information and Systems Vol.E92-D No.5 pp.826-835, May 2009
野林大起, 中村豊, 池永全志, 堀良彰, 中村勝一, 石西洋, 貝崎修治, "マルチホップ無線網における協調型隣接アクセスポイント評価手法の設計と実装", 電子情報通信学会 論文誌 Volume J92-B, Number 7, システム開発・ソフトウェア開発論文特集号, pp.1061-1071, July 2009
Yizhi Ren, Mingchu Li ,Kouichi Sakurai, "Modeling Security Bridge Certificate Authority Architecture", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences [J], 92-A(6): 1544-1547 (2009).
Yamada Hisashi, Takagi Tsuyoshi, Sakurai Kouichi, "On the zero-run length of a signed binary representation", Journal of Math-for-Industry 1(A) pp.27-32 2009-04-08 Faculty of Mathematics, Kyushu University,九州大学大学院数理学研究院
GUO Cheng, LI Mingchu, SAKURAI Kouichi, "A New Secret Sharing Scheme Based on the Multi-Dealer", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92.A(5) pp.1373-1378 2009
SU Chunhua, BAO Feng, ZHOU Jianying, TAKAGI Tsuyoshi, SAKURAI Kouichi, "Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92.A(8) pp.1868-1871 2009
YOU Ilsun, SAKURAI Kouichi, HORI Yoshiaki, "An Enhanced Security Protocol for Fast Mobile IPv6", IEICE Transactions on Information and Systems E92.D(10) pp.1979-1982 2009
YOU Ilsun, SAKURAI Kouichi, HORI Yoshiaki, "A Security Analysis on Kempf-Koodlis Security Scheme for Fast Mobile IPv6", IEICE Transactions on Communications E92.B(6) pp.2287-2290 2009
SU Chunhua, BAO Feng, ZHOU Jianying, TAKAGI Tsuyoshi, SAKURAI Kouichi, "Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92.A(4) pp.1246-1250 2009
Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga, Yoshiaki Hori, Katsuichi Nakamura, Hiroshi Ishinishi, Syuuji Kaizaki, "Access Point Evaluation with Packet Transfer Ratio in Multihop Wireless Network", The 2009 International Conference on Information Networking (ICOIN 2009), CD-ROM (3pages), January 2009 (to appear in IEEE Xplorer)
Tatsuro Fujii, Yizhi Ren, Yoshiaki Hori, Kouichi Sakurai, "
Security Analysis for P2P Routing Protocols", Proceedings of the 3rd International Workshop on Advances in Information Security (WAIS'09), pp. 899-904, Fukuoka, Japan
Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai, "Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets", Proceedings of the Third International Workshop on Advances in Information Security (WAIS 2009), pp. 972-977, March 2009
Kohei Tatara, Kouichi Sakurai, "A Signature Scheme Associated with Universal Re-signcryption", Proceedings of the First International Workshop on Recent Innovations and Breakthroughs in Cryptography (RIBC 2009), pp. 780-785, March 2009
Amril Syalim, Yoshiaki Hori, Kouichi Sakurai, "Comparison of Risk Analysis Methods: Mehari, Magerit, NIST800-30 and Microsoft’s Security Management Guide", Proc. of the First International Workshop on Organizational Security Aspects (OSA 2009), pp.726-731, March 2009
Yizhi Ren, Mingchu Li, Yongrui Cui, Cheng Guo and Kouichi Sakurai, "Enhancing Cooperative Behavior for Online Reputation Systems by Group Selection", UIC-ATC, pp.568-573, Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing, 2009
Amril Syalim, Yoshiaki Hori, Kouichi Sakurai, "Grouping Provenance Information to Improve Efficiency of Access Control", ISA 2009: 51-59, LNCS 5576, Seoul.
Jingyu Hua, Mingchu Li, Kouichi Sakurai, Yizhi Ren, "Efficient Intrusion Detection Based on Static Analysis and Stack Walks", Proceeding of the 4th International Workshop on Security(IWSEC '09), Lecture Notes on Computer Scinece, Vol. 5824, pp.158-173. Toyama, Japan, 2009
Yoshiro Fukushima, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai, "Malware Detection Focusing on Behaviors of Process and its Implementation", Proceedings of the fourth Joint Workshop on Information Security 2009 (JWIS'09), 2009
Toshiyuki Tanaka, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai, "A countermeasure to email sender address spoofing", Joint Workshop on Information Security 2009
Yi Han, Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai, "Two Decision Modules for Web Application Firewall based on Simplified Taxonomy of Web Attacks", 2009 Symposium on Cryptography and Information Security(to appear)
Yizhi Ren, Mingchu Li, Yongrui Cui, Cheng Guo, Kouichi Sakurai, "Enhancing Cooperative Behavior for P2P Reputation Systems by Group Selection", The 2009 Symposium on Cryptography and Information Security(SCIS2009)
Yongrui Cui, Mingchu Li, Yizhi Ren, Kouichi Sakurai, "A Quality-of-Service based Fine-grained Reputation System in the Grid Economy", The 2009 Symposium on Cryptography and Information Security(SCIS2009)
Bin-Hui Chou, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai, "Requirements of Forensic Logs with Security Purposes", 2009 Symposium on Cryptography and Information Security (SCIS), 4E2-5, (6 pages), 2009.
福島 和英(KDDI研究所),清本 晋作(KDDI研究所),田中 俊昭(KDDI研究所),櫻井 幸一(九州大学),安浦 寛人(九州大学), "Forensic Watermark in Outputs to Detect Illegal Software Copying and Consideration for Implementation", SCIS2009
Erwan Le Malecot(Kyushu University),Yoshiaki Hori(Kyushu University), "On the Use of SVG and Associated Web Technologies for Network Data Visualization", SCIS2009
Yongrui Cui(Dalian University of Technology),Mingchu Li(Dalian University of Technology),○Yizhi Ren(Kyushu University of Technology, Dalian University of Technology),Kouichi Sakurai(Kyushu University, Institute of Systems Information Technologies/KYUSHU), "A Quality-of-Service based Fine-grained Reputation System in the Grid Economy", SCIS2009
堀良彰, 櫻井幸一, "ACM CCS 2008 会議ならびに併設ワークショップ参加報告", 情報処理学会研究報告, 2009-DPS-138(4), 2009-CSEC-44(4), pp. 19-24, March 2009
Yizhi Ren, Mingchu Li, Yongrui Cui, Cheng Guo and Kouichi Sakurai, "Enhancing Cooperative Behavior for P2P Reputation Systems by Group Selection ", 数理解析研究所講究録 1649 pp.17-22 20090500
Yizhi Ren, Mingchu Li, Yongrui Cui and Kouichi Sakura, "Clustering Agent Based on Preference Measure for Reputation Systems", Computer Security Symposium 2009, IPSJ Symposium Series Vol. 2009, No.11.pp. 829-834.ISSN 1344-0640.
Cheng Guo, Mingchu Li, Yizhi Ren and Kouichi Sakurai, "Construction of Dynamic Threshold Scheme and It's Applications", Computer Computer Security Symposium 2009, IPSJ Symposium Series Vol. 2009, No.11.pp. 861-866. ISSN 1344-0640
Yizhi Ren, Mingchu Li and Kouichi Sakurai., "Toward the Evolving Trust Overlay: An Evolutionary Game View", The 2nd Annual Meeting of Asian Association for Algorithms and Computation (AAAC 2009)
Yizhi Ren, Mingchu Li and Kouichi Sakurai, "Constructing Harmonious P2P Society: Credential VS Reputation.", Workshop among Asian Information Security Lab (WAIS 2009)
Amril Syalim, Yoshiaki Hori, Kouichi Sakurai, "Securing Provenance by Distributing the Provenance Storage", IPSJ Research Report Vol.2009, No.20 (CSEC44) pp.13-18
CUI Yongrui, LI Mingchu, REN Yizhi, SAKURAI Kouichi, "An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E92.A(5) pp.1339-1346 2009
SAKURAI Kouichi, "FOREWORD", IEICE Transactions on Information and Systems E92.D(5) pp.765-765 2009
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai, "Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment", JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 23(1): 129-140 January 2008
西竜三、堀良彰、櫻井幸一, "Reliable Key Distribution Scheme for Lossy Channels", IEICE TRANSACTIONS on Information and Systems Volume E91-D No.5 pp.1485-1488 May 2008
Erwan LE MALECOT, Masayoshi KOHARA, Yoshiaki HORI, Kouichi SAKURAI, "Toward a Scalable Visualization System for Network Traffic Monitoring", IEICE Transactions on Information and Systems, Vol.E91-D, No.5, pp.1300-1310, May 2008
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka, Kouichi Sakurai, "Analysis of Program Obfuscation Schemes with Variable Encoding Technique", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2008 E91-A(1):316-329; January 2008
Kenji Imamoto, Jianying Zhou, Kouichi Sakurai, "Achieving evenhandedness in certified email system for contract signing", International Journal of Information Security, Volume 7, Number 6, pp.383-394, November 2008
Masakazu Fujii, Ken'ichi Takahashi, Yoshiaki Hori, Kouichi Sakurai, "Proposal of an Intrusion Detection with Third-Parties", Proceedings of the 3rd International Joint Workshop on Information Security and Its Applications (IJWISA 2008), pp.105-113, February 2008.
Zhan Wang, Yoshiaki Hori, Kouichi Sakurai, "A Design and Evaluation of Image-based Spam Filtering in SpamAssassin", Proceedings of the 3rd International Joint Workshop on Information Security and Its Applications (IJWISA 2008), pp. 17-29, February 2008.
Erwan Le Malécot, Yoshiaki Hori, Kouichi Sakurai, Jae-Cheol Ryou, Heejo Lee, "(Visually) Tracking Distributed SSH Brute Force Attacks?", Proceedings of the 3rd International Joint Workshop on Information Security and Its Applications (IJWISA 2008), pp. 1-8, February 2008.
Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai, "Secure Logging with Virtualization Solutions", Proceedings of the 3rd International Joint Workshop on Information Security and Its Applications (IJWISA 2008), pp. 115-121, February 2008.
Yi Han, Yoshiaki HORI, Kouichi SAKURAI, "Security Policy Pre-evaluation towards Risk Analysis", The 2nd International Conference on Information Security and Assurance (ISA 2008), pp 415-420, April 24-26, 2008, Hanwha Resort Haeundae, Busan, Korea
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai, "Thoughts on multi-disciplinary inspired research on open network and information system", Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - FINA Workshops, pp.241-246, March 2008
Li Mingchu, Ren Yizhi, Kouichi Sakurai, Cui Yongrui, Wang Zhihui, "Granularity Considering in a Trust Model for P2P Networks", Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - FINA Workshops, pp.307-312, March 2008
西竜三、堀良彰、櫻井幸一, "DoS攻撃に耐性を有するマッチドフィルターを用いた鍵配送方式", The 3rd International Symposium on Ubiquitous Application & Security Service (UASS-08), pp.1534-1539 Mar. 2008
Bin-Hui Chou, Kohei Tatara, Taketoshi Sakuraba, Yoshiaki Hori, Kouichi Sakurai, "A Secure Virtualized Logging Scheme for Digital Forensics in Comparison with Kernel Module Approach", The 2st International Conference on Information Security and Assurance (ISA), pp. 421-426, April 2008.
Taketoshi Sakuraba, Bin-Hui Chou, Seiichi Domyo, Kouichi Sakurai, "Exploring Security Countermeasures along the Attack Sequence", The 2nd International Conference on Information Security and Assurance (ISA), pp. 427-432, April 2008.
Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, and Kouichi Sakurai, "A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering", Proceedings of 2008 International Conference on Availability, Reliability and Security, pp. 48-57, IEEE Computer Society Press, Barcelona, Spain, March 2008.
Takaaki Shigematsu, Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai, "Methodology for Evaluating Information Security Countermeasures of a System", The 2nd International Conference on Information Security and Assurance (ISA), pp. 433-438, April 2008.
Seiichiro Mizoguchi, Yoshiaki Hori, Kouichi Sakurai, "Monitoring Unsed IP Addresses on Segments Managed by DHCP", Proceedings of the 4th International Conference on Networked Computing and Advanced Information Management (NCM2008), Volume 1, pp.510-515, September 2008.
Kohta Fujimura, Yoshiaki Hori, Kouichi Sakurai, "Trackback Spam Distinction Using Similarity of Contents", Joint Workshop on Information Security 2008
Chunhua Su and Kouichi Sakurai, "A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree", The Fourth International Conference on Advanced Data Mining And Applications (ADMA2008), Springer LNAI5139, pp. 170-181, Chengdu, China, October, 2008.
Chunhua Su, Jianying Zhou, Bao Feng, Tsuyoshi Takagi and Kouichi SAKURAI. , "Analysis on Algorithms Used for Privacy-Preserving K-means Clustering Schemes ", The First AAAC Annual Meeting AAAC08, 1 page abstract, HongKong, Apr, 2008.
Chunhua SU, Tadashi ARARAGI and Kouichi SAKURAI, "Universally Composable Oblivious Polynomial Evaluation", The First AAAC Annual Meeting AAAC08, 1 page abstract, HongKong, Apr, 2008.
Daiki Nobayashi, Yutaka Nakamura, Takeshi Ikenaga, Yoshiaki Hori,Katsuichi Nakamura, Hiroshi Ishinishi, Syuuji Kaizaki, "Autonomous Reliable Wireless Mesh Network by Using of Neighbor Access Point Evaluation Mechanism", Poster and Demo Abstracts Proceedings of the Third International Workshop on Self-Organizing Systems (IWSOS 2008), (poster and demo abstract 2 pages), December 2008
Akitoshi Izumi, Yoshifumi Ueshige, Yoshiaki Hori, Kouichi Sakurai, "An Evaluation of Improvement Scheme for Boundary Problem in Cancelable Biometrics Based on Block Scramble", Information Security and Cryptology (Fourth INternational SKLOIS Conference, Inscrypt2008)
Yizhi Ren, Mingchu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai, "Trust Similarity Measure in Trust Model for P2P Networks", 2008 IEEE/IFIP International Symposium on Trust, Security and Privacy for Pervasive Applications
Masakazu Fujii, Kenichi Takahashi, Yoshiaki Hori, Kouichi Sakurai, "Intrusion Detection Using Third-Parties Support", Profeedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2008), 21-23 Oct. 2008 Page(s):206 - 212
Ying Qiu, Jianying Zhou, Kouichi Sakurai, Feng Bao, "Trusted Connection between Mobile Nodes and Mobility Anchor Points in Hierarchical Mobile IPv6", Proceedings of the Third Asia-Pacific Trusted Infrastructure Technologies Conference (APTC 2008), 14-17 Oct. 2008 Page(s):55 - 63
Kouhei Tatara, Yoshiaki Hori, Kouichi Sakurai, "Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection", Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE2008),24-26 April 2008 Page(s):485 - 489
Yi HAN, Yoshiaki HORI, Kouichi SAKURAI, "A Proposal for Firewall Security Policy Evaluation towards Risk Analysis(6 pages)", The 2008 Symposium on Cryptography and Information Security,Jan,2008,Miyazaki
Bin-Hui Chou, Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai, "A Secure Virtualized Logging Scheme for Digital Forensics in Comparison with Kernel Module Approach", 4E1-5, (6 pages), The 2008 Symposium on Cryptography and Information Security (SCIS), Miyazaki, 2008.
Zhan Wang, Yoshiaki HORI, Kouichi SAKURAI, "A Design of Image-based Spam Filtering Based On Textual and Visual Information", IPSJ SIG Technical Reports, Volume 2008, No. 21, 2008-CSEC-40, March 7, 2008
周秉慧、堀良彰、櫻井幸一, "Linuxログの完全性を保護するファイルシステムの提案", 電子情報通信学会総合大会, (1 page), March 19, 2008.
Yi Han, Yoshiaki HORI, Kouichi SAKURAI, "Security Policy Pre-evaluation towards Risk Analysis(1 page)", 電子情報通信学会総合大会, March 19, 2008,北九州
Erwan Le Malecot, Yoshiaki Hori, Kouichi Sakurai, "Preliminary Insight into Distributed SSH Brute Force Attacks", Proceedings of the IEICE General Conference 2008, 2 pages (BS-5-7), March 2008.
Bin-Hui Chou, Yoshiaki Hori, Kouichi Sakurai, "A Secure Centralized Logging Scheme with syslog-ng based on Virtualization", DICOMO 2008, 5A-4, (6 pages), Hokkaido, July 2008.
Erwan Le Malecot, Pascal Jinkoji, Yoshiaki Hori, Kouichi Sakurai, "Evanescent Blacklisting for Automated Network Attack Mitigation", Proceedings of the 12th Multimedia, Distributed, Cooperative and Mobile Symposium (DiCOMO2008), pages 1252-1257, July 2008.
Cheng Guo,Mingchu Li, Kouichi Sakurai, Yizhi Ren, Yongrui Cui, "A Trust Data Storage Management System based on Verifiable Secret Sharing in P2P Networks", COMPUTER SECURITY SYMPOSIUM (CSS 2008)
Hongyan Yao, Mingchu Li,Yizhi Ren, Kouichi Sakurai, "Authorization Decision with Treatment of Policy Inconsistency based on First-Order Logic Approach", COMPUTER SECURITY SYMPOSIUM (CSS 2008)
Yizhi Ren,Mingchu Li,Cheng Guo,Yongrui Cui,Kouichi Sakurai, "A Fine-grained Trust Model for P2P Networks", COMPUTER SECURITY SYMPOSIUM (CSS 2008)
Yizhi Ren, Mingchu Li, Cheng Guo, Yongrui Cui, Kouichi Sakurai, "Stochastic Dynamics of Trust Structure in P2P Networks", Workshop among Asian Information Security Labs (AWIS 2008)
福島 和英(株式会社KDDI研究所),清本 晋作(株式会社KDDI研究所),田中 俊昭(株式会社KDDI研究所),櫻井 幸一(九州大学), "The Subset Difference Method with an a-Array Tree and its Quantitative Analyses", SCIS2008
林椿芳(National Kaohsiung Normal University),楊中皇(National Kaohsiung Normal University),櫻井幸一(九州大学), "Research and Implementation of ID-based Encryption Scheme Based on Symmetric-Key Technique with a Trusted Device", SCIS2008
Tatsuro Fujii, Yoshiaki Hori, Kouichi Sakurai, "Proposal and evaluation of secure routing algorithm on P2P networks", Workshop among Asian Information Security Labs, July 3-4, 2008
Akihiro Sakai, Yoshiaki Hori, Kouichi Sakurai, "Formal Verification of RBAC Descriptions and Evolution Assistant", Workshop among Asian Information Security Labs, July 3-4, 2008
Kazuya TSUKAMOTO, Yoshiaki HORI, Yuji OIE, "Transport Layer Mobility Management across Heterogeneous Wireless Access Networks", IEICE Transactions on Communications, Vol. E90-B No.5 pp.1122-1131, May 2007.
Akitoshi Izumi, Yoshifumi Ueshige, Kouichi Sakurai, "A Proposal of Key Management Scheme and Its Operation Using Anonymous Biometrics on ID-based Infrastructure ", International Journal of Security and Its Applications, Volume 1, Number 1, pp.83-94, SESRC, July 2007
Shinsaku KIYOMOTO, Kazuhide FUKUSHIMA, Toshiaki TANAKA and Kouichi SAKURAI , "On Effectiveness of Clock Control in Stream Ciphers", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 2007 E90-A(9):1780-1787, September 2007
Yufeng Wang, Yoshiaki Hori, Kouichi SAKURAI, "Economic-inspired truthful reputation feedback mechanism in P2P networks", Proc. of the IEEE 11th International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2007) , pp. 80-88, 2007, March, 21-23, Sedona, Arizona, USA
Yufeng Wang, Yoshiaki Hori, Kouichi SAKURAI, "Study on trust inference and emergence of economical small-world phenomena in P2P environment", Proceeding of PAKDD2007 Workshop of the 2007 International Workshop on Service, Security and its Data management for Ubiquitous Computing (SSDU-07) , pp. 502-514, Springer, Lecture Notes in Computer Science Volume 1489(acceptance ratio: 18%), May 2007
Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai, "Analysis of Privacy Disclosure in DNS Query", Proceedings of the first International Conference on Multimedia and Ubiquitous Engineering(MUE2007),IEEE Computer Society, Korea, pp. 952-957, April, 2007.
Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, "Randomization Based Private Clustering Analysis in Distributed Environment", Proceeding of The 2nd International Joint Workshop on Information (IJWISA 2007), pp. 69-78, Seoul, Korea, February, 2007
Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai, "Two Party Privacy-Preserving Agglomerative Document Clustering", 3rd Information Security Practice and Experience Conference, ISPEC 2007, LNCS6477, pp. 193-208, HongKong, May, 2007.
Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai, "Privacy-Preserving Two-Party K-Means Clustering Via Secure Approximation", 2007 IEEE International Symposium on Data Mining and Information Retrieval, DMIR-07, pp.385-391, Niagara Falls, Canada, May, 2007.
Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai, "Two-Servers PIR Based DNS Query Scheme with Privacy-Preserving", Proc. fo the 2007 International Conference on Intelligent Pervasive Computing (IPC-07), pp. 299-302, October 2007, published by IEEE CS.
Akitoshi Izumi, Yoshifumi Ueshige, Kouichi Sakurai, "A Proposal of Efficient Scheme of Key Management Using ID-based Encryption and Biometrics", Proc. of 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), pp.29-34, 26-28 April 2007
Daiki Nobayashi , Yutaka Nakamura , Takeshi Ikenaga , Yoshiaki Hori, "Development of Single Sign-On System with Hardware Token and Key Management Server", Proc. of the Second International Conference on Systems and Networks Communications (ICSNC 2007), pp.73-78, August 2007.
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai, "On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments", Prof. of the joint conference of the 9th Asia-Pacific Web Conference and the 8th International Conference on Web-Age Information Management (APWeb/WAIM Workshops 2007), Springer LNCS Volume 4537, pp. 211-216, June 2007.
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai, "An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System", Prof. of the 4th International Conference on Autonomic and Trusted Computing (ATC2007), Springer LNCS 4617, pp. 249-258, July 2007.
Sang Soo Yeo, Kouichi Sakurai, SungEon Cho, KiSung Yang, Sung Kwon Kim, "Forward Secure Privacy Protection Scheme for RFID System Using Advanced Encryption Standard", Proc. of the Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA Workshops 2007), Springer LNCS Volume 4743, pp. 245-254, August 2007.
Satoshi Hada, Kouichi Sakurai, "A Note on the (Im)possibility of Using Obfuscators to Transform Private-Key Encryption into Public-Key Encryption", Proc. of the Second International Workshop on Security (IWSEC2007), Springer LNCS, Volume 4752, pp. 1-12, October 2007.
Hyung Chan Kim, R. S. Ramakrishna, Wook Shin, Kouichi Sakurai, "Enforcement of Integrated Security Policy in Trusted Operating Systems", Proc. of the Second International Workshop on Security (IWSEC 2007), Springer LNCS, Volume 4752, pp. 214-229, October 2007.
Yuji Kugisaki, Yoshiaki Kasahara, Yoshiaki Hori, Kouichi Sakurai, "Bot Detection based on Traffic Analysis", Proc. of the 2007 International Conference on Intelligent Pervasive Computing (IPC-07), pp. 303-306, October 2007
Erwan Le Malécot, Yoshiaki Hori, Kouichi Sakurai, "Bringing the Pieces Together: an Architecture for Network Scan Mitigation", Proceedings of the 2nd IEEE Workshop on Monitoring, Attack Detection and Mitigation (MonAM'07), p75-77, November 2007.
Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, "An Approach of Program Analysis Prevention for Information Protection", Proceedings of the first International Conference on Multimedia and Ubiquitous Engineering(MUE2007), pp.35-40, April, 2007.
Kenichi Takahashi, Zhaoyu Liu, Kouichi Sakurai, Makoto Amamiya, "An Approach of Trusted Program Generation for User-Responsible Privacy", Proceedings of the 4th International Conference on Ubiquitous Intelligence and Computing (UIC 2007), Springer LNCS Volume 4611, pp. 1159-1170, Hong Kong, China, July 11-13, 2007
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai, "On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network", Proceedings of the 4th International Conference on Ubiquitous Intelligence and Computing (UIC 2007), Springer LNCS Volume 4611, pp. 382-391, Hong Kong, China, July 11-13, 2007
Hyung Chan Kim , R.S. Ramakrishna , Wook Shin , Kouichi Sakurai, "A Policy Language for the Extended Reference Monitor in Trusted Operating Systems", Proceedings of the Second International Conference on Availability, Reliability and Security (ARES'07), pp.1160-1166, April 2007.
Sang-Soo Yeo , Kouichi Sakurai , Jin Kwak, "A Practical Proxy Device for Protecting RFID Tag’s Identifier", Proceedings of 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007), pp. 55-58, August 2007.
Yufeng Wang, Yoshiaki Hori, Kouichi Sakurai, "Proposals on attack-resistant group-based trust metrics and characterizing scalar trust-based social features of trust graph in P2P environment", The 2nd International Joint Workshop on Information (IJWISA 2007), Hotel ibis, Myeong-dong, Seoul, Korea, February 5 - 6, 2007
Yufeng Wang, Yoshiaki Hori, Kouichi SAKURAI, "On characterizing social features in Web of trust and its effect on attack of front peer", Symposium on Cryptography and Information Security 2007 (SCIS 2007)
高橋健一, 堀良彰, 今本健二, 櫻井幸一, "CCS2006とその併設ワークショップ,およびPST2006報告 ", 情報処理学会研究報告, CSEC, Vol.2007, No.16(20070301) pp. 123-128, March 2007.
Sang-Soo Yeo, Kouichi Sakurai, "Hierarchical Clustering and Leaf Ordering Scheme for DNA Chip Expression Data", 情報処理学会研究報告. AL, Vol.2007, No.66(20070703) pp. 39-46, 2007-AL-113-(6), July 2007
豊福達也, 堀良彰, 櫻井幸一, "ダミーメソッドの特定を困難にするソフトウェア電子透かし埋め込みに関する一手法", 情報処理学会研究報告. CSEC, Vol.2007, No.16(20070301) pp. 249-254, March 2007
深谷博美, 今本健二, 櫻井幸一, "信頼できるデバイスを用いた3way認証方式の設計と解析", 電子情報通信学会技術研究報告. ISEC, Vol.106, No.597(20070309) pp. 81-86, ISEC2006-154, March 2007.
野林大起, 中村豊, 池永全志, 堀良彰, 石西洋, "マルチホップ無線網における周辺ノードとの連携による隣接ノード評価手法", 電子情報通信学会技術研究報告. IN, Vol.107, No.222(20070913) pp. 37-42, IN2007-49, September 2007
今本健二, 櫻井幸一, "第三者機関を利用したワンタイムIDシステムの設計,および信用論理による安全性検証", 電子情報通信学会論文誌 D Vol.J89-D, No.4, pp.716-725 (フォーマルアプローチ特集号)
Kazuya Tsukamoto, Yutaka Fukuoka, Yoshiaki Hori, Yuji Oie, "New TCP Congestion Control Schemes for Multimodal Mobile Hosts", IEICE Transactions on Communications, Vol. E89-B, No. 6, pp.1825-1836, June 2006.
Jeong Ok Kwon,Ik Rae Jeong, Kouchi Sakurai, and Dong Hoon Lee, "Directions in Password-Authenticated Key Exchange", Communications of the CCISA, Special Issue -Implementation Aspects of Cryptosystems, Vol. 12 No. 2 Apr. 2006, pages 43-60
許容碩, 今本健二, 櫻井幸一, "1-out-of-L Electronic Voting with Ballot-Cancellation Property Using Double Encryption", International Journal of Computer Science and Network Security (IJCSNS), Vol.6 No.1B, pp.217-226
Amril Syalim, Toshihiro Tabata, Kouichi Sakurai , "Usage Control Model and Architecture for Data Confidentiality in a Database Service Provider ", IPSJ Journal, Volume 47, Number 2, pp.621-626
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai, "Active Modification Method of Program Control Flow for Efficient Anomaly Detection", GESTS International Transactions on Computer Science and Engineering, 31(1), pp.51-62, May 2006.
Fumiaki NAGANO, Kohei TATARA, Toshihiro TABATA, Kouichi SAKURAI, "An Intrusion Detection System using Alteration of Data", Proceedings of the 20th IEEE International Conference on Advanced Information Networking and Applications, Volume 1, pp. 243-248
今本健二, 櫻井幸一, "Enhanced Privacy in Key-Exchange Protocols by One-time ID", Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU 2006),IEEE Computer Society, pp.63-68
今本健二, 櫻井幸一, "Off-line Verification of One-time ID in Distributed Environment", Privacy Security Trust 2006, PST2006, pp449-452
今本健二, 深谷博美, 櫻井幸一, "Cryptographic Infrastructures based on a Unique Device with Tamper-Resistant", 1st International Conference on Information Security and Computer Forensics, ISCF2006, p41-47
今本健二, Jin Kwak, Hwa-Cheol Jang, 櫻井幸一, "New Solution for Secure Electronic Banking Service for Antihacking", International Workshop on Universal Framework for Identity Documents, UFID2006
Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai, "Discussion about Flow Traffic Classification using Support Vector Machine", Proceedings of the First Joint Workshop on Information Security September, 20-21, 2006 (JWIS2006), pp. 305-315
Yufeng Wang, Wendong Wang, Kouichi SAKURAI, Yoshiaki Hori, "On studying P2P topology construction based on virtual region and its effect on search performance", Proceeding of the Third International Conference on Ubiquitous Intelligence and Computing (UIC 2006) , Wuhan, China, 2006, Springer, LNCS Volume 4159, pp.1008-1018
Yufeng Wang, Yoshiaki Hori, Kouichi SAKURAI, "On securing open networks through trust and reputation -- architecture, challenges and solutions", in Proceeding of The 1st Joint Workshop on Information Security (JWIS) , pp. 171-187, 2006, September, 20-21, Sookmyung Women's University, Seoul Korea.
Jong-Phil Yang, Kouichi Sakurai, Kyung Hyune Rhee, "Distributing Security-Mediated PKI Revisited", Proceedings of the Third European PKI Workshop: Theory and Practice (EuroPKI 2006), Sprinver LNCS Volume 4043 pp. 31-44, June 2006
Hiroshi Yoshiura, Kouichi Sakurai, Kai Rannenberg, Yuko Murayama, Shin-ichi Kawamura, "Advances in Information and Computer Security", Proceedings of the First International Workshop on Security (IWSEC 2006), Springer LNCS Volume 4266
Zhan Wang, Yoshiaki Hori, and Kouichi Sakurai, "Application and evaluation of Bayesian filter for Chinese spam", Proc. of Inscrypt 2006, The SKLOIS conference on information security and cryptology, Springer-Verlag, LNCS 4318. pp.253-263.(acceptance ratio: 10%)
Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee, "One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange", Proceedings of the tenth IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security (CMS 2006), Springer LNCS Volume 4237, pp.87-96
Jin Kwak, Keunwoo Rhee, Namje Park, Howon Kim, Seungjoo Kim, Kouichi Sakurai, Dongho Won, "An RFID System Based MCLT System with Improved Privacy", Proceedings of the Workshops on TRUST 2006, Springer LNCS Volume 4097, pp. 579-590
Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai, "A Proactive Secret Sharing for Server Assisted Threshold Signatures", Proceedings of the Second International Conference on High Performance Computing and Communications (HPCC 2006), Springer LNCS Volume 4208, pp.250-259
Hyung-Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai, "Design and Implementation of an Extended Reference Monitor for Trusted Operating Systems", Proceedings of the Second International Conference on Information Security Practice and Experience (ISPEC 2006), Sprinver LNCS 3903, pp.235-247
Satoshi Hada, Kouichi Sakurai, "Ciphertext-Auditable Public Key Encryption", Proceedings of the First International Workshop on Security (IWSEC 2006), Sprinver LNCS Volume 4266, pp. 308-321
Zhan Wang, Yoshiaki Hori, Kouichi Sakurai , "Application and Evaluation of Bayesian Filter for Chinese Spam", Proceedings of the Second SKLOIS Conference (Inscrypt 2006), Sprinver LNCS Volume 4318, pp. 253-263
Kohei Tatara, Toshihiro Tabata, Kouichi Sakurai, "Actively Modifying Control Flow of Program for Efficient Anormaly Detection", Proceedings of the tenth International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006), Volume 2, Springer LNCS Volume 4252, pp. 737-744
Kenichi Takahashi, Kouichi Sakurai, "A Framework for the User-Oriented Personal Information Protection", Proceedings of the 2006 International Conference on Security and Management (SAM 2006), CSREA Press, pp.12-19
Yoshifumi Ueshige, Kouichi Sakurai, "A Proposal of One-Time Biometric Authentication", Proceedings of the 2006 International Conference on Security and Management (SAM 2006), CSREA Press, pp.78-83
Erwan Le Malecot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai, "Interactively Combining 2D and 3D Visualization for Network Traffic Monitoring", Proceedings of the third International Workshop on Visualization for Computer Security (VizSEC06), pp. 123-127, November 2006.
Erwan Le Malecot, Masayoshi Kohara, Yoshiaki Hori, Kouichi Sakurai, "Grid Based Network Address Space Browsing for Network Traffic Visualization", Proceedings of the Seventh IEEE Information Assurance Workshop (IAW06), pp. 261-267, June 2006.
Kazumi KUMAZOE, Katsushi KOUYAMA, Yoshiaki HORI, Masato TSURU, Yuji OIE, "Can high-speed transport protocols be deployed on the Internet? : Evaluation through experiments on JGNII", Proceedongs of the fourth International Workshop on Protocols for Fast Long-Distance Networks, (PFLDnet 06)
Yoshiaki Hori, Kouichi Sakurai, "Security analysis of MIS protocol on wireless LAN comparison with IEEE802.11i", Proceedings of the 3rd international conference on Mobile technology, applications & systems, ACM International Conference Proceeding Series; Vol. 270, No.11, pp.1--5, October 2006
Jeong Ok Kwon,Kouchi Sakurai, and Dong Hoon Lee, "One-Round Protocol for Two-Party Verifier-Based Password-Authenticated Key Exchange", Symposium on Cryptography and Information Security (SCIS2006), Page 260
Yufeng Wang, Yoshiaki Hori, Kouichi SAKURAI , "Studying on incentive-compatible truth-telling and cheat-proof mechanisms in Ad hoc networks based on virtual payment", Computer Security Symposium 2006 (CSS2006)
Fangming Zhao, Yoshiaki Hori, Kouichi Sakurai, "DNS Query with Privacy-Preserving", Proceedings of the 2006 Computer Security Symposium (CSS 2006) pp.19-24
Jeong-Ok KWON, KouichiSAKURAI,Dong Hoon LEE, "Password-Authenticated Key Exchange for Multi-Party with Different Passwords Using a Constant Number of Rounds", IPSJ Research Report, Vol. 2006, No. 81, 2006-CSEC-034, pp.345-352
Erwan Le Malecot, 小原正芳, 堀良彰, 櫻井幸一, "テクスチャキューブを用いた対話的ネットワークトラヒック視覚化ツール ", 情報処理学会研究報告 Vol. 2006, No. 81, 2006-CSEC-034, pp. 459-466
Hyung-Chan KIM R.S. RAMAKRISHNA Kouichi SAKURAI, "A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment", IEICE Transactions, Vol.E88-A No.1, pp.270-279 PAPER, Jan. 2005
Wook SHIN Jeong-Gun LEE Hong Kook KIM Kouichi SAKURAI, "Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling", IEICE Transactions, Vol.E88-A No.1, pp.327-330 LETTER, Jan. 2005
Satoshi KOGA, Kouichi SAKURAI, "Proposal and Analysis of Distributed Online Certificate Status Protocol with Low Communication Cost", IEICE Transactions, Vol.E88-A No.1, pp.247-254, Jan. 2005
Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee and Kouichi Sakurai, "PGV Style Block-Cipher-Based Hash Families and Black Box Analysis", IEICE Transactions, Vol.E88-A No.1, pp.39-48, Jan. 2005
Junichiro SAITO, Kouichi SAKURAI, "A Survey on Cryptographic Techniques for RFID privacy", Korea Information Processing Society Review, Vol.12, No5, Sep. 2005.
Yasuyuki SAKAI, Kouichi SAKURAI, "On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks", IEICE Transactions, Vol.E88-A No.1, pp.154-160, Jan. 2005
小原 正芳, 堀 良彰, 櫻井 幸一, Taeck-Geun Kwon, "TCPに対するポートスキャンの高速検知手法", Proc. of The 2005 International Technical Conference On Circuits/System, Computers and Communications (ITC-CSCC 2005), vol. 2, page 777--778
熊副 和美, 神山 勝司, 堀 良彰, 鶴 正人, 尾家 祐二, "Transport Protocol for Fast Long-Distance Networks : Evaluation of Penetration and Robustness on JGNII", The 3rd International Workshop on Protocols for Fast Long-Distance Networks, (PFLDnet 05)
齊藤 純一郎,櫻井 幸一, "Grouping proof for RFID tags", International Conference on Ubiquitous Smart Worlds(USW2005), pp.621-624
Katsuyuki OKEYA, Kouichi SAKURAI, "A Second-Order DPA Attack Breaks a Window-method based Countermeasure against Side Channel Attacks", Information Security Conference (ISC 2002), LNCS2433, pp.389-401, Sep. 2002
古賀聡, 今本健二, 櫻井幸一, "Enhancing Security of Security-Mediated PKI by One-time ID", 4th Annual PKI R&D Workshop, pp.176-189
今本健二, 櫻井幸一, "Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic", The Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA 2005), Electronic Notes in Theoretical Computer Science, Vol.135, No.1, pp.79-94
今本健二, 櫻井幸一, "Design of DDoS-Resilient Protocol Based on Symmetric key Authentication", 2005 Korea-Japan Joint Workshop on Algorithms and Computation (WAAC'05), pp.113-119
今本健二, Jianying Zhou, 櫻井幸一, "An Evenhanded Certified Email System for Contract Signing", The 7th International Conference on Information and Communications Security (ICICS 2005), LNCS 3783, pp.1-13
Guilin Wang, Feng Bao, 今本健二, 櫻井幸一, "Generic, Optimistic, and Efficient Schemes for Fair Certified Email Delivery", The 7th International Conference on Information and Communications Security (ICICS 2005), LNCS 3783, pp.40-52
Amril Syalim, Toshihiro Tabata and Kouichi Sakurai, "Usage Control Model and Architecture for Data Confidentiality in Database Service Provider", Indonesia Cryptology and Information Security Conference (INA-CISC) 2005, page155-160
蘇 春華, 櫻井 幸一, "Privacy-preserving K-Means Clustering over Databases containing Non-numeric Attributes", SKLOIS Conference on Information Security and Cryptology, page171-180
Tatsuya TOYOFUKU, Toshihiro TABATA, Kouichi SAKURAI, "Program Obfuscation Scheme using Random Numbers to Complicate Control Flow", The First International Workshop on Security in Ubiquitous Computing Systems (SECUBIQ 2005)
齊藤 純一郎,今本 健二,櫻井 幸一, "Reassignment Scheme of an RFID Tag's Key for Owner Transfer", The First IFIP Workshop on Trusted and Autonomic Ubiquitous and Embedded Systems(TAUES05), pp.1303-1312
SangCheol Hwang, Namhoon Lee, Kouichi Sakurai, GungGil Park, Jaecheol Ryou, "The Improved Risk Analysis Mechanism in the Practical Risk Analysis System", ICOIN 2005, pp.835-842
Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee, "Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model", FSE 2005, pp.243-254
Ryuzou Nishi, Hitoshi Morioka, Kouichi Sakurai, "Trends and Issues for Security of Home-Network Based on Power Line Communication", AINA 2005, pp.655-660
Ryuzou NISHI, Kouichi SAKURAI, "Group key distribution scheme for reducing required rekey message size 11th International Conference on Parallel and Distributed Systems", ICPADS'05, pp.280-284
Kohei TATARA, Yoshiaki HORI, Kouichi SAKURAI, "Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet 11th International Conference on Parallel and Distributed Systems", ICPADS'05, pp.235-239
Yasuyuki Sakai and Kouichi Sakurai, "Fast Modular Reduction with NIST Recommended Elliptic Curves", ICICS 2005, pp.169-180
Kenichi Takahashi, Kouichi Sakurai, Makoto Amamiya, "A Framework for Protecting Private Information Through User-Trusted-Program and Its Realizability", EUC Workshops 2005, pp.433-442
Tatsuya Toyofuku and Toshihiro Tabata and Kouichi Sakurai, "Program Obfuscation Scheme Using Random Numbers to Complicate Control Flow", EUC Workshops 2005, pp.916-925
Hyung Chan Kim, Wook Shin, R. S. Ramakrishna, Kouichi Sakurai, "Construction of RBAC-Enforceable Security Automata", 2005年暗号と情報セキュリティシンポジウム (SCIS2005), Jan. 2005
Jiho Cho, Dong-Hoon Yoo, Hyung-Chan Kim, R.S.Ramakrishna, Kouichi Sakurai, "XExt3: The design and Implementation of a Security Enhanced Ext3 File system", 2005年暗号と情報セキュリティシンポジウム (SCIS2005), Jan. 2005
Dong-Guk Han, Dongjin Yang, Jongin Lim, Kouichi Sakurai, "DPA on Hybrid XTR Single Exponentiation", 2005年暗号と情報セキュリティシンポジウム (SCIS2005), Jan. 2005
So Young Park, Hyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai, "Proposal of Secure Routing Protocol for Distributed Sensor Networks", 2005年暗号と情報セキュリティシンポジウム (SCIS2005), Jan. 2005
Ki Woong Ko, Kyeong Tae Kim, Hyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai, "Real-Time Instrusion Detection Mechanism based on Anomaly Behavior Segments", 2005年暗号と情報セキュリティシンポジウム (SCIS2005), Jan. 2005
許容碩, 齊藤純一郎, 今本健二, 櫻井幸一, "Security and Privacy in E-voting and RFID System Based on Universal Re-encryption Mix-net", 2005年暗号と情報セキュリティシンポジウム (SCIS2005), Jan. 2005
今本健二, 櫻井幸一, "The 32nd International Colloquium on Automata, Languages and Programming(ICALP2005),および The Second Workshop on Automated Reasoning for Security Protocol Analysis(ARSPA2005)参加報告", 情報セキュリティ研究会(ISEC)
Erwan Le Malecot, 小原 正芳, 堀 良彰, 櫻井 幸一, "対話的ネットワークアドレス空間探索を実現するLAN管理のためのトラフィック可視化ツール", Proc. of CSS2005 (Computer Security Symposium 2005), page 409 -- 414, Oct. 2005
Amril Syalim, Toshihiro Tabata and Kouichi Sakurai, "Usage Control Model for Data Confidentiality Problem in Database Service Provider", Symposium on Computer and Information Security (SCIS) 2005
Amril Syalim, Toshihiro Tabata and Kouichi Sakurai, "A Model to Partially Outsourcing Access Control for Databases", Computer Security Symposium (CSS) 2005
Jeong Ok Kwon, Kouchi SAKURAI, and Dong Hoon Lee, "Verifier-based password-authenticated key exchange in the three-party setting", Computer Security Symposium 2005 (CSS2005), Vol. I, Pages 295-299
塚本和也, 堀良彰, 尾家祐二, "Mobility Management of Transport Protocol Supporting Multiple Connections", Proc. of Second International Workshop on Mobility Management and Wireless Access Protocols (ACM MobiWac 2004),volume1 pp.83-87
今本 健二, 櫻井 幸一, "A Design of Diffie-Hellman Based Key Exchange Using One-time ID in Pre-shared Key Model", The 18th International Conference on Advanced Information Networking and Applications (AINA 2004)
齊藤 純一郎, Jae-Cheol Ryou, 櫻井 幸一, "Enhancing privacy of Universal Re-encryption scheme for RFID tags", International Conference on Embedded and Ubiquitous Computing(EUC04)
今本 健二, 櫻井 幸一, "Key-Exchange Protocol Using Pre-Agreed Session-ID", The 5th International Workshop on Information Security Applications (WISA 2004)
Yong-Sork Her, Jae-Cheol Ryou, Kouichi Sakurai , "ELECTRONIC SEALED-BID AUCTION WITH THE EFFICIENT COMMUNICATION COMPLEXITY USING TOURNAMENT OPENING-METHOD", International Workshop on Business and Information, Mar. 2004
Satoshi KOGA, Kouichi SAKURAI, "A Distributed Online Certificate Status Protocol with a Single Public Key", International Workshop on Practice and Theory in Public Key Cryptography (PKC 2004), LNCS 2947, pp.389-401, Mar. 2004
Satoshi KOGA, Kouichi SAKURAI, "A Merging Method of Certification Authorities without using Cross-Certifications", Proc. of 18th International Conference on Advanced Information Networking and Applications (AINA 2004), vol.2, pp.174-177, Mar. 2004
Y.S.Her and K.Sakurai, "Electronic Voting Protocol for the Receipt-freeness Based on Internet", Proc. of International Workshop Western Decision Sciences Institute, Apr. 2004
Satoshi KOGA, Jae-Cheol Ryou, Kouichi SAKURAI, "Pre-production Methods of a Response to Certificates with the Common Status", 1st European PKI Workshop (EuroPKI), LNCS 3093, pp.85-97, Springer-Verlag, Jun. 2004
Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai, "A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model", Information Security and Privacy-ACISP2004, Jul. 2004
Dong-Guk Han, Jongin Lim, and Kouichi Sakurai, "On security of XTR public key cryptosystems against Side Channel Attacks", Proceedings of Information Security and Privacy (ACISP 2004),Springer-Verlag LNCS Vol.3108, pp.454-465, July 2004
Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI, "Some fitting of naive Bayesian spam filtering for Japanese environment", Proc. of Workshop on Information Security Applications (WISA2004), Aug. 2004
Kohei TATARA, Toshihiro TABATA, Kouichi SAKURAI, "A Probabilistic Method for Detecting Anomalous Program Behavior", Workshop on Information Security Applications(WISA04), Aug, 2004
Toshihiro TABATA, Kouichi SAKURAI, "Design of Intrusion Detection System at User Level with System-call Interposing", 1st International Conference on E-business and Telecommunication Networks (ICETE2004), (Aug, 2004).
Kazuya Tsukamoto, Yoshiaki Hori, Yuji Oie, "Network Selection Scheme for Multimodal Mobile Hosts", Proceedings of ACM Mobiwac 2004, September 2004
Dong-Guk Han, Tetsuya Izu, Jongin Lim, and Kouichi Sakurai, "Modified Power-Analysis Attacks on XTR and An Efficient Countermeasure", Information and Communications Security (ICICS 2004), Springer-Verlag LNCS Vol.3269, pp.305-317, Oct. 2004
Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee, "On the Pseudorandomness of a Block Cipher Structure", Information Security and Cryptology-ICISC2004, Dec. 2004
Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee, "On the Pseudorandomness of a Modification of KASUMI type Permutations", Information Security and Cryptology-ICISC2004, Dec. 2004
Hiroshi Kadota, Yoshiaki Hori, Akiyoshi Wakatani, "A New Reconfigurable Architecture with Smart Data-Transfer Subsystems for the Intelligent Image Processing", Proc. of 2004 International Conference on Field-Programmable Technology (FPT'04), Dec. 2004
Amril Syalim, Toshihiro Tabata and Kouichi Sakurai, "Access Control Model for a Secure Enhanced Database Management System", Computer Security Symposium (CSS) 2004
楊 中皇, 林 龍見, 櫻井 幸一, "An Integration of PKI and IC Cards for IPsec", 暗号と情報セキュリティシンポジウム (SCIS2004), Jan. 2004
Hyung Chan Kim, Wook Shin, R.S.Ramakrishna, Kouichi Sakurai, "Conflicts of Role Based Access Control in Multi-domain Security", 暗号と情報セキュリティシンポジウム (SCIS2004), Jan. 2004
DongGuk Han, Jongin Lim, Kouichi Sakurai, "On insecurity of the side channel attack on XTR", 暗号と情報セキュリティシンポジウム (SCIS2004), Jan. 2004
小森将登, 堀良彰, 平山善一, 藤村 直美, "端末設置登録業務の自動化支援システムの開発について", 情報処理学会研究報告 2004-DSM, May 2004
小手川祐樹, 田端利宏, 堀良彰, 櫻井幸一, "Network and Distributed System Security Symposium における研究動向の調査", コンピュータセキュリティ研究会 (CSEC), May 2004
Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee, "A More Efficient Modification of KASUMI Type Pseudorandom Permutations", ISEC2004, The Institute of Electronics, Information and Communication Engineers, Jul. 2004
Dong-Guk Han, Tetsuya Izu, Jongin Lim, and Kouichi Sakurai, "Side Channel Attacks on XTR and An Efficient Countermeasure", 情報セキュリティ研究会(ISEC2004-56), July 2004
許 容碩, 今本 健二, 櫻井 幸一, "電子投票用紙を利用した無証拠性と全体検証性を持つ電子投票", 電気関係学会九州支部連合大会2004, September 2004
池永全志, 堀良彰, 尾家祐二, "マルチホーム環境におけるアドレス決定支援機構の提案", 電気関係学会九州支部第57回連合大会, September 2004
堀良彰, 櫻井幸一, "ネットワークセキュリティのためのQuadtree mapping法を使用した情報可視化", 電気関係学会九州支部第57回連合大会, September 2004
Wonil Lee, Kouichi Sakurai, Seokhie Hong, Sangjin Lee, "On the Pseudorandomness of a Block Cipher Structure", Joint Conference of Electrical and Electronics Engineers in Kyushu, September 2004
蘇 春華, 櫻井 幸一, "データプライバシ保護における乱数摂動手法の安全性分析", コンピュータセキュリティシンポジウム2004(CSS2004), pp. 799-804, Oct. 2004
今本 健二, 櫻井 幸一, "事前共有鍵を用いた動的鍵共有プロトコル", コンピュータセキュリティシンポジウム2004(CSS2004), pp. 811-816, Oct. 2004
Yong-Sork Her, Kenji Imamoto, Kouichi Sakurai, "Receipt-free Sealed-bid Auction Based on Mix-net and Pseudo ID", Computer Security Symposium 2004(CSS2004), pp. 319-324, Oct. 2004
Wonil Lee, Mridul Nandi, Kouichi Sakurai, Sangjin Lee, "A Note on the Impossibility of Highly Efficient Blockcipher-Based Hash Functions", Computer Security Symposium 2004(CSS2004), pp. 547-552, Oct. 2004
Hyung Chan Kim, R. S. Ramakrishna, Kouichi Sakurai, "On the Privilege Transitional Attack in Secure Operating Systems", Computer Security Symposium 2004(CSS2004), pp. 559-564, Oct. 2004
Ji-Ho Cho, Dong-Hoon Yoo, Hyung-Chan Kim, R. S. Ramakrishna, Kouichi Sakurai, "The Design of Convenient File Protection based on EXT3 File System", Computer Security Symposium 2004(CSS2004), pp. 565-570, Oct. 2004
Wook Shin, Hong Kook Kim, Kouichi Sakurai,, "An Implementation of Extended-Role Based Access Control on an Embedded system", Computer Security Symposium 2004(CSS2004), pp. 667-671, Oct. 2004
Hyunjin Yoo, Minho Kim, R. S. Ramakrishna, Kouichi Sakurai, "
Privacy Preserving Clustering using Joint Probability Density Functions", Computer Security Symposium 2004(CSS2004), pp. 739-743, Oct. 2004
Katsuyuki OKEYA, Kouichi SAKURAI, "Use of Montgomery Trick in Precomputation of Multi-Scalar Multiplication in Elliptic Curve Cryptosystem", IEICE Transactions. Vol.E86-A No.1, pp.98-112, Jan. 2003
Yasuyuki SAKAI, Kouichi SAKURAI, "An Efficient Representation of Scalars for Simultaneous Elliptic Scalar Multiplication", IEICE Transactions, Vol.E86-A No.5, May. 2003
Katsuyuki OKEYA, Kouichi SAKURAI, "Simple Power Attack On a Randomized Addition-Subtraction Chains Method for Elliptic Curve Cryptosystems", IEICE Transactions, Vol.E86-A No.5, pp.1171-1180, May. 2003
Michael W. DAVID, Kouichi SAKURAI, "Enhancing Airport Access Control Security with Multiple Biometrics Contactless Smart Card", IPSJ Journal, Vol.44, No.8, pp. , Aug. 2003
今本健二,櫻井幸一, "Certified E-mail Systems Using Public Notice Board", Trust and Privacy in Digital Business (TrustBus 2003), 14th International Workshop on Database and Expert Systems Applications (DEXA 2003), pp.460–464
今本健二,櫻井幸一, "Private Certified E-mail Systems with Electronic Notice Board", 2003 International Workshop on Cryptology and Network Security (CANS 2003), pp.726–729
JaeGwi Choi, Kouichi Sakurai, JiHwan Park, "Improved Anonymous Fingerprinting Scheme with a Robust Asymmetry", International Conference on Multimedia Technology and Its Applications, Jan. 2003
Yong-Sork HER, Kouichi SAKURAI, and Shin-Hwan KIM, "Design of the Secure E-voting System Including Absentee Voters Which Enables Ballot-Cancellation Based on Double Encryption", Proc. of 2003 International Conference on Computers, Communications and Systems, Vol.1, pp.69-74, Feb. 2003
Yong-Sork HER, Kouichi SAKURAI, and Shin-Hwan KIM, "Attacks for Finding Collision in Reduced Versions of 3-PASS and 4-PASS HAVAL", Proc. of 2003 International Conference on Computers, Communications and Systems, Vol.1, pp.75-78, Feb. 2003
Katsyuki OKEYA, Kouichi SAKURAI, "A Multiple Power Analysis Breaks the Advanced Version of the Randomized Addition-Subtraction Chains Countermeasure against Side Channel Attacks", In 2003 IEEE Information Theory Workshop (ITW 2003), pp.175-178, Mar. 2003
Satoshi KOGA, Kouichi SAKURAI, "Decentralization Methods of Certification Authority Using the Digital Signature Schemes", Proc. of 2nd Annual PKI Research Workshop, pp.54-64, Apr. 2003
Yong-Sork HER, Kouichi SAKURAI, "Ballot-Cancellation Protocol of E-voting Based on Two Independent Authorities", The XIII ACME International Conference on Pacific Rim Management, Jul. 2003
Yong-Sork HER, Kouichi SAKURAI, "Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V", Workshop on Coding, Cryptography & Combinatorics , Aug. 2003
Kazuhide FUKUSHIMA, Kouichi SAKURAI, "A Software Fingerprinting Scheme for Java Using Classfiles Obfuscation", Proc. of the 4th International Workshop on Information Security Applications (WISA2003), pp.337-350, Aug. 2003
Yuki KOTEGAWA, Kouichi SAKURAI, "A Tampering Detection Mechanism using a Trusted Host for Mobile Agents", Proc. of the 2003 International Workshop on CRYPTOLOGY AND NETWORK SECURITY (CANS2003), pp.618-623, Sep. 2003
Yong-Sork HER, Kouichi SAKURAI, "Block Cipher with Variable Output Word-Size Based on SHA-V :SHACAL-V", Proc. of Korea Institute of Information Security & Cryptology, Yeong Nam Branch, Vol.1, pp.94-103, Feb. 2003
今本健二,櫻井幸一, "Authenticated Key Transport System Using One-time ID With Trusted Third Party", International Symposium on Information Science and Electrical Engineering 2003 (ISEE 2003), pp.138–141
Yong-Sork HER, Kouichi SAKURAI, "The Extended Receipt-Free Scheme for E- Auction", International Symposium on Information Science and Electrical Engineering 2003 (ISEE 2003), Nov. 2003
Kazuhide FUKUSHIMA, Toshihiro TABATA, Kouichi SAKURAI, "Proposal and Evaluation of Obfuscation Scheme for Java Source Codes by Partial Destruction of Encapsulation", International Symposium on InformationScience and Electrical Engineering 2003 (ISEE 2003), Nov. 2003
Manabu IWANAGA, Toshihiro TABATA, Kouichi SAKURAI, "Preventing Spam Disguised as Error Mail", International Symposium on InformationScience and Electrical Engineering 2003 (ISEE 2003), Nov. 2003
Satoshi KOGA, Kouichi SAKURAI, "A Decentralizing Method of Certification Authority Using Key-Insulated Signature Scheme", International Symposium on InformationScience and Electrical Engineering 2003 (ISEE 2003), Nov. 2003
Yuki KOTEGAWA, Toshihiro TABATA, Kouichi SAKURAI, "Route Detecting System using Multi-Agent for Mobile Agents", International Symposium on InformationScience and Electrical Engineering 2003 (ISEE 2003), Nov. 2003
JaeGwi Choi, Kouichi Sakurai, JiHwan Park, "An Efficient Fingerprinting Scheme with Proxy Signatures", 暗号と情報セキュリティシンポジウム(SCIS2003), Jan. 2003
JaeGwi Choi, Kouichi Sakurai, JiHwan Park, "An Anonymous Fingerprinting Scheme with a Strong Anonymity and a True Asymmetry", 暗号と情報セキュリティシンポジウム(SCIS2003), Jan. 2003
JaeGwi Choi, Kouichi Sakurai, JiHwan Park, "An Efficient Anonymous Digital Fingerprinting Scheme For Multiple Purchases Using Message Recovery Signature", Korea Information Security Society , Feb. 2003
今本 健二, 櫻井 幸一, "利用者の個人情報を保護した電子伝言板の設計", 情報基盤センター年報第3号, 九州大学情報基盤センター, pp.31-36, Mar. 2003
Yasuyuki SAKAI, Kouichi SAKURAI, "Speeding Up Elliptic Scalar Multiplication Using Multidoubling", IEICE Transactions, E85-A, No.5, pp.1075-1083, May 2002
Katsuyuki OKEYA, Kouichi SAKURAI, "A Scalar Multiplication Algorithm with Recovery of the y-Coordinate on the Montgomery Form and Analysis of Efficiency for Elliptic Curve Cryptosystems", IEICE Transactions, Vol.E85-A No.1, pp.84-93, January 2002
Soichi FURUYA, Kouichi SAKURAI, "Risks with Raw-key Masking the Security Evaluation of 2-key XCBC", The 4th International on Conference Information and Communications Security (ICICS 2002), LNCS 2513, pp.327-341, Dec. 2002
今本健二, 櫻井幸一, "A Certified E-mail System With Receiver's Selective Usage of Delivery Authority", Third International Cryptology Conference in India (INDOCRYPT2002), LNCS 2551, pp.326-338, Dec. 2002
M. W. DAVID, K. SAKURAI, "Enhancing Airport Security by Using Contactless Smart Cards with Biometric Features for Identity Authentication and Access Control", Proc. of Third IWAR Conf. 2002, Nov. 2002
Yasuyuki SAKAI, Kouichi SAKURAI, "Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars", Information Security Conference (ISC 2002), LNCS 2433, pp.484-499, Sep. 2002
Soichi FURUYA, Kouichi SAKURAI, "Single-path Authenticated-encryption Scheme Based on Universal Hashing", The 9th Annual Workshop SAC 2002, LNCS 2595, pp.94-109, Aug. 2002
Katsuyuki OKEYA, Kouichi SAKURAI, "Fast Multi-Scalar Multiplication Methods on Elliptic Curves with Precomputation Strategy using Montgomery Trick", Cryptographic Hardware and Embedded System (CHES 2002), LNCS2523, pp.564-578, Aug. 2002
M. W. DAVID, K. SAKURAI, "Multiple Biometric Feature Contactless Smart Card for Airport Identity Authentication and Access Control", Proc. of The Third Int. Workshop on Information Security Applications, pp.369--385, Aug. 2002
Yong-Sork HER, Kouichi SAKURAI, "Multi-Candidate E-Voting System for Absentee", Proc. of the 2002 Korea-Japan Joint Symposium on Advanced Engineering & Science, Vol.1, pp.111-117, Aug. 2002
今本健二, 櫻井幸一, "A Scalable On-line Certified E-mail Protocol Using Password Authentication", Proc. of the 3rd International Workshop on Information Security Applications (WISA2002), pp.319-331, Aug. 2002.
Katsuyuki OKEYA, Kouichi SAKURAI, "On Insecurity of the Side Channel Attack Countermeasure using Addition-Subtraction Chains under Distinguishability between Addition and Doubling", Information Security and Privacy, 7th Australasian Conference (ACISP 2002), LNCS2384, pp.420-435, Jul. 2002
Yong-Sork HER, Kouichi SAKURAI, "Design and Analysis Cryptographic Hash Function for The Next Generation", Proc. of International Workshop on Information & Electrical Engineering, Vol.1, pp.168-173, May. 2002
Yong-Sork HER, Jung-Gyu KIM and Kouichi SAKURAI, "The Current State and Issue on the Implementation of Electronic Voting System Internet", Proc. of Pan-Yellow-Sea International Workshop On Information Technologies for Network Era (PYIWIT), pp96-103, Mar. 2002
Yong-Sork HER and Kouichi SAKURAI, "A Design of Cryptographic Hash function Group with Variable Output-Length Based on SHA-1", 情報セキュリティ研究会(ISEC), 信学技報Vol.102 No.212, pp.69-76, Jul. 2002
Kouichi SAKURAI, "A Theory of Demonstrating Program Result-Correctness with Cryptographic Applications", IEICE Transactions, Vol.E84-D, No.1, pp.4-14, Jan. 2001.
Yasuyuki SAKAI, Kouichi SAKURAI, "Efficient Scalar Multiplications on Elliptic Curves with Direct Computations of Several Doublings", IEICE Transactions, E84-A, No.1, pp.120-129, Jan. 2001.
Shingo MIYAZAKI, Kouichi SAKURAI, Moti YUNG, "On Distributed Cryptographic Protocols for Threshold RSA Signing and Decrypting with No Dealer", IEICE Transactions, Vol.E84-A No.5 pp.1177-1183, May 2001.
Katsuyuki OKEYA, Kunihiko MIYAZAKI, Kouichi SAKURAI, "A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks", The 4th International Conference on Information Security and Cryptology (ICISC 2001), LNCS2288, pp. 428-439, Dec. 2001.
Katsuyuki OKEYA, Kouichi SAKURAI, "Efficient Elliptic Curve Cryptosystems from a Scalar Multiplication Algorithm with Recovery of the y-Coordinate on a Montgomery-Form Elliptic Curve", Cryptographic Hardware and Embedded System (CHES 2001), LNCS2162, pp.126-141, May. 2001.
Yasuyuki SAKAI, Kouichi SAKURAI, "On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication", Eighth Annual Workshop on Selected Areas in Cryptography (SAC 2001), LNCS 2259, pp.268-283, Aug. 2001.
J. Buchmann, K. SAKURAI, T. TAKAGI, "An IND-CCA2 Public Key Cryptosystem with Fast Decryption", The 4th International Conference on Information Security and Cryptology, pp.51-71, Dec. 2001.
M. NISHIOKA, H. SATOH, K. SAKURAI, "Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring", The 4th International Conference on Information Security and Cryptology, pp.81-102. Dec. 2001.
櫻井 幸一, "A Progress Report on Lattice Based Public-Key Cryptosystems -- Theoretical Security versus Practical Cryptanalysis", IEICE Transactions, Vol.E83-D, No.3, pp.570-579, Mar. 2000
酒井康行, 櫻井幸一, "On the Practical Performance of Hyperelliptic Curve Cryptosystems in Software Implementation", IEICE Transactions, E83-A, No.4, pp.692-703, Apr. 2000
桶屋 勝幸, 櫻井 幸一, "Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications", Public Key Cryptography (PKC 2000), LNCS1751, pp.238-257, jan. 2000
酒井康行, 櫻井幸一, "Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance", The 5th Australian Conference on Information Security and Privacy (ACISP 2000), LNCS 1841, pp.314-324, Jul. 2000
桶屋 勝幸, 櫻井 幸一, "Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack", Progress in Cryptology - INDOCRYPT 2000, LNCS1977, pp.178-190, Dec. 2000