JAIST Repository >

著者:  "MIYAJI, Atsuko"

「一覧: 著者」画面に戻る
タイトル順ソート 日付順ソート

159 著者名表示.

発行日タイトル 著者
1993 Elliptic curves over F_p suitable for cryptosystemsMiyaji, Atsuko
Jan-1993 Elliptic Curve Cryptosystems Immune to Any Reduction into the Discrete Logarithm ProblemMIYAJI, Atsuko
Jan-1994 Elliptic Curves Suitable for CryptosystemsMIYAJI, Atsuko
Apr-1994 On Secure and Fast Elliptic Curve Cryptosystems over F_pMIYAJI, Atsuko
1996 A message recovery signature scheme equivalent to DSA over elliptic curvesMiyaji, Atsuko
1997 Efficient elliptic curve exponentiationMiyaji, Atsuko; Ono, Takatoshi; Cohen, Henri
Nov-1997 Another Countermeasure to Forgeries over Message Recovery SignatureMIYAJI, Atsuko
1998 Efficient elliptic curve exponentiaion using mixed coordinatesCohen, Henri; Miyaji, Atsuko; Ono, Takatoshi
Aug-1999 楕円暗号の数理小山, 謙二; 宮地, 充子; 内山, 成憲; KOYAMA, Kenji; MIYAJI, Atsuko; UCHIYAMA, Shigenori
2000 An anonymous auction protocol with a single non-trusted center using binary treesOmote, Kazumasa; Miyaji, Atsuko
2000 A Multisignature Scheme with Message Flexibility, Order Flexibility and Order VerifiabilityMitomi, Shirow; Miyaji, Atsuko
22-Mar-2000 関連づけ可能な匿名オフライン電子マネー小出, 篤史; 多田, 充; 宮地, 充子; KOIDE, ATSUSHI; TADA, MITSURU; MIYAJI, ATSUKO
22-Mar-2000 匿名通信を記述するためのフレームワークについて北澤, 繁樹; 双紙, 正和; 宮地, 充子; KITAZAWA, Shigeki; SOSHI, Masakazu; MIYAJI, Atsuko
10-May-2000 匿名通信フレームワークとその評価北澤, 繁樹; 双紙, 正和; 宮地, 充子; KITAZAWA, Shigeki; SOSHI, Masakazu; MIYAJI, Atsuko
Aug-2000 オープンネットワークにおける安全な暗号方式の更新に関する考察山田, 竜也; 宮地, 充子; 双紙, 正和; YAMADA, TATSUYA; MIYAJI, ATSUKO; SOSHI, MASAKAZU
Aug-2000 初等的な環状経路を用いた匿名通信方式北澤, 繁樹; 長野, 悟; 双紙, 正和; 宮地, 充子; KITAZAWA, SHIGEKI; NAGANO, SATORU; SOSHI, MASAKAZU; MIYAJI, ATSUKO
Aug-2000 Efficient Construction of Elliptic Curves over Optimal Extension FieldFuta, Yuichi; Miyaji, Atsuko
2001 A Practical English Auction with One-time RegistrationOmote, Kazumasa; Miyaji, Atsuko
2001 Characterization of Elliptic Curve Traces under FR-reductionMiyaji, Atsuko; Nakabayashi, Masaki; Takano, Shunzo
2001 Efficient "on the fly" signature schemes based on integer factoringOkamoto, Takeshi; Tada, Mitsuru; Miyaji, Atsuko
2001 Efficient and Unconditionally Secure Verifiable Threshold Changeable SchemeMaeda, Ayako; Miyaji, Atsuko; Tada, Mitsuru
May-2001 New Explicit Conditions of Elliptic Curve Traces for FR-ReductionMIYAJI, Atsuko; NAKABAYASHI, Masaki; TAKANO, Shunzou
25-Jul-2001 意思付多重署名方式についての研究河内, 恵; 多田, 充; 宮地, 充子; KAWAUCHI, Kei; TADA, Mitsuru; MIYAJI, Atsuko
Aug-2001 An Anonymous Sealed-bid Auction with a Feature of EntertainmentOmote, Kazumasa; Miyaji, Atsuko
Aug-2001 素因数分解に基づく効率的な署名方式の提案岡本, 健; 多田, 充; 宮地, 充子; OKAMOTO, TAKESHI; TADA, MITSURU; MIYAJI, ATSUKO
Oct-2001 A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order VerifiabilityMITOMI, Shirow; MIYAJI, Atsuko
2002 Known Plaintext Correlation Attack Against RC5Miyaji, Atsuko; Nonaka, Masao; Takii, Yoshinori
2002 A multi-signature scheme with signers' intentinos secure against active attacksKawauchi, Kei; Minato, Hiroshi; Miyaji, Atsuko; Tada, Mitsuru
2002 Cryptanalysis of the reduced-round RC6Miyaji, Atsuko; Nonaka, Masao
Jan-2002 Improved Correlation Attack on RC5MIYAJI, Atsuko; NONAKA, Masao; TAKII, Yoshinori
May-2002 A Practical English Auction with Simple RevocationOMOTE, Kazumasa; MIYAJI, Atsuko
19-Jul-2002 代理入札方式を備えたイングリッシュオークションプロトコル塩月, 徹; 宮地, 充子; SHIOTSUKI, Toru; MIYAJI, Atsuko
Aug-2002 Provably Secure Multi-signature Scheme with Signers' IntentionsKawauchi, Kei; Minato, Hiroshi; Miyaji, Atsuko; Tada, Mitsuru
Aug-2002 A Second-price Sealed-bid Auction with Public VerifiabilityOmote, Kazumasa; Miyaji, Atsuko
2003 A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th RootOmote, Kazumasa; Miyaji, Atsuko
2003 Evaluation of Anonymity of Practical Anonymous Communication NetworksKitazawa, Shigeki; Soshi, Masakazu; Miyaji, Atsuko
2003 An Improved Fast Signature Scheme without Online MultiplicationTakeshi Okamoto; Mitsuru Tada; Miyaji, Atsuko
2003 Java Obfuscation with a Theoretical Basis for Building Secure Mobile AgentsSakabe, Yusuke; Soshi, Masakazu; Miyaji, Atsuko
2003 Optimized χ^2 attack against RC6Isogai, Norihisa; Matsunaka, Takashi; Miyaji, Atsuko
2003 Anonymity-enhanced Pseudonym SystemTamura, Yuko; Miyaji, Atsuko
2003 Intrusion-Resilient Public-Key EncryptionDodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti
Jan-2003 Cryptanalysis of Reduced-Round RC6 without WhiteningMIYAJI, Atsuko; NONAKA, Masao; TAMURA, Yuko; SHIOTSUKI, Toru; MIYAJI, Atsuko
Jan-2003 Cryptanalysis of Reduced-Round RC6 without WhiteningMIYAJI, Atsuko; NONAKA, Masao; TAMURA, Yuko; SHIOTSUKI, Toru; MIYAJI, Atsuko
Jan-2003 Software Obfuscation on a Theoretical Basis and Its ImplementationOGISO, Toshio; SAKABE, Yusuke; SOSHI, Masakazu; MIYAJI, Atsuko
May-2003 Statistical Analysis of chi-square AttacksISOGAI, Norihisa; MIYAJI, Atsuko; NONAKA, Masao
18-Jul-2003 匿名性を強化したグループ署名方式梅田, 梢; 宮地, 充子; UMEDA, Kozue; MIYAJI, Atsuko
2004 A Fully-Functional group signature scheme over only known-order groupMiyaji, Atsuko; Umeda, Kozue
2004 Success probability in chi-square attacksMatsunaka, Takashi; Miyaji, Atsuko; Takano, Yuuki
2004 Efficient Countermeasures against RPA, DPA, and SPAMamiya, Hideyo; Miyaji, Atsuko; Morimoto, Hiroaki
2004 A Generic Construction for Intrusion-Resilient Public-Key EncryptionDodis, Yevgeniy; Franklin, Matt; Katz, Jonathan; Miyaji, Atsuko; Yung, Moti
Aug-2004 Pushback機構の一提案とそのモデル化に向けて寺田, 剛陽; 双紙, 正和; 宮地, 充子; Terada, Takeaki; Soshi, Masakazu; Miyaji, Atsuko
Aug-2004 On Anonymity Metrics for Practical Anonymous Communication ProtocolsKitazawa, Shigeki; Soshi, Masakazu; Miyaji, Atsuko
2005 On the Success Probability of χ^2 attack on RC6Miyaji, Atsuko; Takano, Yuuki
22-Mar-2005 モバイルエージェント・セキュリティに関する一考察森, 正行; 双紙, 正和; 宮地, 充子; MORI, Masayuki; SOHSI, Masakazu; MIYAJI, Atsuko
Apr-2005 n 次元量子状態を使用した量子コイン投げプロトコル早稲田, 篤志; 双紙, 正和; 宮地, 充子; Waseda, Atsushi; Soshi, Masakazu; Miyaji, Atsuko
Jul-2005 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2005年4月ウィーン会議報告宮地, 充子; 近澤, 武; 竜田, 敏男; 大塚, 玲; 安田, 幹; MIYAJI, Atsuko; CHIKAZAWA, Takeshi; TATSUTA, Toshio; OTSUKA, Akira; YASUDA, Kan
Aug-2005 Java Obfuscation - Approaches to Construct Tamper-Resistant Object-Oriented ProgramsSakabe, Yusuke; Soshi, Masakazu; Miyaji, Atsuko
Aug-2005 Efficient Group Signature Scheme Based on a Modified Nyberg-Rueppel SignatureMiyaji, Atsuko; Umeda, Kozue
Jul-2006 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2006年5月マドリッド会議報告宮地, 充子; 近澤, 武; 竜田, 敏男; 大塚, 玲; 安田, 幹; 森, 健吾; 才所, 敏明; MIYAJI, Atsuko; CHIKAZAWA, Takeshi; TATSUTA, Toshio; OTSUKA, Akira; YASUDA, Kan; MORI, Kengo; SAISHO, Toshiaki
Aug-2006 Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPAMAMIYA, Hideyo; MIYAJI, Atsuko; MORIMOTO, Hiroaki
Aug-2006 Fixed-Hamming-Weight Representation for Indistinguishable Addition FormulaeMamiya, Hideyo; Miyaji, Atsuko
2007 Mobile agent security with efficient oblivious transferHasegawa, Wataru; Soshi, Masakazu; Miyaji, Atsuko
2007 Generalized MMM-algorithm Secure against SPA, DPA, and RPAMiyaji, Atsuko
Jan-2007 Evaluation of the Security of RC6 against the χ^2-AttackMIYAJI, Atsuko; TAKANO, Yuuki
Jul-2007 量子複数秘密分散に関する考察早稲田, 篤志; 双紙, 正和; 宮地, 充子; Waseda, Atsushi; Soshi, Masakazu; Miyaji, Atsuko
19-Jul-2007 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2007年5月ロシア会議報告宮地, 充子; 近澤, 武; 竜田, 敏男; 渡辺, 創; 大熊, 建司; MIYAJI, Atsuko; CHIKAZAWA, Takeshi; TATSUTA, Toshio; WATANABE, Hajime; OHKUMA, Kenji
Sep-2007 Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast EncryptionMiyaji, Atsuko
Sep-2007 The security of RC6 against asymmetric Chi-square test attackHinoue, Tomohiko; Miyaji, Atsuko; Wada, Takatomi
24-Jul-2008 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2008年4月京都会議報告宮地, 充子; 近澤, 武; 竜田, 敏男; 渡辺, 創; 大熊, 建司; Miyaji, Atsuko; Chikazawa, Takeshi; Tatsuta, Toshio; Watanabe, Hajime; Ohkuma, Kenji
15-Sep-2008 Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed PointMiyaji, Atsuko; Mizosoe, Kenji
Oct-2008 Security and Access Control for Vehicular CommunicationsZrelli, Saber; Miyaji, Atsuko; Shinoda, Yoichi; Ernst, Thierry
1-Oct-2008 Generalized Scalar Multiplication Secure against SPA, DPA, and RPAMIYAJI, Atsuko
Dec-2008 Simple Certificateless Signature with Smart CardsOmote, Kazumasa; Miyaji, Atsuko; Kato, Kazuhiko
2009 A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext LengthEmura, Keita; Miyaji, Atsuko; Nomura, Akito; Omote, Kazumasa; Soshi, Masakazu
2009 A Selectable k-Times Relaxed Anonymous Authentication SchemeEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
2009 New Correlations of RC4 PRGA Using Nonzero-Bit DifferencesMiyaji, Atsuko; Sukegawa, Masahiro
2009 Elliptic curves with a pre-determined embedding degreeHirasawa, Shoujirou; Miyaji, Atsuko
Mar-2009 A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute StatisticsEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
Mar-2009 A Secure RFID Authentication Protocol with Low Communication CostRahman, Mohammad Shahriar; Soshi, Masakazu; Miyaji, Atsuko
Mar-2009 A Certificate Revocable Anonymous Authentication Scheme with Designated VerifierEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
2-Sep-2009 A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute StatisticsEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
7-Sep-2009 サイドチャネル攻撃に対して安全な公開鍵暗号に関する研究宮地, 充子; Miyaji, Atsuko
2010 A New Class of RC4 Colliding Key Pairs With Greater Hamming DistanceChen, Jiageng; Miyaji, Atsuko
2010 Privacy-Preserving Data Mining in Presence of Covert AdversariesMiyaji, Atsuko; Rahman, Mohammad Shahriar
2010 Efficient Privacy-Preserving Data Mining in Malicious ModelEmura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar
2010 Co-Z Addition Formulæ and Binary Ladders on Elliptic CurvesGoundar, Raveen Ravinesh; Joye, Marc; Miyaji, Atsuko
1-Jun-2010 New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit DifferencesMIYAJI, Atsuko; SUKEGAWA, Masahiro
2-Jul-2010 A ciphertext-policy attribute-based encryption scheme with constant ciphertext lengthEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa; Nomura, Akito; Soshi, Masakazu
Sep-2010 Generalized RC4 Key Collisions and Hash CollisionsChen, Jiageng; Miyaji, Atsuko
5-Oct-2010 APRAP: Another Privacy Preserving RFID Authentication ProtocolMiyaji, Atsuko; Rahman, Mohammad Shahriar
2011 Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor NetworksMiyaji, Atsuko; Omote, Kazumasa
2011 Hidden Credential Retrieval Without Random OraclesMiyaji, Atsuko; Rahman, Mohammad Shahriar; Soshi, Masakazu
1-Jan-2011 Sequential Bitwise Sanitizable Signature SchemesHANAOKA, Goichiro; HIROSE, Shoichi; MIYAJI, Atsuko; MIYAZAKI, Kunihiko; SANTOSO, Bagus; YANG, Peng
1-Jun-2011 New Concrete Relation between Trace, Definition Field, and Embedding DegreeHirasawa, Shoujirou; Miyaji, Atsuko
29-Jun-2011 Privacy-Preserving Data Mining: A Game-theoretic ApproachMiyaji, Atsuko; Rahman, Mohammad Shahriar
2-Jul-2011 Toward Dynamic Attribute-Based Signcryption (Poster)Emura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar
2-Jul-2011 T-Robust Scalable Group Key Exchange Protocol with O(logn) ComplexityHatano, Tetsuya; Miyaji, Atsuko; Sato, Takashi
19-Jul-2011 A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key ModelChen, Jiageng; Miyaji, Atsuko
19-Jul-2011 Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various EnvironmentsDesmedt, Yvo; Miyaji, Atsuko
1-Aug-2011 A Timed-Release Proxy Re-Encryption SchemeEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
9-Aug-2011 Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmeticGoundar, Raveen R.; Joye, Marc; Miyaji, Atsuko; Rivain, Matthieu; Venelli, Alexandre
Sep-2011 Efficient and Low-Cost RFID Authentication SchemesMiyaji, Atsuko; Rahman, Mohammad Shahriar; Soshi, Masakazu
1-Oct-2011 Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted NodesMiyaji, Atsuko; Omote, Kazumasa
8-Oct-2011 POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor NetworksIida, Tatsuro; Miyaji, Atsuko; Omote, Kazumasa
12-Oct-2011 Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release EncryptionEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
12-Oct-2011 How to Find Short RC4 Colliding Key PairsChen, Jiageng; Miyaji, Atsuko
1-Nov-2011 Unconditionally Secure Oblivious Transfer Based on Channel DelaysCheong, Kai-Yuen; Miyaji, Atsuko
1-Nov-2011 Non-interactive Opening for Ciphertexts Encrypted by Shared KeysChen, Jiageng; Emura, Keita; Miyaji, Atsuko
1-Nov-2011 Ideal Secret Sharing Schemes with Share SelectabilityEmura, Keita; Miyaji, Atsuko; Nomura, Akito; Rahman, Mohammad Shahriar; Soshi, Masakazu
2012 Dynamic Attribute-based Signcryption without Random OraclesEmura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar
2012 Lightweight Integrity for XOR Network Coding in Wireless Sensor NetworksIzawa, Kazuya; Miyaji, Atsuko; Omote, Kazumasa
2012 A Novel Hybrid IP Traceback Scheme with Packet CountersTomoyuki Karasawa; Soshi, Masakazu; Miyaji, Atsuko
2012 Constant-Ciphertext-Size Dual Policy Attribute Based EncryptionMiyaji, Atsuko; Tran, Phuong V.X.
2012 How to Enhance the Security on the Least Significant BitMiyaji, Atsuko; Mo, Yiren
2012 A Secure and private RFID authentication protocol under SLPN problemMamun, Mohammad S. I.; Miyaji, Atsuko; Rahman, Mohammad S.
Mar-2012 An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNsIida, Tatsuro; Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa
Mar-2012 Privacy-preserving Set Operations in the Presence of Rational PartiesMiyaji, Atsuko; Rahman, Mohammad Shahriar
15-Jul-2012 A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked UsersEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
Sep-2012 An Optimized Signature Verification System for Vehicle Ad hoc NETworkMamun, Mohammad Saiful Islam; Miyaji, Atsuko
1-Dec-2012 Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery AttackChen, Jiageng; Miyaji, Atsuko
2013 Differential Cryptanalysis and Boomerang Cryptanalysis of LBlockChen, Jiageng; Miyaji, Atsuko
2013 Novel Strategies for Searching RC4 Key CollisionsChen, Jiageng; Miyaji, Atsuko
Jul-2013 A fully-secure RFID authentication protocol from exact LPN assumptionMamun, Mohammad Saiful Islam; Miyaji, Atsuko
Jul-2013 Private Multiparty Set Intersection Protocol in Rational ModelEmura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar
18-Jul-2013 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2013年4月ニース会議報告宮地, 充子; 近澤, 武; 竜田, 敏男; 渡辺, 創; 松尾, 真一郎; 大熊, 健司; Miyaji, Atsuko; Chikazawa, Takeshi; Tatsuta, Toshio; Watanabe, Hajime; Matso, Shin'ichiro
2014 A Provable Secure Batch Authentication Scheme for EPCGen2 TagsChen, Jiageng; Miyaji, Atsuko; Su, Chunhua
2014 Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LblockChen, Jiageng; Futa, Yuichi; Miyaji, Atsuko; Su, Chunhua
2014 Distributed Pseudo-Random Number Generation and Its Application to Cloud DatabaseChen, Jiageng; Miyaji, Atsuko; Su, Chunhua
May-2014 RFID Path Authentication, RevisitedMamun, Mohammad Saiful Islam; Miyaji, Atsuko
May-2014 A Scalable and Secure RFID Ownership Transfer ProtocolMamun, Mohammad Saiful Islam; Miyaji, Atsuko
1-Jun-2014 An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked UsersEmura, Keita; Miyaji, Atsuko; Omote, Kazumasa
26-Jun-2014 情報セキュリティの標準化動向について -ISO/IEC JTC1/SC27/WG2 2014年4月香港会議報告-宮地, 充子; 近澤, 武; 竜田, 敏男; 大熊, 建司; 渡辺, 創; 松尾, 真一郎; Miyaji, Atsuko; Chikazawa, Takeshi; Tatsuta, Toshio; Ohkuma, Kenji; Watanabe, Hajime; Matsuo, Shin'ichiro
Jul-2014 Secure VANET Applications with a refined Group SignatureIslam Mamun, Mohammad Saiful; Miyaji, Atsuko
Sep-2014 A multi-purpose Group Signature for Vehicular Network SecurityIslam Mamun, Mohammad Saiful; Miyaji, Atsuko; Takada, Hiroaki
Sep-2014 A new (n,n) Blockcipher based Hash Function for Short MessagesMiyaji, Atsuko; Rashed, Mazumder; Sawada, Tsuyoshi
Sep-2014 POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic SchemeHuang, Cheng-Qiang; Miyaji, Atsuko; Li, Long-Hai; Xu, Shang-Mei
12-Dec-2014 A New (n, n) Blockcipher Hash Function Using Feistel Network: Apposite for RFID SecurityMiyaji, Atsuko; Rashed, Mazumder
2015 A privacy-preserving efficient RFID authentication protocol from SLPN assumptionIslam Mamun, Mohammad Saiful; Miyaji, Atsuko
22-Jan-2015 New Integrated Long-Term Glimpse of RC4Ito, Ryoma; Miyaji, Atsuko
17-Mar-2015 A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256Chen, Jiageng; Hirose, Shoichi; Kuwakado, Hidenori; Miyaji, Atsuko
8-Apr-2015 Self-healing wireless sensor networksMiyaji, Atsuko; Omote, Kazumasa
3-Jun-2015 センサネットワークの安全・安心を保証する情報セキュリティ技術の研究宮地, 充子; Miyaji, Atsuko
4-Jun-2015 楕円曲線上の離散対数問題の安全性に関する研究宮地, 充子; Miyaji, Atsuko
25-Jun-2015 How TKIP Induces Biases of Internal States of Generic RC4Ito, Ryoma; Miyaji, Atsuko
Aug-2015 Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID TagsChen, Jiageng; Miyaji, Atsuko; Sato, Hiroyuki; Su, Chunhua
12-Aug-2015 New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPAIto, Ryoma; Miyaji, Atsuko
22-May-2016 Security and Experimental Performance Analysis of a Matrix ORAMGordon, Steven; Miyaji, Atsuko; Su, Chunhua; Sumongkaoythin, Karin
1-Jun-2016 Refined RC4 key correlations of internal states in WPAIto, Ryoma; Miyaji, Atsuko
1-Aug-2016 A Matrix based ORAM: Design, Implementation and Experimental AnalysisGORDON, Steven; MIYAJI, Atsuko; SU, Chunhua; SUMONGKAYOTHIN, Karin
1-Jan-2017 Refined Construction of RC4 Key Setting in WPAIto, Ryoma; Miyaji, Atsuko
21-Jul-2017 Recursive Matrix Oblivious RAM: An ORAM construction for constrained storage devicesGordon, Steven; Huang, Xinyi; Miyaji, Atsuko; Su, Chunhua; Sumongkayothin, Karin; Wipusitwarakun, Komwut
1-Aug-2017 Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2Nomaguchi, Hiroshi; Miyaji, Atsuko; Su, Chunhua
Oct-2018 Revisited Diffusion Analysis of Salsa and ChaChaMATSUOKA, Yusuke; MIYAJI, Atsuko
Oct-2018 An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition FieldsTerada, Shota; Nakano, Hideto; Okumura, Shinya; Miyaji, Atsuko
Aug-2019 String commitment scheme with low output localityMiyaji, Hideaki; Kawachi, Akinori; Miyaji, Atsuko
10-Jan-2020 An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation AttacksMuroi, Akifumi; Okumura, Shinya; Miyaji, Atsuko
1-Feb-2020 New Pseudo-Random Number Generator for EPC Gen2Nomaguchi, Hiroshi; Su, Chunhua; Miyaji, Atsuko
1-Feb-2020 Anonymization Technique based on SGD Matrix FactrizationMimoto, Tomoaki; Hidano, Seira; Kiyomoto, Shinsaku; Miyaji, Atsuko
9-Mar-2022 Bidder Scalable M+1st-Price Auction with Public VerifiabilityHsu, Po-Chu; Miyaji, Atsuko

 


お問い合わせ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係