KURIHARA Jun   KIYOMOTO Shinsaku   FUKUSHIMA Kazuhide   TANAKA Toshiaki   
IEICE transactions on fundamentals of electronics, communications and computer sciences 92(8) 1808-1821 2009年8月 [査読有り]
Shamir's (k, n)-threshold secret sharing scheme (threshold scheme) has two problems: a heavy computational cost is required to make shares and recover the secret, and a large storage capacity is needed to retain all the shares. As a ...
Carlos Cid   Shinsaku Kiyomoto   Jun Kurihara   
INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS 5927 32-+ 2009年 [査読有り]
In this paper, we introduce the RAKAPOSHI stream cipher The algorithm is based On Dynamic Linear Feedback Shift, Registers, with a simple and potentially scalable design, mid is particularly suitable for hardware applications with restricted resou...
KURIHARA Jun   KIYOMOTO Shinsaku   FUKUSHIMA Kazuhide   TANAKA Toshiaki   
IEICE transactions on fundamentals of electronics, communications and computer sciences 91(9) 2365-2378 2008年9月 [査読有り]
In Shamir's (k,n)-threshold secret sharing scheme (threshold scheme) [1], a heavy computational cost is required to make n shares and recover the secret from k shares. As a solution to this problem, several fast thresho...