160 著者名表示.
発行日 | タイトル |
著者 |
1993 | Elliptic curves over F_p suitable for cryptosystems | Miyaji, Atsuko |
Jan-1993 | Elliptic Curve Cryptosystems Immune to Any Reduction into the Discrete Logarithm Problem | MIYAJI, Atsuko |
Jan-1994 | Elliptic Curves Suitable for Cryptosystems | MIYAJI, Atsuko |
Apr-1994 | On Secure and Fast Elliptic Curve Cryptosystems over F_p | MIYAJI, Atsuko |
1996 | A message recovery signature scheme equivalent to DSA over elliptic curves | Miyaji, Atsuko |
1997 | Efficient elliptic curve exponentiation | Miyaji, Atsuko; Ono, Takatoshi; Cohen, Henri |
Nov-1997 | Another Countermeasure to Forgeries over Message Recovery Signature | MIYAJI, Atsuko |
1998 | Efficient elliptic curve exponentiaion using mixed coordinates | Cohen, Henri; Miyaji, Atsuko; Ono, Takatoshi |
Aug-1999 | 楕円暗号の数理 | 小山, 謙二; 宮地, 充子; 内山, 成憲; KOYAMA, Kenji; MIYAJI, Atsuko; UCHIYAMA, Shigenori |
2000 | An anonymous auction protocol with a single non-trusted center using binary trees | Omote, Kazumasa; Miyaji, Atsuko |
2000 | A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability | Mitomi, Shirow; Miyaji, Atsuko |
22-Mar-2000 | 関連づけ可能な匿名オフライン電子マネー | 小出, 篤史; 多田, 充; 宮地, 充子; KOIDE, ATSUSHI; TADA, MITSURU; MIYAJI, ATSUKO |
22-Mar-2000 | 匿名通信を記述するためのフレームワークについて | 北澤, 繁樹; 双紙, 正和; 宮地, 充子; KITAZAWA, Shigeki; SOSHI, Masakazu; MIYAJI, Atsuko |
10-May-2000 | 匿名通信フレームワークとその評価 | 北澤, 繁樹; 双紙, 正和; 宮地, 充子; KITAZAWA, Shigeki; SOSHI, Masakazu; MIYAJI, Atsuko |
Aug-2000 | オープンネットワークにおける安全な暗号方式の更新に関する考察 | 山田, 竜也; 宮地, 充子; 双紙, 正和; YAMADA, TATSUYA; MIYAJI, ATSUKO; SOSHI, MASAKAZU |
Aug-2000 | 初等的な環状経路を用いた匿名通信方式 | 北澤, 繁樹; 長野, 悟; 双紙, 正和; 宮地, 充子; KITAZAWA, SHIGEKI; NAGANO, SATORU; SOSHI, MASAKAZU; MIYAJI, ATSUKO |
Aug-2000 | Efficient Construction of Elliptic Curves over Optimal Extension Field | Futa, Yuichi; Miyaji, Atsuko |
2001 | A Practical English Auction with One-time Registration | Omote, Kazumasa; Miyaji, Atsuko |
2001 | Characterization of Elliptic Curve Traces under FR-reduction | Miyaji, Atsuko; Nakabayashi, Masaki; Takano, Shunzo |
2001 | Efficient "on the fly" signature schemes based on integer factoring | Okamoto, Takeshi; Tada, Mitsuru; Miyaji, Atsuko |
2001 | Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme | Maeda, Ayako; Miyaji, Atsuko; Tada, Mitsuru |
May-2001 | New Explicit Conditions of Elliptic Curve Traces for FR-Reduction | MIYAJI, Atsuko; NAKABAYASHI, Masaki; TAKANO, Shunzou |
25-Jul-2001 | 意思付多重署名方式についての研究 | 河内, 恵; 多田, 充; 宮地, 充子; KAWAUCHI, Kei; TADA, Mitsuru; MIYAJI, Atsuko |
Aug-2001 | An Anonymous Sealed-bid Auction with a Feature of Entertainment | Omote, Kazumasa; Miyaji, Atsuko |
Aug-2001 | 素因数分解に基づく効率的な署名方式の提案 | 岡本, 健; 多田, 充; 宮地, 充子; OKAMOTO, TAKESHI; TADA, MITSURU; MIYAJI, ATSUKO |
Oct-2001 | A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability | MITOMI, Shirow; MIYAJI, Atsuko |
2002 | Known Plaintext Correlation Attack Against RC5 | Miyaji, Atsuko; Nonaka, Masao; Takii, Yoshinori |
2002 | A multi-signature scheme with signers' intentinos secure against active attacks | Kawauchi, Kei; Minato, Hiroshi; Miyaji, Atsuko; Tada, Mitsuru |
2002 | Cryptanalysis of the reduced-round RC6 | Miyaji, Atsuko; Nonaka, Masao |
Jan-2002 | Improved Correlation Attack on RC5 | MIYAJI, Atsuko; NONAKA, Masao; TAKII, Yoshinori |
May-2002 | A Practical English Auction with Simple Revocation | OMOTE, Kazumasa; MIYAJI, Atsuko |
19-Jul-2002 | 代理入札方式を備えたイングリッシュオークションプロトコル | 塩月, 徹; 宮地, 充子; SHIOTSUKI, Toru; MIYAJI, Atsuko |
Aug-2002 | Provably Secure Multi-signature Scheme with Signers' Intentions | Kawauchi, Kei; Minato, Hiroshi; Miyaji, Atsuko; Tada, Mitsuru |
Aug-2002 | A Second-price Sealed-bid Auction with Public Verifiability | Omote, Kazumasa; Miyaji, Atsuko |
2003 | A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th Root | Omote, Kazumasa; Miyaji, Atsuko |
2003 | Evaluation of Anonymity of Practical Anonymous Communication Networks | Kitazawa, Shigeki; Soshi, Masakazu; Miyaji, Atsuko |
2003 | An Improved Fast Signature Scheme without Online Multiplication | Takeshi Okamoto; Mitsuru Tada; Miyaji, Atsuko |
2003 | Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents | Sakabe, Yusuke; Soshi, Masakazu; Miyaji, Atsuko |
2003 | Optimized χ^2 attack against RC6 | Isogai, Norihisa; Matsunaka, Takashi; Miyaji, Atsuko |
2003 | Anonymity-enhanced Pseudonym System | Tamura, Yuko; Miyaji, Atsuko |
2003 | Intrusion-Resilient Public-Key Encryption | Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti |
Jan-2003 | Cryptanalysis of Reduced-Round RC6 without Whitening | MIYAJI, Atsuko; NONAKA, Masao; TAMURA, Yuko; SHIOTSUKI, Toru; MIYAJI, Atsuko |
Jan-2003 | Cryptanalysis of Reduced-Round RC6 without Whitening | MIYAJI, Atsuko; NONAKA, Masao; TAMURA, Yuko; SHIOTSUKI, Toru; MIYAJI, Atsuko |
Jan-2003 | Software Obfuscation on a Theoretical Basis and Its Implementation | OGISO, Toshio; SAKABE, Yusuke; SOSHI, Masakazu; MIYAJI, Atsuko |
May-2003 | Statistical Analysis of chi-square Attacks | ISOGAI, Norihisa; MIYAJI, Atsuko; NONAKA, Masao |
18-Jul-2003 | 匿名性を強化したグループ署名方式 | 梅田, 梢; 宮地, 充子; UMEDA, Kozue; MIYAJI, Atsuko |
2004 | A Fully-Functional group signature scheme over only known-order group | Miyaji, Atsuko; Umeda, Kozue |
2004 | Success probability in chi-square attacks | Matsunaka, Takashi; Miyaji, Atsuko; Takano, Yuuki |
2004 | Efficient Countermeasures against RPA, DPA, and SPA | Mamiya, Hideyo; Miyaji, Atsuko; Morimoto, Hiroaki |
2004 | A Generic Construction for Intrusion-Resilient Public-Key Encryption | Dodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti |
Aug-2004 | Pushback機構の一提案とそのモデル化に向けて | 寺田, 剛陽; 双紙, 正和; 宮地, 充子; Terada, Takeaki; Soshi, Masakazu; Miyaji, Atsuko |
Aug-2004 | On Anonymity Metrics for Practical Anonymous Communication Protocols | Kitazawa, Shigeki; Soshi, Masakazu; Miyaji, Atsuko |
2005 | On the Success Probability of χ^2 attack on RC6 | Miyaji, Atsuko; Takano, Yuuki |
11-Mar-2005 | Information Security for Privacy Protection | Miyaji, Atsuko |
22-Mar-2005 | モバイルエージェント・セキュリティに関する一考察 | 森, 正行; 双紙, 正和; 宮地, 充子; MORI, Masayuki; SOHSI, Masakazu; MIYAJI, Atsuko |
Apr-2005 | n 次元量子状態を使用した量子コイン投げプロトコル | 早稲田, 篤志; 双紙, 正和; 宮地, 充子; Waseda, Atsushi; Soshi, Masakazu; Miyaji, Atsuko |
Jul-2005 | 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2005年4月ウィーン会議報告 | 宮地, 充子; 近澤, 武; 竜田, 敏男; 大塚, 玲; 安田, 幹; MIYAJI, Atsuko; CHIKAZAWA, Takeshi; TATSUTA, Toshio; OTSUKA, Akira; YASUDA, Kan |
Aug-2005 | Java Obfuscation - Approaches to Construct Tamper-Resistant Object-Oriented Programs | Sakabe, Yusuke; Soshi, Masakazu; Miyaji, Atsuko |
Aug-2005 | Efficient Group Signature Scheme Based on a Modified Nyberg-Rueppel Signature | Miyaji, Atsuko; Umeda, Kozue |
Jul-2006 | 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2006年5月マドリッド会議報告 | 宮地, 充子; 近澤, 武; 竜田, 敏男; 大塚, 玲; 安田, 幹; 森, 健吾; 才所, 敏明; MIYAJI, Atsuko; CHIKAZAWA, Takeshi; TATSUTA, Toshio; OTSUKA, Akira; YASUDA, Kan; MORI, Kengo; SAISHO, Toshiaki |
Aug-2006 | Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA | MAMIYA, Hideyo; MIYAJI, Atsuko; MORIMOTO, Hiroaki |
Aug-2006 | Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae | Mamiya, Hideyo; Miyaji, Atsuko |
2007 | Mobile agent security with efficient oblivious transfer | Hasegawa, Wataru; Soshi, Masakazu; Miyaji, Atsuko |
2007 | Generalized MMM-algorithm Secure against SPA, DPA, and RPA | Miyaji, Atsuko |
Jan-2007 | Evaluation of the Security of RC6 against the χ^2-Attack | MIYAJI, Atsuko; TAKANO, Yuuki |
Jul-2007 | 量子複数秘密分散に関する考察 | 早稲田, 篤志; 双紙, 正和; 宮地, 充子; Waseda, Atsushi; Soshi, Masakazu; Miyaji, Atsuko |
19-Jul-2007 | 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2007年5月ロシア会議報告 | 宮地, 充子; 近澤, 武; 竜田, 敏男; 渡辺, 創; 大熊, 建司; MIYAJI, Atsuko; CHIKAZAWA, Takeshi; TATSUTA, Toshio; WATANABE, Hajime; OHKUMA, Kenji |
Sep-2007 | Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption | Miyaji, Atsuko |
Sep-2007 | The security of RC6 against asymmetric Chi-square test attack | Hinoue, Tomohiko; Miyaji, Atsuko; Wada, Takatomi |
24-Jul-2008 | 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2008年4月京都会議報告 | 宮地, 充子; 近澤, 武; 竜田, 敏男; 渡辺, 創; 大熊, 建司; Miyaji, Atsuko; Chikazawa, Takeshi; Tatsuta, Toshio; Watanabe, Hajime; Ohkuma, Kenji |
15-Sep-2008 | Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point | Miyaji, Atsuko; Mizosoe, Kenji |
Oct-2008 | Security and Access Control for Vehicular Communications | Zrelli, Saber; Miyaji, Atsuko; Shinoda, Yoichi; Ernst, Thierry |
1-Oct-2008 | Generalized Scalar Multiplication Secure against SPA, DPA, and RPA | MIYAJI, Atsuko |
Dec-2008 | Simple Certificateless Signature with Smart Cards | Omote, Kazumasa; Miyaji, Atsuko; Kato, Kazuhiko |
2009 | A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length | Emura, Keita; Miyaji, Atsuko; Nomura, Akito; Omote, Kazumasa; Soshi, Masakazu |
2009 | A Selectable k-Times Relaxed Anonymous Authentication Scheme | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
2009 | New Correlations of RC4 PRGA Using Nonzero-Bit Differences | Miyaji, Atsuko; Sukegawa, Masahiro |
2009 | Elliptic curves with a pre-determined embedding degree | Hirasawa, Shoujirou; Miyaji, Atsuko |
Mar-2009 | A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
Mar-2009 | A Secure RFID Authentication Protocol with Low Communication Cost | Rahman, Mohammad Shahriar; Soshi, Masakazu; Miyaji, Atsuko |
Mar-2009 | A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
2-Sep-2009 | A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
7-Sep-2009 | サイドチャネル攻撃に対して安全な公開鍵暗号に関する研究 | 宮地, 充子; Miyaji, Atsuko |
2010 | A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance | Chen, Jiageng; Miyaji, Atsuko |
2010 | Privacy-Preserving Data Mining in Presence of Covert Adversaries | Miyaji, Atsuko; Rahman, Mohammad Shahriar |
2010 | Efficient Privacy-Preserving Data Mining in Malicious Model | Emura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar |
2010 | Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves | Goundar, Raveen Ravinesh; Joye, Marc; Miyaji, Atsuko |
1-Jun-2010 | New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences | MIYAJI, Atsuko; SUKEGAWA, Masahiro |
2-Jul-2010 | A ciphertext-policy attribute-based encryption scheme with constant ciphertext length | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa; Nomura, Akito; Soshi, Masakazu |
Sep-2010 | Generalized RC4 Key Collisions and Hash Collisions | Chen, Jiageng; Miyaji, Atsuko |
5-Oct-2010 | APRAP: Another Privacy Preserving RFID Authentication Protocol | Miyaji, Atsuko; Rahman, Mohammad Shahriar |
2011 | Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks | Miyaji, Atsuko; Omote, Kazumasa |
2011 | Hidden Credential Retrieval Without Random Oracles | Miyaji, Atsuko; Rahman, Mohammad Shahriar; Soshi, Masakazu |
1-Jan-2011 | Sequential Bitwise Sanitizable Signature Schemes | HANAOKA, Goichiro; HIROSE, Shoichi; MIYAJI, Atsuko; MIYAZAKI, Kunihiko; SANTOSO, Bagus; YANG, Peng |
1-Jun-2011 | New Concrete Relation between Trace, Definition Field, and Embedding Degree | Hirasawa, Shoujirou; Miyaji, Atsuko |
29-Jun-2011 | Privacy-Preserving Data Mining: A Game-theoretic Approach | Miyaji, Atsuko; Rahman, Mohammad Shahriar |
2-Jul-2011 | Toward Dynamic Attribute-Based Signcryption (Poster) | Emura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar |
2-Jul-2011 | T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity | Hatano, Tetsuya; Miyaji, Atsuko; Sato, Takashi |
19-Jul-2011 | A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model | Chen, Jiageng; Miyaji, Atsuko |
19-Jul-2011 | Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments | Desmedt, Yvo; Miyaji, Atsuko |
1-Aug-2011 | A Timed-Release Proxy Re-Encryption Scheme | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
9-Aug-2011 | Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic | Goundar, Raveen R.; Joye, Marc; Miyaji, Atsuko; Rivain, Matthieu; Venelli, Alexandre |
Sep-2011 | Efficient and Low-Cost RFID Authentication Schemes | Miyaji, Atsuko; Rahman, Mohammad Shahriar; Soshi, Masakazu |
1-Oct-2011 | Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes | Miyaji, Atsuko; Omote, Kazumasa |
8-Oct-2011 | POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks | Iida, Tatsuro; Miyaji, Atsuko; Omote, Kazumasa |
12-Oct-2011 | Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
12-Oct-2011 | How to Find Short RC4 Colliding Key Pairs | Chen, Jiageng; Miyaji, Atsuko |
1-Nov-2011 | Unconditionally Secure Oblivious Transfer Based on Channel Delays | Cheong, Kai-Yuen; Miyaji, Atsuko |
1-Nov-2011 | Non-interactive Opening for Ciphertexts Encrypted by Shared Keys | Chen, Jiageng; Emura, Keita; Miyaji, Atsuko |
1-Nov-2011 | Ideal Secret Sharing Schemes with Share Selectability | Emura, Keita; Miyaji, Atsuko; Nomura, Akito; Rahman, Mohammad Shahriar; Soshi, Masakazu |
2012 | Dynamic Attribute-based Signcryption without Random Oracles | Emura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar |
2012 | Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks | Izawa, Kazuya; Miyaji, Atsuko; Omote, Kazumasa |
2012 | A Novel Hybrid IP Traceback Scheme with Packet Counters | Tomoyuki Karasawa; Soshi, Masakazu; Miyaji, Atsuko |
2012 | Constant-Ciphertext-Size Dual Policy Attribute Based Encryption | Miyaji, Atsuko; Tran, Phuong V.X. |
2012 | How to Enhance the Security on the Least Significant Bit | Miyaji, Atsuko; Mo, Yiren |
2012 | A Secure and private RFID authentication protocol under SLPN problem | Mamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S. |
Mar-2012 | An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs | Iida, Tatsuro; Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
Mar-2012 | Privacy-preserving Set Operations in the Presence of Rational Parties | Miyaji, Atsuko; Rahman, Mohammad Shahriar |
15-Jul-2012 | A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
Sep-2012 | An Optimized Signature Verification System for Vehicle Ad hoc NETwork | Mamun, Mohammad Saiful Islam; Miyaji, Atsuko |
1-Dec-2012 | Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack | Chen, Jiageng; Miyaji, Atsuko |
2013 | Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock | Chen, Jiageng; Miyaji, Atsuko |
2013 | Novel Strategies for Searching RC4 Key Collisions | Chen, Jiageng; Miyaji, Atsuko |
Jul-2013 | A fully-secure RFID authentication protocol from exact LPN assumption | Mamun, Mohammad Saiful Islam; Miyaji, Atsuko |
Jul-2013 | Private Multiparty Set Intersection Protocol in Rational Model | Emura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar |
18-Jul-2013 | 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2013年4月ニース会議報告 | 宮地, 充子; 近澤, 武; 竜田, 敏男; 渡辺, 創; 松尾, 真一郎; 大熊, 健司; Miyaji, Atsuko; Chikazawa, Takeshi; Tatsuta, Toshio; Watanabe, Hajime; Matso, Shin'ichiro |
2014 | A Provable Secure Batch Authentication Scheme for EPCGen2 Tags | Chen, Jiageng; Miyaji, Atsuko; Su, Chunhua |
2014 | Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to Lblock | Chen, Jiageng; Futa, Yuichi; Miyaji, Atsuko; Su, Chunhua |
2014 | Distributed Pseudo-Random Number Generation and Its Application to Cloud Database | Chen, Jiageng; Miyaji, Atsuko; Su, Chunhua |
May-2014 | RFID Path Authentication, Revisited | Mamun, Mohammad Saiful Islam; Miyaji, Atsuko |
May-2014 | A Scalable and Secure RFID Ownership Transfer Protocol | Mamun, Mohammad Saiful Islam; Miyaji, Atsuko |
1-Jun-2014 | An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users | Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa |
26-Jun-2014 | 情報セキュリティの標準化動向について -ISO/IEC JTC1/SC27/WG2 2014年4月香港会議報告- | 宮地, 充子; 近澤, 武; 竜田, 敏男; 大熊, 建司; 渡辺, 創; 松尾, 真一郎; Miyaji, Atsuko; Chikazawa, Takeshi; Tatsuta, Toshio; Ohkuma, Kenji; Watanabe, Hajime; Matsuo, Shin'ichiro |
Jul-2014 | Secure VANET Applications with a refined Group Signature | Islam Mamun, Mohammad Saiful; Miyaji, Atsuko |
Sep-2014 | A multi-purpose Group Signature for Vehicular Network Security | Islam Mamun, Mohammad Saiful; Miyaji, Atsuko; Takada, Hiroaki |
Sep-2014 | A new (n,n) Blockcipher based Hash Function for Short Messages | Miyaji, Atsuko; Rashed, Mazumder; Sawada, Tsuyoshi |
Sep-2014 | POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme | Huang, Cheng-Qiang; Miyaji, Atsuko; Li, Long-Hai; Xu, Shang-Mei |
12-Dec-2014 | A New (n, n) Blockcipher Hash Function Using Feistel Network: Apposite for RFID Security | Miyaji, Atsuko; Rashed, Mazumder |
2015 | A privacy-preserving efficient RFID authentication protocol from SLPN assumption | Islam Mamun, Mohammad Saiful; Miyaji, Atsuko |
22-Jan-2015 | New Integrated Long-Term Glimpse of RC4 | Ito, Ryoma; Miyaji, Atsuko |
17-Mar-2015 | A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 | Chen, Jiageng; Hirose, Shoichi; Kuwakado, Hidenori; Miyaji, Atsuko |
8-Apr-2015 | Self-healing wireless sensor networks | Miyaji, Atsuko; Omote, Kazumasa |
3-Jun-2015 | センサネットワークの安全・安心を保証する情報セキュリティ技術の研究 | 宮地, 充子; Miyaji, Atsuko |
4-Jun-2015 | 楕円曲線上の離散対数問題の安全性に関する研究 | 宮地, 充子; Miyaji, Atsuko |
25-Jun-2015 | How TKIP Induces Biases of Internal States of Generic RC4 | Ito, Ryoma; Miyaji, Atsuko |
Aug-2015 | Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags | Chen, Jiageng; Miyaji, Atsuko; Sato, Hiroyuki; Su, Chunhua |
12-Aug-2015 | New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA | Ito, Ryoma; Miyaji, Atsuko |
22-May-2016 | Security and Experimental Performance Analysis of a Matrix ORAM | Gordon, Steven; Miyaji, Atsuko; Su, Chunhua; Sumongkaoythin, Karin |
1-Jun-2016 | Refined RC4 key correlations of internal states in WPA | Ito, Ryoma; Miyaji, Atsuko |
1-Aug-2016 | A Matrix based ORAM: Design, Implementation and Experimental Analysis | GORDON, Steven; MIYAJI, Atsuko; SU, Chunhua; SUMONGKAYOTHIN, Karin |
1-Jan-2017 | Refined Construction of RC4 Key Setting in WPA | Ito, Ryoma; Miyaji, Atsuko |
21-Jul-2017 | Recursive Matrix Oblivious RAM: An ORAM construction for constrained storage devices | Gordon, Steven; Huang, Xinyi; Miyaji, Atsuko; Su, Chunhua; Sumongkayothin, Karin; Wipusitwarakun, Komwut |
1-Aug-2017 | Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2 | Nomaguchi, Hiroshi; Miyaji, Atsuko; Su, Chunhua |
Oct-2018 | Revisited Diffusion Analysis of Salsa and ChaCha | MATSUOKA, Yusuke; MIYAJI, Atsuko |
Oct-2018 | An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields | Terada, Shota; Nakano, Hideto; Okumura, Shinya; Miyaji, Atsuko |
Aug-2019 | String commitment scheme with low output locality | Miyaji, Hideaki; Kawachi, Akinori; Miyaji, Atsuko |
10-Jan-2020 | An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks | Muroi, Akifumi; Okumura, Shinya; Miyaji, Atsuko |
1-Feb-2020 | New Pseudo-Random Number Generator for EPC Gen2 | Nomaguchi, Hiroshi; Su, Chunhua; Miyaji, Atsuko |
1-Feb-2020 | Anonymization Technique based on SGD Matrix Factrization | Mimoto, Tomoaki; Hidano, Seira; Kiyomoto, Shinsaku; Miyaji, Atsuko |
9-Mar-2022 | Bidder Scalable M+1st-Price Auction with Public Verifiability | Hsu, Po-Chu; Miyaji, Atsuko |