Edit Profile Sakurai, Kouichi Compute Distance To: Compute Author ID: sakurai.kouichi Published as: Sakurai, K.; Sakurai, Kouichi Documents Indexed: 112 Publications since 1988, including 7 Books all top 5 Co-Authors 2 single-authored 10 Sakai, Yasuyuki 10 Takagi, Tsuyoshi 8 Yasuda, Takanori 7 Itoh, Toshiya 7 Okeya, Katsuyuki 6 Nishide, Takashi 6 Shizuya, Hiroki 5 Miyazaki, Shingo 4 Imamoto, Kenji 4 Weng, Jian 4 Yanbe, Akio 4 Yung, Moti 3 Adhikari, Avishek 3 Anada, Hiroaki 3 Bag, Samiran 3 Di Crescenzo, Giovanni 3 Hori, Yoshiaki 3 Lee, Sangjin 3 Lee, Wonil 2 Dahan, Xavier 2 Deng, Robert Huijie 2 Furuya, Soichi 2 Ghosh, Debdas 2 Giri, Debasis 2 Han, Dong-Guk 2 Inoue, Toru 2 Ishizuka, Hirokazu 2 Kim, Tai-hoon 2 Lim, Jongin 2 Liu, Shengli 2 Mambo, Masahiro 2 Mohapatra, Ram Narayan 2 Morozov, Kirill 2 Nandi, Mridul 2 Okamoto, Eiji 2 Okamoto, Tatsuaki 2 Savaş, Ekrem 2 Ślęzak, Dominik 2 Vasilakos, Thanos 2 Yang, Yanjiang 2 Zhao, Fangming 2 Zhao, Liang 2 Zhao, Yunlei 1 Araragi, Tadashi 1 Arita, Seiko 1 Bao, Feng 1 Buchmann, Johannes A. 1 Burmester, Mike V. D. 1 Chang, Alan Chin-Chen 1 Chang, Donghoon 1 Cheng, Chen-Mou 1 Choi, Jae-Gwi 1 Chou, Bin-Hui 1 Dannoura, Eisuke 1 Das, Angsuman 1 David, Michael W. 1 Desmedt, Yvo G. 1 Duursma, Iwan Maynard 1 Fukushima, Kazuhide 1 Furuya, Souichi 1 Hada, Satoshi 1 Han, Yi 1 Hashimoto, Yasufumi 1 Hong, Seokhie 1 Huang, Yun-Ju 1 Iwama, Kazuo 1 Izu, Tetsuya 1 Kawamoto, Junpei 1 Kawamura, Shinichi 1 Kiyomoto, Shinsaku 1 Koga, Satoshi 1 Kuroda, Ikuko 1 Kurosawa, Kaoru 1 Kurumatani, Hiroyuki 1 Lai, Junzuo 1 Li, Mingchu 1 Lu, Haibing 1 Ma, Changshe 1 Matsumoto, Tsutomu 1 Matsushima, Tomohiro 1 Meng, Weizhi 1 Miyazaki, Kunihiko 1 Murayama, Yuko 1 Nishioka, Mototsugu 1 Obana, Satoshi 1 Okumura, Shinya 1 Park, Jihwan 1 Rannenberg, Kai 1 Rhee, Kyung Hyune 1 Ruj, Sushmita 1 Saito, Takeshi 1 Sakai, Akihiro 1 Sarathi Roy, Partha 1 Sarkar, Palash 1 Satoh, Hisayoshi 1 Shikata, Yoshihiro 1 Singh, L. P. S. 1 Som, Tanmoy 1 Su, Chunhua 1 Suga, Takanori ...and 19 more Co-Authors all top 5 Serials 5 RIMS Kokyuroku 3 Communications in Computer and Information Science 2 Information Processing Letters 2 Theoretical Computer Science 2 Journal of Cryptology 2 MI Lecture Note 1 Memoirs of the Faculty of Science. Series A. Mathematics 1 SIAM Journal on Mathematical Analysis 1 Lecture Notes in Computer Science 1 Advances in Mathematics of Communications 1 ACM Communications in Computer Algebra 1 Journal of Math-for-Industry 1 Springer Proceedings in Mathematics & Statistics 1 Pacific Journal of Mathematics for Industry all top 5 Fields 92 Information and communication theory, circuits (94-XX) 53 Computer science (68-XX) 11 Algebraic geometry (14-XX) 8 Number theory (11-XX) 7 General and overarching topics; collections (00-XX) 4 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 3 Numerical analysis (65-XX) 3 Quantum theory (81-XX) 1 Combinatorics (05-XX) 1 Group theory and generalizations (20-XX) 1 Special functions (33-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 47 Publications have been cited 95 times in 86 Documents Cited by ▼ Year ▼ Poisson equation solver with fourth-order accuracy by using interpolated differential operator scheme. Zbl 0999.65114Sakurai, K.; Aoki, T.; Lee, W.-H.; Kato, K. 10 2002 Elliptic curves with the Montgomery-form and their cryptographic applications. Zbl 0969.94021Okeya, Katsuyuki; Kurumatani, Hiroyuki; Sakurai, Kouichi 6 2000 Efficient algorithms for the Jacobian variety of hyperelliptic curves \(y^2=x^p-x+1\) over a finite field of odd characteristic \(p\). Zbl 1009.11047Duursma, Iwan; Sakurai, Kouichi 5 2000 On the complexity of constant round ZKIP of possession of knowledge. Zbl 0938.68634Itoh, Toshiya; Sakurai, Kouichi 5 1993 Security analysis of a 2/3-rate double length compression function in the black-box model. Zbl 1140.94364Nandi, Mridul; Lee, Wonil; Sakurai, Kouichi; Lee, Sangjin 4 2005 The next generation CIP as a conservative semi-Lagrangian solver for solid, liquid and gas. Zbl 1058.76055Yabe, T.; Ogata, Y.; Takizawa, K.; Kawai, T.; Segawa, A.; Sakurai, K. 4 2002 A multivariate encryption scheme with Rainbow. Zbl 1384.94109Yasuda, Takanori; Sakurai, Kouichi 3 2016 Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the \(y\)-coordinate on a Montgomery-form elliptic curve. Zbl 1012.94551Okeya, Katsuyuki; Sakurai, Kouichi 3 2001 An anonymous electronic bidding protocol based on a new convertible group signature scheme. On the importance of hiding the winner’s identity against bid-rigging. Zbl 0963.94519Sakurai, Kouichi; Miyazaki, Shingo 3 2000 An improvement on El-Yaniv-Fiat-Karp-Turpin’s money-making bi-directional trading strategy. Zbl 0937.91061Dannoura, Eisuke; Sakurai, Kouichi 3 1998 4 move perfect ZKIP of knowledge with no assumption. Zbl 0938.68635Saito, Takeshi; Kurosawa, Kaoru; Sakurai, Kouichi 3 1993 A security analysis of uniformly-layered Rainbow. Revisiting Sato-Araki’s non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm. Zbl 1290.94159Yasuda, Takanori; Sakurai, Kouichi 2 2011 Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. Zbl 1131.94327Choi, Jae-Gwi; Sakurai, Kouichi; Park, Ji-Hwan 2 2003 A reject timing attack on an IND-CCA2 public-key cryptosystem. Zbl 1031.94526Sakurai, Kouichi; Takagi, Tsuyoshi 2 2003 Fast multi-scalar multiplication methods on elliptic curves with precomputation strategy using Montgomery trick. Zbl 1028.94025Okeya, Katsuyuki; Sakurai, Kouichi 2 2002 A second-order DPA attack breaks a window-method based countermeasure against side channel attacks. Zbl 1019.68574Okeya, Katsuyuki; Sakurai, Kouichi 2 2002 Design of hyperelliptic cryptosystems in small characteristic and a software implementation over \(F_{2^n}\). Zbl 1058.94523Sakai, Yasuyuki; Sakurai, Kouichi 2 1998 Secure hyperelliptic cryptosystems and their performance. Zbl 1067.94561Sakai, Yasuyuki; Sakurai, Kouichi; Ishizuka, Hirokazu 2 1998 Improving linear cryptanalysis of LOKI91 by probabilistic counting method. Zbl 1385.94069Sakurai, Kouichi; Furuya, Souichi 2 1997 Relationships among the computational powers of breaking discrete log cryptosystems. Zbl 0973.94524Sakurai, Kouichi; Shizuya, Hiroki 2 1995 How intractable is the discrete logarithm for a general finite group? Zbl 0801.68089Okamoto, Tatsuaki; Sakurai, Kouichi; Shizuya, Hiroki 2 1993 Efficient threshold secret sharing schemes secure against rushing cheaters. Zbl 1407.94166Adhikari, Avishek; Morozov, Kirill; Obana, Satoshi; Roy, Partha Sarathi; Sakurai, Kouichi; Xu, Rui 1 2016 CCA-secure keyed-fully homomorphic encryption. Zbl 1388.94067Lai, Junzuo; Deng, Robert H.; Ma, Changshe; Sakurai, Kouichi; Weng, Jian 1 2016 Multivariate signature scheme using quadratic forms. Zbl 1306.94098Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi 1 2013 Application of scalar multiplication of Edwards curves to pairing-based cryptography. Zbl 1292.94158Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi 1 2012 Multi-user keyword search scheme for secure data sharing with fine-grained access control. Zbl 1365.94473Zhao, Fangming; Nishide, Takashi; Sakurai, Kouichi 1 2012 Reducing the key size of rainbow using non-commutative rings. Zbl 1292.94157Yasuda, Takanori; Sakurai, Kouichi; Takagi, Tsuyoshi 1 2012 Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. Zbl 1325.68086Zhao, Fangming; Nishide, Takashi; Sakurai, Kouichi 1 2011 Adaptive and composable non-committing encryptions. Zbl 1323.94146Zhu, Huafei; Araragi, Tadashi; Nishide, Takashi; Sakurai, Kouichi 1 2010 Ternary subset difference method and its quantitative analysis. Zbl 1352.94036Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi 1 2009 Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network. Zbl 1197.68021Wang, Yufeng; Hori, Yoshiaki; Sakurai, Kouichi 1 2007 A note on the (im)possibility of using obfuscators to transform private-key encryption into public-key encryption. Zbl 1391.94756Hada, Satoshi; Sakurai, Kouichi 1 2007 Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic. Zbl 1272.94082Imamoto, Kenji; Sakurai, Kouichi 1 2005 A generalization of PGV-hash functions and security analysis in black-box model. Zbl 1098.94622Lee, Wonil; Nandi, Mridul; Sarkar, Palash; Chang, Donghoon; Lee, Sangjin; Sakurai, Kouichi 1 2004 A new attack with side channel leakage during exponent recoding computations. Zbl 1104.68495Sakai, Yasuyuki; Sakurai, Kouichi 1 2004 New semantically secure public-key cryptosystems from the RSA-primitive. Zbl 1055.94530Sakurai, Kouichi; Takagi, Tsuyoshi 1 2002 A certified e-mail system with receiver’s selective usage of delivery authority. Zbl 1033.94559Imamoto, Kenji; Sakurai, Kouichi 1 2002 On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling. Zbl 1024.94512Okeya, Katsuyuki; Sakurai, Kouichi 1 2002 A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks. Zbl 0999.94541Okeya, Katsuyuki; Miyazaki, Kunihiko; Sakurai, Kouichi 1 2002 An IND-CCA2 public-key cryptosystem with fast decryption. Zbl 0999.94527Buchmann, Johannes; Sakurai, Kouichi; Takagi, Tsuyoshi 1 2002 Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. Zbl 0963.94026Okeya, Katsuyuki; Sakurai, Kouichi 1 2000 Divertible and subliminal-free zero-knowledge proofs for languages. Zbl 1013.68083Burmester, Mike; Desmedt, Yvo G.; Itoh, Toshiya; Sakurai, Kouichi; Shizuya, Hiroki 1 1999 How to utilize the transformability of digital signatures for solving the oracle problem. Zbl 1004.94546Mambo, Masahiro; Sakurai, Kouichi; Okamoto, Eiji 1 1996 On designing optimal on-line algorithms for task systems against random players. Zbl 0925.90411Yanbe, Akio; Sakurai, Kouichi 1 1996 Subliminal channels for signature transfer and their application to signature distribution schemes. Zbl 1096.68616Sakurai, Kouichi; Itoh, Toshiya 1 1993 On the discrepancy between serial and parallel of zero-knowledge protocols. Zbl 0925.68144Sakurai, Kouichi; Itoh, Toshiya 1 1993 On the complexity of hyperelliptic discrete logarithm problem. Zbl 0791.68081Shizuya, Hiroki; Itoh, Toshiya; Sakurai, Kouichi 1 1991 A multivariate encryption scheme with Rainbow. Zbl 1384.94109Yasuda, Takanori; Sakurai, Kouichi 3 2016 Efficient threshold secret sharing schemes secure against rushing cheaters. Zbl 1407.94166Adhikari, Avishek; Morozov, Kirill; Obana, Satoshi; Roy, Partha Sarathi; Sakurai, Kouichi; Xu, Rui 1 2016 CCA-secure keyed-fully homomorphic encryption. Zbl 1388.94067Lai, Junzuo; Deng, Robert H.; Ma, Changshe; Sakurai, Kouichi; Weng, Jian 1 2016 Multivariate signature scheme using quadratic forms. Zbl 1306.94098Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi 1 2013 Application of scalar multiplication of Edwards curves to pairing-based cryptography. Zbl 1292.94158Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi 1 2012 Multi-user keyword search scheme for secure data sharing with fine-grained access control. Zbl 1365.94473Zhao, Fangming; Nishide, Takashi; Sakurai, Kouichi 1 2012 Reducing the key size of rainbow using non-commutative rings. Zbl 1292.94157Yasuda, Takanori; Sakurai, Kouichi; Takagi, Tsuyoshi 1 2012 A security analysis of uniformly-layered Rainbow. Revisiting Sato-Araki’s non-commutative approach to Ong-Schnorr-Shamir signature towards postquantum paradigm. Zbl 1290.94159Yasuda, Takanori; Sakurai, Kouichi 2 2011 Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems. Zbl 1325.68086Zhao, Fangming; Nishide, Takashi; Sakurai, Kouichi 1 2011 Adaptive and composable non-committing encryptions. Zbl 1323.94146Zhu, Huafei; Araragi, Tadashi; Nishide, Takashi; Sakurai, Kouichi 1 2010 Ternary subset difference method and its quantitative analysis. Zbl 1352.94036Fukushima, Kazuhide; Kiyomoto, Shinsaku; Tanaka, Toshiaki; Sakurai, Kouichi 1 2009 Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network. Zbl 1197.68021Wang, Yufeng; Hori, Yoshiaki; Sakurai, Kouichi 1 2007 A note on the (im)possibility of using obfuscators to transform private-key encryption into public-key encryption. Zbl 1391.94756Hada, Satoshi; Sakurai, Kouichi 1 2007 Security analysis of a 2/3-rate double length compression function in the black-box model. Zbl 1140.94364Nandi, Mridul; Lee, Wonil; Sakurai, Kouichi; Lee, Sangjin 4 2005 Design and analysis of Diffie-Hellman-based key exchange using one-time ID by SVO logic. Zbl 1272.94082Imamoto, Kenji; Sakurai, Kouichi 1 2005 A generalization of PGV-hash functions and security analysis in black-box model. Zbl 1098.94622Lee, Wonil; Nandi, Mridul; Sarkar, Palash; Chang, Donghoon; Lee, Sangjin; Sakurai, Kouichi 1 2004 A new attack with side channel leakage during exponent recoding computations. Zbl 1104.68495Sakai, Yasuyuki; Sakurai, Kouichi 1 2004 Does it need trusted third party? Design of buyer-seller watermarking protocol without trusted third party. Zbl 1131.94327Choi, Jae-Gwi; Sakurai, Kouichi; Park, Ji-Hwan 2 2003 A reject timing attack on an IND-CCA2 public-key cryptosystem. Zbl 1031.94526Sakurai, Kouichi; Takagi, Tsuyoshi 2 2003 Poisson equation solver with fourth-order accuracy by using interpolated differential operator scheme. Zbl 0999.65114Sakurai, K.; Aoki, T.; Lee, W.-H.; Kato, K. 10 2002 The next generation CIP as a conservative semi-Lagrangian solver for solid, liquid and gas. Zbl 1058.76055Yabe, T.; Ogata, Y.; Takizawa, K.; Kawai, T.; Segawa, A.; Sakurai, K. 4 2002 Fast multi-scalar multiplication methods on elliptic curves with precomputation strategy using Montgomery trick. Zbl 1028.94025Okeya, Katsuyuki; Sakurai, Kouichi 2 2002 A second-order DPA attack breaks a window-method based countermeasure against side channel attacks. Zbl 1019.68574Okeya, Katsuyuki; Sakurai, Kouichi 2 2002 New semantically secure public-key cryptosystems from the RSA-primitive. Zbl 1055.94530Sakurai, Kouichi; Takagi, Tsuyoshi 1 2002 A certified e-mail system with receiver’s selective usage of delivery authority. Zbl 1033.94559Imamoto, Kenji; Sakurai, Kouichi 1 2002 On insecurity of the side channel attack countermeasure using addition-subtraction chains under distinguishability between addition and doubling. Zbl 1024.94512Okeya, Katsuyuki; Sakurai, Kouichi 1 2002 A fast scalar multiplication method with randomized projective coordinates on a Montgomery-form elliptic curve secure against side channel attacks. Zbl 0999.94541Okeya, Katsuyuki; Miyazaki, Kunihiko; Sakurai, Kouichi 1 2002 An IND-CCA2 public-key cryptosystem with fast decryption. Zbl 0999.94527Buchmann, Johannes; Sakurai, Kouichi; Takagi, Tsuyoshi 1 2002 Efficient elliptic curve cryptosystems from a scalar multiplication algorithm with recovery of the \(y\)-coordinate on a Montgomery-form elliptic curve. Zbl 1012.94551Okeya, Katsuyuki; Sakurai, Kouichi 3 2001 Elliptic curves with the Montgomery-form and their cryptographic applications. Zbl 0969.94021Okeya, Katsuyuki; Kurumatani, Hiroyuki; Sakurai, Kouichi 6 2000 Efficient algorithms for the Jacobian variety of hyperelliptic curves \(y^2=x^p-x+1\) over a finite field of odd characteristic \(p\). Zbl 1009.11047Duursma, Iwan; Sakurai, Kouichi 5 2000 An anonymous electronic bidding protocol based on a new convertible group signature scheme. On the importance of hiding the winner’s identity against bid-rigging. Zbl 0963.94519Sakurai, Kouichi; Miyazaki, Shingo 3 2000 Power analysis breaks elliptic curve cryptosystems even secure against the timing attack. Zbl 0963.94026Okeya, Katsuyuki; Sakurai, Kouichi 1 2000 Divertible and subliminal-free zero-knowledge proofs for languages. Zbl 1013.68083Burmester, Mike; Desmedt, Yvo G.; Itoh, Toshiya; Sakurai, Kouichi; Shizuya, Hiroki 1 1999 An improvement on El-Yaniv-Fiat-Karp-Turpin’s money-making bi-directional trading strategy. Zbl 0937.91061Dannoura, Eisuke; Sakurai, Kouichi 3 1998 Design of hyperelliptic cryptosystems in small characteristic and a software implementation over \(F_{2^n}\). Zbl 1058.94523Sakai, Yasuyuki; Sakurai, Kouichi 2 1998 Secure hyperelliptic cryptosystems and their performance. Zbl 1067.94561Sakai, Yasuyuki; Sakurai, Kouichi; Ishizuka, Hirokazu 2 1998 Improving linear cryptanalysis of LOKI91 by probabilistic counting method. Zbl 1385.94069Sakurai, Kouichi; Furuya, Souichi 2 1997 How to utilize the transformability of digital signatures for solving the oracle problem. Zbl 1004.94546Mambo, Masahiro; Sakurai, Kouichi; Okamoto, Eiji 1 1996 On designing optimal on-line algorithms for task systems against random players. Zbl 0925.90411Yanbe, Akio; Sakurai, Kouichi 1 1996 Relationships among the computational powers of breaking discrete log cryptosystems. Zbl 0973.94524Sakurai, Kouichi; Shizuya, Hiroki 2 1995 On the complexity of constant round ZKIP of possession of knowledge. Zbl 0938.68634Itoh, Toshiya; Sakurai, Kouichi 5 1993 4 move perfect ZKIP of knowledge with no assumption. Zbl 0938.68635Saito, Takeshi; Kurosawa, Kaoru; Sakurai, Kouichi 3 1993 How intractable is the discrete logarithm for a general finite group? Zbl 0801.68089Okamoto, Tatsuaki; Sakurai, Kouichi; Shizuya, Hiroki 2 1993 Subliminal channels for signature transfer and their application to signature distribution schemes. Zbl 1096.68616Sakurai, Kouichi; Itoh, Toshiya 1 1993 On the discrepancy between serial and parallel of zero-knowledge protocols. Zbl 0925.68144Sakurai, Kouichi; Itoh, Toshiya 1 1993 On the complexity of hyperelliptic discrete logarithm problem. Zbl 0791.68081Shizuya, Hiroki; Itoh, Toshiya; Sakurai, Kouichi 1 1991 all cited Publications top 5 cited Publications all top 5 Cited by 196 Authors 5 Aoki, Takayuki 4 Imai, Yohsuke 4 Sakurai, Kouichi 4 Takagi, Tsuyoshi 3 Sussman, Mark 2 Duong, Dung Hoang 2 Feng, Dengguo 2 Feng, Xinlong 2 He, Yinnian 2 Kadioglu, Samet Y. 2 Li, Hongda 2 Mohanty, Ranjan Kumar 2 Petzoldt, Albrecht 2 Sarkar, Palash 2 Schmidt, Günter 2 Susilo, Willy 2 Yasuda, Takanori 2 Zhai, Shuying 1 Adhikari, Avishek 1 Akishita, Toru 1 Ansari, Bijan 1 Arienti, Marco 1 Ateniese, Giuseppe 1 Barreto, Paulo S. L. M. 1 Batina, Lejla 1 Bellini, Emanuele 1 Bhattacherjee, Sanjay 1 Boneh, Dan 1 Brakerski, Zvika 1 Brzuska, Christina 1 Cao, Xuefei 1 Cao, Zhenfu 1 Castagnos, Guilhem 1 Castryck, Wouter 1 Chen, Jiahui 1 Chen, Yuchi 1 Cheng, Qi 1 Cherepnev, Mikhail A. 1 Choe, Junyop 1 Costello, Craig 1 De Capitani di Vimercati, Sabrina 1 Di Crescenzo, Giovanni 1 Dominguez-Oviedo, Agustin 1 Emura, Keita 1 Fan, Junfeng 1 Fan, Kai 1 Fang, Liming 1 Fischer, Michael J. 1 Fleischhacker, Nils 1 Foresti, Sara 1 Fujisaki, Eiichiro 1 Fung, Stanley P. Y. 1 Galbraith, Steven D. 1 Ge, Chunpeng 1 Geiselmann, Willi 1 Genelle, Laurie 1 Guan, Dengjun 1 Han, Dong-Guk 1 Han, Guangguo 1 Hanaoka, Goichiro 1 Harasawa, Ryuichi 1 Hasan, M. Anwar 1 Henderson, Nélio 1 Heng, Swee-Huay 1 Hong, Fan 1 Hong, Sekung 1 Hong, Seokhie 1 Horng, Gwoboa 1 Hu, Yupu 1 Huang, Chang-Chin 1 Huang, Ming-Deh A. 1 Ikematsu, Yasuhiko 1 Imai, Hideki 1 Jemison, Matthew 1 Jia, Chunfu 1 Jia, Tiejun 1 Jiang, Zoe L. 1 Joye, Marc 1 Kang, Myungjoo 1 Karati, Sabyasachi 1 Katz, Jonathan N. 1 Khan, Rahmat Ali 1 Kim, Kwang Ho 1 Kim, Namsu 1 Kim, Song Yun 1 Kim, Taehyun 1 Knudsen, Lars Ramkilde 1 Kobayashi, Hiromichi 1 Kou, Weidong 1 Kudo, Aichi 1 Laguillaumie, Fabien 1 Lai, Xuejia 1 Lau, Terry Shue Chien 1 Le, Duc-Phong 1 Lee, Eunjeong 1 Lee, Hyangsook 1 Lee, Jesang 1 Lee, Yoonjin 1 Li, Bao 1 Li, Jin ...and 96 more Authors all top 5 Cited in 33 Serials 8 Journal of Computational Physics 6 Theoretical Computer Science 6 Journal of Cryptology 4 Information Processing Letters 4 Information Sciences 3 Applied Mathematics and Computation 3 Designs, Codes and Cryptography 3 Wuhan University Journal of Natural Sciences (WUJNS) 2 Journal of Symbolic Computation 2 Finite Fields and their Applications 2 Mathematical Problems in Engineering 2 Advances in Mathematics of Communications 2 Science China. Information Sciences 1 Computers & Mathematics with Applications 1 Discrete Applied Mathematics 1 Mathematical Notes 1 Problems of Information Transmission 1 Journal of Complexity 1 Journal of Computer Science and Technology 1 Computational Mechanics 1 Mathematical and Computer Modelling 1 Journal of Scientific Computing 1 Computational Mathematics and Modeling 1 Japan Journal of Industrial and Applied Mathematics 1 Applicable Algebra in Engineering, Communication and Computing 1 Abstract and Applied Analysis 1 Journal of Combinatorial Optimization 1 Journal of Discrete Algorithms 1 Groups, Complexity, Cryptology 1 Cryptography and Communications 1 Symmetry 1 Pacific Journal of Mathematics for Industry 1 Prikladnaya Diskretnaya Matematika all top 5 Cited in 13 Fields 57 Information and communication theory, circuits (94-XX) 18 Algebraic geometry (14-XX) 17 Computer science (68-XX) 12 Number theory (11-XX) 9 Numerical analysis (65-XX) 8 Fluid mechanics (76-XX) 5 Partial differential equations (35-XX) 3 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 2 Combinatorics (05-XX) 2 Quantum theory (81-XX) 1 Field theory and polynomials (12-XX) 1 Ordinary differential equations (34-XX) 1 Operations research, mathematical programming (90-XX) Citations by Year