Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hirokazu Ishizuka is active.

Publication


Featured researches published by Hirokazu Ishizuka.


public key cryptography | 1998

Secure Hyperelliptic Cryptosystems and Their Performances

Yasuyuki Sakai; Kouichi Sakurai; Hirokazu Ishizuka

We investigate the discrete logarithm problem over jacobian varieties of hyperelliptic curves suitable for public-key cryptosystems, and clarify practical advantages of hyperelliptic cryptosystems compared to the elliptic cryptosystems and to RSA. We focus on the curves defined over the ground field of characteristic 2, and we present hyperelliptic cryptosystems from the jacobian associated with curves C : v 2 + v=u 2g+1 of genus g=3 and 11, which are secure against the known attacks. We further discuss the efficiency in implementation of such secure hyperelliptic cryptosystems.


Physics Letters A | 2004

How much security does Y-00 protocol provide us?

Tsuyoshi Nishioka; Toshio Hasegawa; Hirokazu Ishizuka; Kentaro Imafuku; Hideki Imai

Abstract New quantum cryptography, often called Y-00 protocol, has much higher performance than the conventional quantum cryptographies. It seems that the conventional quantum cryptographic attacks are inefficient at Y-00 protocol as its security is based on the different grounds from that of the conventional ones. We have, then, tried to cryptoanalyze Y-00 protocol in the view of cryptographic communication system. As a result, it turns out that the security of Y-00 protocol is equivalent to that of classical stream cipher.


australasian conference on information security and privacy | 2001

Error Detection and Authentication in Quantum Key Distribution

Akihiro Yamamura; Hirokazu Ishizuka

Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. Our aim is to propose practical methods for error detection and authentication in quantum key distribution schemes. We introduce several concepts about neighborhood collision free properties of Boolean functions, which are closely related to hash functions, and propose methods based on neighborhood collision free functions and error correcting codes such as Reed-Solomon code. We also examine whether or not widely used cryptographic hash functions SHA-1 and MD5 satisfy the neighborhood collision free property by computation experiments.


IEEE Photonics Technology Letters | 2002

Circular type quantum key distribution

Tsuyoshi Nishioka; Hirokazu Ishizuka; Toshio Hasegawa; Junichi Abe


Archive | 2002

Crytographic communication apparatus

Tsuyoshi Nishioka; Hirokazu Ishizuka; Toshio Hasegawa


Archive | 2001

Optical signal transmitter and optical signal transmitting method

Tsuyoshi Nishioka; Toshio Hasegawa; Hirokazu Ishizuka


Archive | 2004

Quantum cryptographic communication apparatus

Tsuyoshi Nishioka; Toshio Hasegawa; Hirokazu Ishizuka


Physics Letters A | 2005

Reply to: ¿Comment on: `How much security does Y-00 protocol provide us?¿¿¿ [Phys. Lett. A 346 (2005) 1]

Tsuyoshi Nishioka; Toshio Hasegawa; Hirokazu Ishizuka; Kentaro Imafuku; Hideki Imai


Archive | 2004

Photon detecting apparatus and optical communication system

Junichi Abe; Katsuhiro Shimizu; Toshio Hasegawa; Tsuyoshi Nishioka; Hirokazu Ishizuka


Archive | 2002

quote)Circular type(quote) quantum key distribution

Tsuyoshi Nishioka; Hirokazu Ishizuka; Toshiharu Hasegawa; Junichi Abe

Collaboration


Dive into the Hirokazu Ishizuka's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Akihiro Yamamura

National Institute of Information and Communications Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge