JAIST Repository >

MIYAJI Atsuko ProfessorFaculty Profile

No.Bibliographical information
1 Bidder Scalable M+1st-Price Auction with Public Verifiability / Hsu, Po-Chu, Miyaji, Atsuko, 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.34-42, 2022-03-09, Institute of Electrical and Electronics Engineers (IEEE)
2 New Pseudo-Random Number Generator for EPC Gen2 / Nomaguchi, Hiroshi, Su, Chunhua, Miyaji, Atsuko, IEICE Transactions on Information and Systems, E103-D(2), pp.292-298, 2020-02-01, 電子情報通信学会
3 Anonymization Technique based on SGD Matrix Factrization / Mimoto, Tomoaki, Hidano, Seira, Kiyomoto, Shinsaku, Miyaji, Atsuko, IEICE Transactions on Information and Systems, E103-D(2), pp.299-308, 2020-02-01, 電子情報通信学会
4 An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks / Muroi, Akifumi, Okumura, Shinya, Miyaji, Atsuko, Lecture Notes in Computer Science, 11959, pp.421-436, 2020-01-10, Springer
5 String commitment scheme with low output locality / Miyaji, Hideaki, Kawachi, Akinori, Miyaji, Atsuko, 2019 14th Asia Joint Conference on Information Security (AsiaJCIS), pp.32-39, 2019-08, Institute of Electrical and Electronics Engineers (IEEE)
6 Revisited Diffusion Analysis of Salsa and ChaCha / MATSUOKA, Yusuke, MIYAJI, Atsuko, 2018 International Symposium on Information Theory and Its Applications (ISITA), pp.452-456, 2018-10, Institute of Electrical and Electronics Engineers (IEEE)
7 An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields / Terada, Shota, Nakano, Hideto, Okumura, Shinya, Miyaji, Atsuko, 2018 International Symposium on Information Theory and Its Applications (ISITA), pp.306-310, 2018-10, Institute of Electrical and Electronics Engineers (IEEE)
8 Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2 / Nomaguchi, Hiroshi, Miyaji, Atsuko, Su, Chunhua, 2017 IEEE Trustcom/BigDataSE/ICESS, pp.721-728, 2017-08-01, Institute of Electrical and Electronics Engineers (IEEE)
9 Recursive Matrix Oblivious RAM: An ORAM construction for constrained storage devices / Gordon, Steven, Huang, Xinyi, Miyaji, Atsuko, Su, Chunhua, Sumongkayothin, Karin, Wipusitwarakun, Komwut, IEEE Transactions on Information Forensics and Security, 12(12), pp.3024-3038, 2017-07-21, Institute of Electrical and Electronics Engineers (IEEE)
10 Refined Construction of RC4 Key Setting in WPA / Ito, Ryoma, Miyaji, Atsuko, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E100.A(1), pp.138-148, 2017-01-01, 電子情報通信学会
11 A Matrix based ORAM: Design, Implementation and Experimental Analysis / GORDON, Steven, MIYAJI, Atsuko, SU, Chunhua, SUMONGKAYOTHIN, Karin, IEICE TRANSACTIONS on Information and Systems, E99-D(8), pp.2044-2055, 2016-08-01, The Institute of Electronics, Information and Communication Engineers (IEICE)
12 Refined RC4 key correlations of internal states in WPA / Ito, Ryoma, Miyaji, Atsuko, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science, E99-A(6), pp.1132-1144, 2016-06-01, The Institute of Electronics, Information and Communication Engineers (IEICE)
13 Security and Experimental Performance Analysis of a Matrix ORAM / Gordon, Steven, Miyaji, Atsuko, Su, Chunhua, Sumongkaoythin, Karin, 2016 IEEE International Conference on Communications (ICC), pp.1-6, 2016-05-22, IEEE
14 Accurate Estimation of the Full Differential Distribution for General Feistel Structures / Chen, Jiageng, Miyiaji, Atsuko, Su, Chunhua, The, Je Sen, Lecture Notes in Computer Science, 9589, pp.108-124, 2016-05-07, Springer
15 New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA / Ito, Ryoma, Miyaji, Atsuko, Lecture Notes in Computer Science, 9054, pp.557-576, 2015-08-12, Springer
16 Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags / Chen, Jiageng, Miyaji, Atsuko, Sato, Hiroyuki, Su, Chunhua, 2015 IEEE Trustcom/BigDataSE/ISPA, pp.17-24, 2015-08, Institute of Electrical and Electronics Engineers (IEEE)
17 How TKIP Induces Biases of Internal States of Generic RC4 / Ito, Ryoma, Miyaji, Atsuko, Lecture Notes in Computer Science, 9144, pp.329-342, 2015-06-25, Springer
18 楕円曲線上の離散対数問題の安全性に関する研究 / 宮地, 充子, 科学研究費助成事業研究成果報告書, pp.1-5, 2015-06-04
19 センサネットワークの安全・安心を保証する情報セキュリティ技術の研究 / 宮地, 充子, 科学研究費助成事業研究成果報告書, pp.1-6, 2015-06-03
20 Self-healing wireless sensor networks / Miyaji, Atsuko, Omote, Kazumasa, Concurrency and Computation: Practice and Experience, 27(10), pp.2547-2568, 2015-04-08, John Wiley & Sons
21 A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 / Chen, Jiageng, Hirose, Shoichi, Kuwakado, Hidenori, Miyaji, Atsuko, Lecture Notes in Computer Science, 8949, pp.271-285, 2015-03-17, Springer
22 New Integrated Long-Term Glimpse of RC4 / Ito, Ryoma, Miyaji, Atsuko, Lecture Notes in Computer Science, pp.137-149, 2015-01-22, Springer
23 A privacy-preserving efficient RFID authentication protocol from SLPN assumption / Islam Mamun, Mohammad Saiful, Miyaji, Atsuko, International Journal of Computational Science and Engineering, 10(3), pp.234-243, 2015, Inderscience
24 A New (n, n) Blockcipher Hash Function Using Feistel Network: Apposite for RFID Security / Miyaji, Atsuko, Rashed, Mazumder, Smart Innovation, Systems and Technologies, 33, pp.519-528, 2014-12-12, Springer
25 A multi-purpose Group Signature for Vehicular Network Security / Islam Mamun, Mohammad Saiful, Miyaji, Atsuko, Takada, Hiroaki, 2014 17th International Conference on Network-Based Information Systems (NBiS), pp.511-516, 2014-09, Institute of Electrical and Electronics Engineers (IEEE)
26 A new (n,n) Blockcipher based Hash Function for Short Messages / Miyaji, Atsuko, Rashed, Mazumder, Sawada, Tsuyoshi, 2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS), pp.56-63, 2014-09, Institute of Electrical and Electronics Engineers (IEEE)
27 POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme / Huang, Cheng-Qiang, Miyaji, Atsuko, Li, Long-Hai, Xu, Shang-Mei, 2014 IEEE International Conference on Computer and Information Technology (CIT), pp.373-380, 2014-09, Institute of Electrical and Electronics Engineers (IEEE)
28 Secure VANET Applications with a refined Group Signature / Islam Mamun, Mohammad Saiful, Miyaji, Atsuko, 2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST), pp.199-206, 2014-07, Institute of Electrical and Electronics Engineers (IEEE)
29 情報セキュリティの標準化動向について -ISO/IEC JTC1/SC27/WG2 2014年4月香港会議報告- / 宮地, 充子, 近澤, 武, 竜田, 敏男, 大熊, 建司, 渡辺, 創, 松尾, 真一郎, 電子情報通信学会研究報告, 114(115), pp.171-179, 2014-06-26, The Institute of Electronics, Information and Communication Engineers (IEICE)
30 An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Journal of Applied Mathematics, 2014, pp.Article ID 983040-, 2014-06-01, Hindawi Publishing Corporation
31 RFID Path Authentication, Revisited / Mamun, Mohammad Saiful Islam, Miyaji, Atsuko, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp.245-252, 2014-05, Institute of Electrical and Electronics Engineers (IEEE)
32 A Scalable and Secure RFID Ownership Transfer Protocol / Mamun, Mohammad Saiful Islam, Miyaji, Atsuko, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications (AINA), pp.343-350, 2014-05, Institute of Electrical and Electronics Engineers (IEEE)
33 A Provable Secure Batch Authentication Scheme for EPCGen2 Tags / Chen, Jiageng, Miyaji, Atsuko, Su, Chunhua, Lecture Notes in Computer Science, 8782, pp.103-116, 2014, Springer
34 Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to Lblock / Chen, Jiageng, Futa, Yuichi, Miyaji, Atsuko, Su, Chunhua, Lecture Notes in Computer Science, 8792, pp.184-197, 2014, Springer
35 Distributed Pseudo-Random Number Generation and Its Application to Cloud Database / Chen, Jiageng, Miyaji, Atsuko, Su, Chunhua, Lecture Notes in Computer Science, 8434, pp.373-387, 2014, Springer
36 情報セキュリティの標準化動向について : ISO/IEC JTC1/SC27/WG2 2013年4月ニース会議報告 / 宮地, 充子, 近澤, 武, 竜田, 敏男, 渡辺, 創, 松尾, 真一郎, 大熊, 健司, 電子情報通信学会技術研究報告, 113(135), pp.75-84, 2013-07-18, 電子情報通信学会
37 A fully-secure RFID authentication protocol from exact LPN assumption / Mamun, Mohammad Saiful Islam, Miyaji, Atsuko, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.102-109, 2013-07, Institute of Electrical and Electronics Engineers (IEEE)
38 Private Multiparty Set Intersection Protocol in Rational Model / Emura, Keita, Miyaji, Atsuko, Rahman, Mohammad Shahriar, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.431-438, 2013-07, Institute of Electrical and Electronics Engineers (IEEE)
39 Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock / Chen, Jiageng, Miyaji, Atsuko, Lecture Notes in Computer Science, 8128, pp.1-15, 2013, Springer
40 Novel Strategies for Searching RC4 Key Collisions / Chen, Jiageng, Miyaji, Atsuko, Computers & Mathematics with Applications, 66(1), pp.81-90, 2013, Elsevier
41 Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack / Chen, Jiageng, Miyaji, Atsuko, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E95-A(12), pp.2148-2159, 2012-12-01, The Institute of Electronics, Information and Communication Engineers (IEICE)
42 An Optimized Signature Verification System for Vehicle Ad hoc NETwork / Mamun, Mohammad Saiful Islam, Miyaji, Atsuko, 2012 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM), pp.1-8, 2012-09, Institute of Electrical and Electronics Engineers (IEEE)
43 A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users / Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 7259/2012, pp.186-203, 2012-07-15, Springer
44 An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs / Iida, Tatsuro, Emura, Keita, Miyaji, Atsuko, Omote, Kazumasa, 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp.552-557, 2012-03, Institute of Electrical and Electronics Engineers (IEEE)
45 Privacy-preserving Set Operations in the Presence of Rational Parties / Miyaji, Atsuko, Rahman, Mohammad Shahriar, 2012 26th International Conference on Advanced Information Networking and Applications Workshops (WAINA), pp.869-874, 2012-03, Institute of Electrical and Electronics Engineers (IEEE)
46 Dynamic Attribute-based Signcryption without Random Oracles / Emura, Keita, Miyaji, Atsuko, Rahman, Mohammad Shahriar, International Journal of Applied Cryptography (IJACT), 2(3), pp.199-211, 2012, Inderscience
47 Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks / Izawa, Kazuya, Miyaji, Atsuko, Omote, Kazumasa, Lecture Notes in Computer Science, 7232/2012, pp.245-248, 2012, Springer
48 A Novel Hybrid IP Traceback Scheme with Packet Counters / Tomoyuki Karasawa, Soshi, Masakazu, Miyaji, Atsuko, Lecture Notes in Computer Science, 7646, pp.71-84, 2012, Springer
49 Constant-Ciphertext-Size Dual Policy Attribute Based Encryption / Miyaji, Atsuko, Tran, Phuong V.X., Lecture Notes in Computer Science, 7672, pp.400-413, 2012, Springer
50 How to Enhance the Security on the Least Significant Bit / Miyaji, Atsuko, Mo, Yiren, Lecture Notes in Computer Science, 7712, pp.263-279, 2012, Springer

1 2 3 4 next

 


Contact : Library Information Section, Japan Advanced Institute of Science and Technology