-
Lattice-Based Key-Value Commitment Scheme
Hideaki Miyaji, Atsuko Miyaji
IEEE Transactions on Information Theory 2025/06 Research paper (scientific journal)
-
Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption
Kaiming Chen, Atsuko Miyaji, Jiageng Chen
2025 Research paper (international conference proceedings)
-
Consideration on Defining Field for Efficient Ring-LWE
Rintaro Yamada, Shinya Okumura, Atsuko Miyaji
2024 19th Asia Joint Conference on Information Security (AsiaJCIS) p. 25-32 2024/08/13 Research paper (international conference proceedings)
Publisher: IEEE
-
Backdoored-input Detection by Trigger Embedding
Akira Fujimoto, Shintaro Yamashita, Yuntao Wang, Atsuko Miyaji
2024 19th Asia Joint Conference on Information Security (AsiaJCIS) p. 121-128 2024/08/13 Research paper (international conference proceedings)
Publisher: IEEE
-
Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion.
Yaoan Jin, Atsuko Miyaji
Comput. J. Vol. 67 No. 2 p. 474-484 2024/02 Research paper (scientific journal)
-
Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha
Ryo Watanabe, Nasratullah Ghafoori, Atsuko Miyaji
2024 Research paper (international conference proceedings)
-
Revisiting an Extension of Kannan’s Embedding for Ring-LWE
Satoshi Uesugi, Shinya Okumura, Atsuko Miyaji
2024 Research paper (international conference proceedings)
-
Generic Construction of Forward-Secure Chameleon Hash Function
Pengxuan Wei, Koki Matsubara, Atsuko Miyaji, Yangguang Tian
2024 Research paper (international conference proceedings)
-
Proposal for Key-Value Commitments with Offline Batch Update
Toshiyuki Mineta, Atsuko Miyaji, Hideaki Miyaji
Proceedings - 2024 19th Asia Joint Conference on Information Security, AsiaJCIS 2024 p. 129-136 2024 Research paper (international conference proceedings)
-
Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain.
Hui Cui 0001, Zhiguo Wan, Tianyu Zhaolu, Huaqun Wang, Atsuko Miyaji
IEEE Trans. Cloud Comput. Vol. 12 No. 1 p. 130-144 2024 Research paper (scientific journal)
-
PRSafe: A Domain Specific Language Created with LLVM.
Sai Veerya Mahadevan, Yuuki Takano, Atsuko Miyaji
J. Inf. Process. Vol. 32 p. 207-222 2024 Research paper (scientific journal)
-
Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher.
Nasratullah Ghafoori, Atsuko Miyaji
IEEE Access Vol. 12 p. 13386-13399 2024 Research paper (scientific journal)
-
Lattice-based Commitment Scheme for Low Communication Costs
Hideaki Miyaji, Yuntao Wang, Atsuko Miyaji
IEEE Access p. 1-1 2024 Research paper (scientific journal)
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
-
Revocable Policy-Based Chameleon Hash for Blockchain Rewriting.
Yangguang Tian, Atsuko Miyaji, Koki Matsubara, Hui Cui 0001, Nan Li
The Computer Journal Vol. 66 No. 10 p. 2365-2378 2023/10 Research paper (scientific journal)
-
On the Weakness of Non-Dual Ring-LWE Mod Prime Ideal q by Trace Map.
Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji
IEICE Transactions on Information & Systems Vol. 106 No. 9 p. 1423-1434 2023/09 Research paper (scientific journal)
-
PNB Based Differential Cryptanalysis of Salsa20 and ChaCha.
Nasratullah Ghafoori, Atsuko Miyaji, Ryoma Ito 0001, Shotaro Miyashita
IEICE Transactions on Information & Systems Vol. 106 No. 9 p. 1407-1422 2023/09 Research paper (scientific journal)
-
Compact and Efficient Constant-Time GCD and Modular Inversion with Short-Iteration.
Yaoan Jin, Atsuko Miyaji
IEICE Transactions on Information & Systems Vol. 106 No. 9 p. 1397-1406 2023/09 Research paper (scientific journal)
-
On the Weakness of Non-Dual Ring-LWE Mod Prime Ideal q by Trace Map
Tomoka TAKAHASHI, Shinya OKUMURA, Atsuko MIYAJI
IEICE Transactions on Information and Systems Vol. E106.D No. 9 p. 1423-1434 2023/09/01 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
-
PNB Based Differential Cryptanalysis of Salsa20 and ChaCha
Nasratullah GHAFOORI, Atsuko MIYAJI, Ryoma ITO, Shotaro MIYASHITA
IEICE Transactions on Information and Systems Vol. E106.D No. 9 p. 1407-1422 2023/09/01 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communications Engineers ({IEICE})
-
Authenticated Tree-Based R-LWE Group Key Exchange.
Hector B. Hougaard, Atsuko Miyaji
The Computer Journal Vol. 66 No. 2 p. 360-372 2023/02 Research paper (scientific journal)
-
Preface
Li, S., Manulis, M., Miyaji, A.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 13983 LNCS 2023 Research paper (scientific journal)
Publisher: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
-
Re-visited Privacy-Preserving Machine Learning.
Atsuko Miyaji, Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita, Tomoaki Mimoto
PST p. 1-10 2023 Research paper (international conference proceedings)
-
Constant-Size Group Signatures with Message-Dependent Opening from Lattices.
Simin Chen, Jiageng Chen, Atsuko Miyaji, Kaiming Chen
ProvSec p. 166-185 2023 Research paper (international conference proceedings)
-
Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning.
Bingchang He, Atsuko Miyaji
ISC p. 42-56 2023 Research paper (international conference proceedings)
-
Isogeny-Based Multi-signature Scheme.
Mathieu de Goyon, Atsuko Miyaji
ISPEC p. 477-491 2023 Research paper (international conference proceedings)
-
A Practical Forward-Secure DualRing.
Nan Li 0007, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen
CANS p. 516-537 2023 Research paper (international conference proceedings)
-
Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties.
Hideaki Miyaji, Atsuko Miyaji
CANS p. 497-515 2023 Research paper (international conference proceedings)
-
Lattice-Based Accumulator with Constant Time List Update and Constant Time Verification.
Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji
Codes, Cryptology and Information Security - 4th International Conference(C2SI) p. 204-222 2023 Research paper (international conference proceedings)
Publisher: Springer
-
Privacy-Preserving Frequency Estimation Method.
Naoki Kawahara, Atsuko Miyaji, Tomoaki Mimoto
AsiaJCIS p. 102-108 2023 Research paper (international conference proceedings)
-
Revisited linear approximation formula of ChaCha.
Atsuki Nagai, Atsuko Miyaji
AsiaJCIS p. 95-101 2023 Research paper (international conference proceedings)
-
Identification of Static and Dynamic Security Controls Using Machine Learning.
Florencio Javier González-Rodriguez, Eleazar Aguirre Anaya, Moisés Salinas-Rosales, Atsuko Miyaji
Computación y Sistemas Vol. 27 No. 2 2023 Research paper (scientific journal)
-
Blockchain Based M+1st-Price Auction With Exponential Bid Upper Bound.
Po-Chu Hsu, Atsuko Miyaji
IEEE Access Vol. 11 p. 91184-91195 2023 Research paper (scientific journal)
-
Privacy-Preserving Social Media With Unlinkability and Disclosure.
Hideaki Miyaji, Po-Chu Hsu, Atsuko Miyaji
IEEE Access Vol. 11 p. 28955-28965 2023 Research paper (scientific journal)
-
Privacy-Preserving Distributed Medical Data Integration Security System for Accuracy Assessment of Cancer Screening: Development Study of Novel Data Integration System (Preprint)
Atsuko Miyaji, Kaname Watanabe, Yuuki Takano, Kazuhisa Nakasho, Sho Nakamura, Yuntao Wang, Hiroto Narimatsu
2022/05/17
Publisher: JMIR Publications Inc.
-
Lattice-Based Accumulator with Efficient Updating
Yuta Maeno, Atsuko Miyaji, Hideaki Miyaji
Proceedings - 2022 17th Asia Joint Conference on Information Security, AsiaJCIS 2022 p. 33-40 2022 Research paper (international conference proceedings)
-
Privacy-Preserving Data Analysis without Trusted Third Party.
Atsuko Miyaji, Tomoka Takahashi, Ping-Lun Wang, Tatsuhiro Yamatsuki, Tomoaki Mimoto
IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom) p. 710-717 2022 Research paper (international conference proceedings)
Publisher: IEEE
-
PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher
Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji
Information Security and Privacy p. 46-66 2022 Part of collection (book)
Publisher: Springer International Publishing
-
A Commitment Scheme with Output Locality-3 Fit for the IoT Device
Hideaki Miyaji, Yuntao Wang, Akinori Kawachi, Atsuko Miyaji
Security and Communication Networks Vol. 2021 p. 1-10 2021/11/29 Research paper (scientific journal)
Publisher: Hindawi Limited
-
A Practical Parallel Computation in a Scalable Multiparty Private Set Intersection
Seitaro Mishima, Kazuhisa Nakasho, Yuuki Takano, Atsuko Miyaji
The Ninth International Symposium on Computing and Networking (CANDAR2021) p. 332-338 2021/11 Research paper (international conference proceedings)
-
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT
Mohammad Mamun, Atsuko Miyaji, Rongxing Luv, Chunhua Su
Peer-to-Peer Networking and Applications Vol. 14 No. 2 p. 708-721 2021/03/01 Research paper (scientific journal)
Publisher: Springer
-
PRSafe: Primitive recursive function based domain specific language using LLVM
Sai Veerya Mahadevan, Yuuki Takano, Atsuko Miyaji
2021 International Conference on Electronics, Information, and Communication, ICEIC 2021 2021/01/31 Research paper (international conference proceedings)
Publisher: Institute of Electrical and Electronics Engineers Inc.
-
Efficient algorithm to compute odd-degree isogenies between Montgomery curves for CSIDH
Kenta Kodera, Chen-Mou Cheng, Atsuko Miyaji
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104A No. 9 p. 1245-1254 2021 Research paper (scientific journal)
Publisher: Institute of Electronics Information Communication Engineers
-
Privacy Risk of Document Data and a Countermeasure Framework.
Tomoaki Mimoto, Masayuki Hashimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji
Journal of Information Processing Vol. 29 p. 778-786 2021 Research paper (scientific journal)
-
Message-Restriction-Free Commitment Scheme Based on Lattice Assumption
Hideaki Miyaji, Yuntao Wang, Atsuko Miyaji
Information Security Practice and Experience p. 90-105 2021 Part of collection (book)
Publisher: Springer International Publishing
-
New Iterated RC4 Key Correlations and Their Application to Plaintext Recovery on WPA-TKIP
Ryoma Ito, Atsuko Miyaji
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences. Vol.E104-A, No.1 Vol. E104.A No. 1 p. 190-202 2021 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
-
A practical privacy-preserving algorithm for document data
Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji
Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 p. 1376-1383 2020/12/01 Research paper (international conference proceedings)
Publisher: Institute of Electrical and Electronics Engineers Inc.
-
Homomorphic commitment scheme with constant output locality
Hideaki Miyaji, Atsuko Miyaji, Yuntao Wang
2020 Eighth International Symposium on Computing and Networking (CANDAR) p. 167-173 2020/11 Research paper (international conference proceedings)
Publisher: IEEE
-
Development and Application of Privacy-preserving Distributed Medical Data Integration System
Seitaro Mishima, Kazuhisa Nakasho, Kousuke Takeuchi, Naohiro Hayaishi, Yuuki Takano, Atsuko Miyaji
2020 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2020 2020/09/28 Research paper (international conference proceedings)
Publisher: Institute of Electrical and Electronics Engineers Inc.
-
Efficient algorithm for computing odd-degree isogenies on montgomery curves
Kenta Kodera, Chen-Mou Cheng, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 12583 p. 258-275 2020 Research paper (international conference proceedings)
Publisher: Springer Science and Business Media Deutschland GmbH
-
Secure and Compact Elliptic Curve LR Scalar Multiplication
Yaoan Jin, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 12248 p. 605-618 2020 Research paper (international conference proceedings)
Publisher: Springer
-
Secure Data Management Technology.
Tomoaki Mimoto, Shinsaku Kiyomoto, Atsuko Miyaji
Security Infrastructure Technology for Integrated Utilization of Big Data p. 65-105 2020
Publisher: Springer
-
Cryptography Core Technology.
Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji, Shinya Okumura
Security Infrastructure Technology for Integrated Utilization of Big Data p. 5-33 2020
Publisher: Springer
-
Introduction.
Atsuko Miyaji, Shinsaku Kiyomoto, Katsuya Tanaka, Yoshifumi Nishida, Koji Kitamura
Security Infrastructure Technology for Integrated Utilization of Big Data p. 1-3 2020
Publisher: Springer
-
Security Infrastructure Technology for Integrated Utilization of Big Data - Applied to the Living Safety and Medical Fields
Security Infrastructure Technology for Integrated Utilization of Big Data 2020
Publisher: Springer
-
Online-Efficient Interval Test via Secure Empty-Set Check", IEICE TRANSACTIONS on Information and Systems
Katsunari Shishido, Atsuko Miyaji
2020
-
Compact Elliptic Curve Scalar Multiplication with a Secure Generality
Yaoan Jin, Atsuko Miyaji
IPSJ Journal 2020
-
Anonymization Technique Based on SGD Matrix Factorization.
Tomoaki Mimoto, Seira Hidano, Shinsaku Kiyomoto, Atsuko Miyaji
IEICE Trans. Inf. Syst. Vol. 103-D No. 2 p. 299-308 2020 Research paper (scientific journal)
-
New Pseudo-Random Number Generator for EPC Gen2.
Hiroshi Nomaguchi, Chunhua Su, Atsuko Miyaji
IEICE Trans. Inf. Syst. Vol. 103-D No. 2 p. 292-298 2020 Research paper (scientific journal)
-
String commitment scheme with low output locality
Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji
Proceedings - 2019 14th Asia Joint Conference on Information Security, AsiaJCIS 2019 p. 32-39 2019/08/01 Research paper (international conference proceedings)
Publisher: Institute of Electrical and Electronics Engineers Inc.
-
Secure online-efficient interval test based on empty-set check
Katsunari Shishido, Atsuko Miyaji
Proceedings - 2019 14th Asia Joint Conference on Information Security, AsiaJCIS 2019 p. 56-63 2019/08/01 Research paper (international conference proceedings)
Publisher: Institute of Electrical and Electronics Engineers Inc.
-
Beyond Visual Line of Sight UAV Control for Remote Monitoring Using Directional Antennas.
Songwei Li, Yixin Gu, Bishrut Subedi, Chenyuan He, Yan Wan, Atsuko Miyaji, Teruo Higashino
2019 IEEE Globecom Workshops p. 1-6 2019 Research paper (international conference proceedings)
Publisher: IEEE
-
Differences among Summation Polynomials over Various Forms of Elliptic Curves.
Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 102-A No. 9 p. 1061-1071 2019 Research paper (scientific journal)
-
An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks.
Akifumi Muroi, Shinya Okumura, Atsuko Miyaji
Selected Areas in Cryptography - SAC 2019 - 26th International Conference(SAC) p. 421-436 2019 Research paper (international conference proceedings)
Publisher: Springer
-
Secure and Compact Elliptic Curve Cryptosystems.
Yaoan Jin, Atsuko Miyaji
Information Security and Privacy - 24th Australasian Conference(ACISP) p. 639-650 2019 Research paper (international conference proceedings)
Publisher: Springer
-
OTP-IoT: An ownership transfer protocol for the Internet of Things
Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali Ghorbani
Journal of Information Security and Applications Vol. 43 p. 73-82 2018/12 Research paper (scientific journal)
-
Efficient and quasi-Accurate Private Multiset Unions
Katsunari Shishido, Atsuko Miyaji
WORKSHOP on Big Data and Iot Security (BITS) 2018/06 Research paper (international conference proceedings)
-
A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes.
Tung Chou, Yohei Maezawa, Atsuko Miyaji
Information Security and Cryptology - ICISC 2018 - 21st International Conference(ICISC) p. 341-353 2018 Research paper (international conference proceedings)
Publisher: Springer
-
Development of a Secure Cross-Institutional Data Collection System Based on Distributed Standardized EMR Storage.
Katsuya Tanaka, Ryuichi Yamamoto, Kazuhisa Nakasho, Atsuko Miyaji
Studies in Health Technology and Informatics Vol. 255 No. 255 p. 35-39 2018 Research paper (international conference proceedings)
Publisher: IOS Press
-
OTP-IoT: An ownership transfer protocol for the Internet of Things.
Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali Ghorbani
J. Inf. Secur. Appl. Vol. 43 No. 43 p. 73-82 2018 Research paper (scientific journal)
-
An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields.
Shota Terada, Hideto Nakano, Shinya Okumura, Atsuko Miyaji
International Symposium on Information Theory and Its Applications(ISITA) p. 306-310 2018 Research paper (international conference proceedings)
Publisher: IEEE
-
Revisited Diffusion Analysis of Salsa and ChaCha.
Yusuke Matsuoka, Atsuko Miyaji
International Symposium on Information Theory and Its Applications(ISITA) p. 452-456 2018 Research paper (international conference proceedings)
Publisher: IEEE
-
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.
Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji
16th Annual Conference on Privacy, Security and Trust(PST) p. 1-7 2018 Research paper (international conference proceedings)
Publisher: IEEE Computer Society
-
Efficient and Quasi-accurate Multiparty Private Set Union.
Katsunari Shishido, Atsuko Miyaji
2018 IEEE International Conference on Smart Computing (SMARTCOMP) p. 309-314 2018 Research paper (international conference proceedings)
Publisher: IEEE Computer Society
-
New Iterated RC4 Key Correlations.
Ryoma Ito, Atsuko Miyaji
Information Security and Privacy p. 154-171 2018 Research paper (international conference proceedings)
Publisher: Springer International Publishing
-
SupAUTH: A new approach to supply chain authentication for the IoT.
Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Atsuko Miyaji, Uyen Trang Nguyen
Comput. Intell. Vol. 34 No. 2 p. 582-602 2018 Research paper (scientific journal)
-
On the computational complexity of ECDLP for elliptic curves in various forms using index calculus
Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10779 p. 245-263 2018 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices
Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, Komwut Wipusitwarakun
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY Vol. 12 No. 12 p. 3024-3038 2017/12 Research paper (scientific journal)
-
Cloud computing security and privacy: Standards and regulations
Yong Yu, Atsuko Miyaji, Man Ho Au, Willy Susilo
COMPUTER STANDARDS & INTERFACES Vol. 54 No. 1 p. 1-2 2017/11 Research paper (scientific journal)
-
(p, N)-identifiability: Anonymity under practical adversaries
Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka, Atsuko Miyaji
Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 p. 996-1003 2017/09/07 Research paper (international conference proceedings)
Publisher: Institute of Electrical and Electronics Engineers Inc.
-
Evaluation and improvement of pseudo-random number generator for EPC Gen2
Hiroshi Nomaguchi, Atsuko Miyaji, Chunhua Su
Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 p. 721-728 2017/09/07 Research paper (international conference proceedings)
-
Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data
Rashed Mazumder, Atsuko Miyaji, Chunhua Su
International Journal of Foundations of Computer Science Vol. 28 No. 6 p. 661-682 2017/09/01 Research paper (international conference proceedings)
-
A simple authentication encryption scheme
Rashed Mazumder, Atsuko Miyaji, Chunhua Su
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE Vol. 29 No. 16 2017/08 Research paper (scientific journal)
-
Applied Cryptography and Network Security
Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
2017/07 Research paper (international conference proceedings)
Publisher:
-
A Re-visited Construction of Nonce and Associated-data based Authenticated Encryption
Rashed Mazumder, Atsuko Miyaji, Chunhua Su
The 1st US-Japan Workshop Enabling Global Collaborations in Big Data Research p. 15-18 2017/06 Research paper (international conference proceedings)
-
Robust ORAM: Enhancing availability, confidentiality and integrity
Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Ayumu Kubota
Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC p. 30-39 2017/05/05 Research paper (international conference proceedings)
Publisher: IEEE Computer Society
-
Variable message encryption through blockcipher compression function
Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE Vol. 29 No. 7 2017/04 Research paper (scientific journal)
-
Privacy-Preserving Integration of Medical Data: A Practical Multiparty Private Set Intersection
Atsuko Miyaji, Kazuhisa Nakasho, Shohei Nishida
Journal of Medical Systems Vol. 41 No. 3 2017/03/01 Research paper (scientific journal)
-
Refined Construction of RC4 Key Setting in WPA
Ryoma ITO, Atsuko MIYAJI
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E100.A No. 1 p. 138-148 2017 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
-
A Simple Construction of Encryption for a Tiny Domain Message
Rashed Mazumder, Atsuko Miyaji, Chunhua Su
2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) 2017 Research paper (international conference proceedings)
-
Robust ORAM: Enhancing Availability, Confidentiality and Integrity
Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Ayumu Kubota
2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017) p. 30-39 2017 Research paper (international conference proceedings)
-
Refined Construction of RC4 Key Setting in WPA
Ryoma Ito, Atsuko Miyaji
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E100A No. 1 p. 138-148 2017/01 Research paper (scientific journal)
-
Privacy-Preserving Integration of Medical Data - A Practical Multiparty Private Set Intersection.
Atsuko Miyaji, Kazuhisa Nakasho, Shohei Nishida
J. Medical Systems Vol. 41 No. 3 p. 37-10 2017 Research paper (scientific journal)
-
A New Scheme of (n,n) Blockcipher based Cryptographic Hash: Single Key Scheduling
Jiageng Chen, Rashed Mazumder, Atsuko Miyaji
Lecture Notes in Computer Science Vol. XXX(2015) 2016/12 Research paper (international conference proceedings)
Publisher: Springer-Verlag
-
Improved Differential Characteristic Searching Methods
Jiageng Chen, Atsuko Miyaji, Chunhua Su, Je Sen Teh
IEEE Vol. to appear 2016/12 Research paper (international conference proceedings)
Publisher: IEEE
-
Flexible and scalable implementation of elliptic-curve cryptography on FPGA
B.-Y. Peng, Y.-C. Hsu, Y.-J. Chen, D.-C. Chueh, B.-Y. Yang, C.-M. Cheng, A. Miyaji
2016/10 Research paper (international conference proceedings)
-
A Matrix Based ORAM: Design, Implementation and Experimental Analysis
Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS Vol. E99D No. 8 p. 2044-2055 2016/08 Research paper (scientific journal)
-
Refined RC4 Key Correlations of Internal States in WPA
Ryoma Ito, Atsuko Miyaji
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E99A No. 6 p. 1132-1144 2016/06 Research paper (scientific journal)
-
A New Scheme of Blockcipher Hash
Rashed Mazumder, Atsuko Miyaji
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS Vol. E99D No. 4 p. 796-804 2016/04 Research paper (scientific journal)
-
A single key scheduling based compression function
Jiageng Chen, Rashed Mazumder, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9572 p. 207-222 2016 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
Refined Glimpse Correlations of RC4
Ryoma ITO, Atsuko MIYAJI
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E99.A No. 1 p. 3-13 2016 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
-
Refined RC4 Key Correlations of Internal States in WPA
Ryoma ITO, Atsuko MIYAJI
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E99.A No. 6 p. 1132-1144 2016 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
-
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256
Jiageng Chien, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E99A No. 1 p. 14-21 2016/01 Research paper (scientific journal)
-
Refined Glimpse Correlations of RC4
Ryoma Ito, Atsuko Miyaji
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E99A No. 1 p. 3-13 2016/01 Research paper (scientific journal)
-
Secure and Traceable Framework for Data Circulation
Kaitai Liang, Atsuko Miyaji, Chunhua Su
INFORMATION SECURITY AND PRIVACY, PT I Vol. 9722 p. 376-388 2016 Research paper (international conference proceedings)
-
Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space
Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, Komwut Wipusitwarakun
APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY Vol. 651 p. 130-141 2016 Research paper (international conference proceedings)
-
Security and Experimental Performance Analysis of a Matrix ORAM
Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin
2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) 2016 Research paper (international conference proceedings)
-
M-ORAM: A matrix ORAM with Log N bandwidth cost
Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9503 p. 3-15 2016 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
Accurate Estimation of the Full Differential Distribution for General Feistel Structures
Jiageng Chen, Atsuko Miyaji, Chunhua Su, Je Sen Teh
INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015 Vol. 9589 p. 108-124 2016 Research paper (international conference proceedings)
-
An Efficient Construction of a Compression Function for Cryptographic Hash
Rashed Mazumder, Atsuko Miyaji, Chunhua Su
AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, CD-ARES 2016, PAML 2016 Vol. 9817 p. 124-140 2016 Research paper (international conference proceedings)
-
A Blockcipher Based Authentication Encryption
Rashed Mazumder, Atsuko Miyaji, Chunhua Su
AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, CD-ARES 2016, PAML 2016 Vol. 9817 p. 106-123 2016 Research paper (international conference proceedings)
-
Elliptic curve cryptography: Algorithms and implementation analysis over coordinate systems
Iskandar Setiadi, Achmad Imam Kistijantoro, Atsuko Miyaji
ICAICTA 2015 - 2015 International Conference on Advanced Informatics: Concepts, Theory and Applications 2015/11/20 Research paper (international conference proceedings)
Publisher: Institute of Electrical and Electronics Engineers Inc.
-
Self-healing wireless sensor networks
Atsuko Miyaji, Kazumasa Omote
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE Vol. 27 No. 10 p. 2547-2568 2015/07 Research paper (scientific journal)
-
SKENO: Secret key encryption with non-interactive opening
Jiageng Chen, Keita Emura, Atsuko Miyaji
Journal of Mathematical Cryptology Vol. 9 No. 2 p. 63-74 2015/06/01 Research paper (scientific journal)
Publisher: Walter de Gruyter GmbH
-
Generic constructions of secure-channel free searchable encryption with adaptive security
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote
SECURITY AND COMMUNICATION NETWORKS Vol. 8 No. 8 p. 1547-1560 2015/05 Research paper (scientific journal)
-
A privacy-preserving efficient RFID authentication protocol from SLPN assumption
Mohammad Saiful Islam Mamun, Atsuko Miyaji
International Journal of Computational Science and Engineering Vol. 10 No. 3 p. 234-243 2015 Research paper (scientific journal)
Publisher: Inderscience Enterprises Ltd.
-
An efficient batch verification system and its effect in a real time VANET environment
Jiageng Chen, Mohammad Saiful Islam Mamun, Atsuko Miyaji
SECURITY AND COMMUNICATION NETWORKS Vol. 8 No. 2 p. 298-310 2015/01 Research paper (scientific journal)
-
Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags
Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su
2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 Vol. Volume1 p. 17-24 2015 Research paper (international conference proceedings)
-
Analysis of Path ORAM toward Practical Utilization
Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin
PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015) p. 646-651 2015 Research paper (international conference proceedings)
-
A new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling
Atsuko Miyaji, Mazumder Rashed
2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015) p. 564-570 2015 Research paper (international conference proceedings)
-
A new statistical approach for integral attack
Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9408 p. 345-356 2015 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
A scalable multiparty private set intersection
Atsuko Miyaji, Shohei Nishida
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9408 p. 376-385 2015 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree
Atsuko Miyaji, Xiaonan Shi, Satoru Tanaka
ALGEBRAIC INFORMATICS (CAI 2015) Vol. 9270 p. 165-175 2015 Research paper (international conference proceedings)
-
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA
Ryoma Ito, Atsuko Miyaji
FAST SOFTWARE ENCRYPTION, FSE 2015 Vol. 9054 p. 557-576 2015 Research paper (international conference proceedings)
-
How TKIP Induces Biases of Internal States of Generic RC4
Ryoma Ito, Atsuko Miyaji
INFORMATION SECURITY AND PRIVACY (ACISP 2015) Vol. 9144 p. 329-342 2015 Research paper (international conference proceedings)
-
New Integrated Long-Term Glimpse of RC4
Ryoma Ito, Atsuko Miyaji
INFORMATION SECURITY APPLICATIONS, WISA 2014 Vol. 8909 p. 137-149 2015 Research paper (international conference proceedings)
-
A New (n, n) Blockcipher Hash Function Using Feistel Network: Apposite for RFID Security
Atsuko Miyaji, Mazumder Rashed
COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 3 Vol. 33 p. 519-528 2015 Research paper (international conference proceedings)
-
POND: A novel protocol for network coding based on hybrid cryptographic scheme
Chengqiang Huang, Atsuko Miyaji, Longhai Li, Shangmei Xu
Proceedings - 2014 IEEE International Conference on Computer and Information Technology, CIT 2014 p. 373-380 2014/12/12 Research paper (international conference proceedings)
Publisher: Institute of Electrical and Electronics Engineers Inc.
-
Distributed pseudo-random number generation and its application to cloud database
Jiageng Chen, Atsuko Miyaji, Chunhua Su
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 8434 p. 373-387 2014 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
Secure VANET Applications with a refined Group Signature
Mohammad Saiful Islam Mamun, Atsuko Miyaji
2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) p. 199-206 2014 Research paper (international conference proceedings)
-
RFID Path Authentication, Revisited
Mohammad Saiful Islam Mamun, Atsuko Miyaji
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) p. 245-252 2014 Research paper (international conference proceedings)
-
A Scalable and Secure RFID Ownership Transfer Protocol
Mohammad Saiful Islam Mamun, Atsuko Miyaji
2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) p. 343-350 2014 Research paper (international conference proceedings)
-
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags
Jiageng Chen, Atsuko Miyaji, Chunhua Su
PROVABLE SECURITY, PROVSEC 2014 Vol. 8782 p. 103-116 2014 Research paper (international conference proceedings)
-
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock
Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su
NETWORK AND SYSTEM SECURITY Vol. 8792 p. 184-197 2014 Research paper (international conference proceedings)
-
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users
Keita Emura, Atsuko Miyaji, Kazumasa Omote
JOURNAL OF APPLIED MATHEMATICS 2014 Research paper (scientific journal)
-
A multi-purpose Group Signature for Vehicular Network Security
Mohammad Saiful Islam Mamun, Atsuko Miyaji, Hiroaki Takada
2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014) p. 509-514 2014 Research paper (international conference proceedings)
-
A collision attack on a double-block-length compression function instantiated with round-reduced AES-256
Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 8949 p. 271-285 2014 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
A new (n, n) Blockcipher based Hash Function for Short Messages
Atsuko Miyaji, Mazumder Rashed, Tsuyoshi Sawada
2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS) p. 56-63 2014 Research paper (international conference proceedings)
-
Novel strategies for searching RC4 key collisions
Jiageng Chen, Atsuko Miyaji
Computers and Mathematics with Applications Vol. 66 No. 1 p. 81-90 2013/08 Research paper (scientific journal)
-
Differential cryptanalysis and boomerang cryptanalysis of LBlock
Jiageng Chen, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 8128 p. 1-15 2013 Research paper (international conference proceedings)
-
Self-healing Schemes Suitable for Various WSNs
Atsuko Miyaji, Kazumasa Omote
INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2013 Vol. 8223 p. 92-105 2013 Research paper (international conference proceedings)
-
A fully-secure RFID authentication protocol from exact LPN assumption
Mohammad Saiful Islam Mamun, Atsuko Miyaji
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) p. 102-109 2013 Research paper (international conference proceedings)
-
Private Multiparty Set Intersection Protocol in Rational Model
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) p. 431-438 2013 Research paper (international conference proceedings)
-
How to Build Random Key Pre-distribution Schemes with Self-healing for Multiphase WSNs
Atsuko Miyaji, Kazumasa Omote
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) p. 205-212 2013 Research paper (international conference proceedings)
-
Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack
Jiageng Chen, Atsuko Miyaji
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E95A No. 12 p. 2148-2159 2012/12 Research paper (scientific journal)
-
Dynamic attribute-based signcryption without random oracles
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
International Journal of Applied Cryptography Vol. 2 No. 3 p. 199-211 2012/02 Research paper (scientific journal)
-
Privacy-preserving two-party rational set intersection protocol
Atsuko Miyaji, Mohammad Shahriar Rahman
Informatica (Slovenia) Vol. 36 No. 3 p. 277-286 2012 Research paper (scientific journal)
-
A Novel Hybrid IP Traceback Scheme with Packet Counters
Tomoyuki Karasawa, Soshi Masakazu, Miyaji Atsuko
Lecture Notes in Computer Science Vol. 7646 p. 71-84 2012
Publisher: Springer
-
How to enhance the security on the least significant bit
Atsuko Miyaji, Yiren Mo
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7712 p. 263-279 2012 Research paper (international conference proceedings)
-
A secure and private RFID authentication protocol under SLPN problem
Mohammad S. I. Mamun, Atsuko Miyaji, Mohammad S. Rahman
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7645 p. 476-489 2012 Research paper (international conference proceedings)
-
Constant-ciphertext-size dual policy attribute based encryption
Atsuko Miyaji, Phuong V. X. Tran
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7672 p. 400-413 2012 Research paper (international conference proceedings)
-
A revocable group signature scheme with the property of hiding the number of revoked users
Keita Emura, Atsuko Miyaji, Kazumasa Omote
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7259 p. 186-203 2012 Research paper (international conference proceedings)
-
An intrusion and random-number-leakage resilient scheme in mobile unattended WSNs
Tatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote
Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012 p. 552-557 2012 Research paper (international conference proceedings)
-
Privacy-preserving set operations in the presence of rational parties
Atsuko Miyaji, Mohammad Shahriar Rahman
Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012 p. 869-874 2012 Research paper (international conference proceedings)
-
Lightweight integrity for XOR network coding in Wireless Sensor Networks
Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7232 p. 245-258 2012 Research paper (international conference proceedings)
-
An Optimized Signature Verification System for Vehicle Ad hoc NETwork
Mohammad Saiful Islam Mamun, Atsuko Miyaji
2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM) 2012 Research paper (international conference proceedings)
-
Generalized Analysis on Key Collisions of Stream Cipher RC4
Jiageng Chen, Atsuko Miyaji
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E94A No. 11 p. 2194-2206 2011/11 Research paper (scientific journal)
-
Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
Atsuko Miyaji, Kazumasa Omote
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS Vol. E94D No. 10 p. 1955-1965 2011/10 Research paper (scientific journal)
-
A Timed-Release Proxy Re-Encryption Scheme
Keita Emura, Atsuko Miyaji, Kazumasa Omote
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E94A No. 8 p. 1682-1695 2011/08 Research paper (scientific journal)
-
Efficient and low-cost RFID authentication schemes
Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Vol. 2 No. 3 p. 4-25 2011 Research paper (scientific journal)
Publisher: Innovative Information Science and Technology Research Group
-
Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic
Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, Alexandre Venelli
Journal of Cryptographic Engineering Vol. 1 No. 2 p. 161-176 2011 Research paper (scientific journal)
-
Unconditionally secure oblivious transfer based on channel delays
Kai-Yuen Cheong, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7043 p. 112-120 2011 Research paper (international conference proceedings)
-
T-robust scalable group key exchange protocol with O(log n) complexity
Tetsuya Hatano, Atsuko Miyaji, Takashi Sato
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 6812 p. 189-207 2011 Research paper (international conference proceedings)
-
New concrete relation between trace, definition field, and embedding degree
Shoujiro Hirasawa, Atsuko Miyaji
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E94-A No. 6 p. 1368-1374 2011 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
-
An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System
Keita Emura, Atsuko Miyaji, Kazumasa Omote
PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS Vol. 6711 p. 77-+ 2011 Research paper (international conference proceedings)
-
Sequential Bitwise Sanitizable Signature Schemes
Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E94A No. 1 p. 392-404 2011/01 Research paper (scientific journal)
-
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption
Keita Emura, Atsuko Miyaji, Kazumasa Omote
INFORMATION SECURITY Vol. 7001 p. 102-+ 2011 Research paper (international conference proceedings)
-
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model
Jiageng Chen, Atsuko Miyaji
INFORMATION SECURITY AND CRYPTOLOGY Vol. 6584 p. 62-76 2011 Research paper (international conference proceedings)
-
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments
Yvo Desmedt, Atsuko Miyaji
INFORMATION SECURITY AND CRYPTOLOGY Vol. 6584 p. 236-+ 2011 Research paper (international conference proceedings)
-
Hidden Credential Retrieval without Random Oracles
Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi
INFORMATION SECURITY APPLICATIONS Vol. 6513 p. 160-+ 2011 Research paper (international conference proceedings)
-
Privacy-Preserving Data Mining: A Game-Theoretic Approach
Atsuko Miyaji, Mohammad Shahriar Rahman
DATA AND APPLICATIONS SECURITY AND PRIVACY XXV Vol. 6818 p. 186-200 2011 Research paper (international conference proceedings)
-
How to Find Short RC4 Colliding Key Pairs
Jiageng Chen, Atsuko Miyaji
INFORMATION SECURITY Vol. 7001 p. 32-46 2011 Research paper (international conference proceedings)
-
POLISH: Proactive Co-operative Link Self-Healing for Wireless Sensor Networks
Tatsuro Iida, Atsuko Miyaji, Kazumasa Omote
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS Vol. 6976 p. 253-267 2011 Research paper (international conference proceedings)
-
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks
Atsuko Miyaji, Kazumasa Omote
INFORMATION SECURITY APPLICATIONS Vol. 6513 p. 135-149 2011 Research paper (international conference proceedings)
-
匿名IDベース暗号を用いたセキュアチャネルフリー検索可能公開鍵暗号方式の一般的構成法
江村恵太, 宮地充子, 面和成
暗号と情報セキュリティシンポジウム (SCIS) 2011/01 Research paper (conference, symposium, etc.)
-
Ideal secret sharing schemes with share selectability
Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7043 p. 143-157 2011 Research paper (international conference proceedings)
Publisher: Springer
-
Non-interactive opening for ciphertexts encrypted by shared keys
Jiageng Chen, Keita Emura, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7043 p. 57-68 2011 Research paper (international conference proceedings)
Publisher: Springer
-
Toward dynamic attribute-based signcryption (poster)
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 6812 p. 439-443 2011 Research paper (international conference proceedings)
Publisher: Springer
-
New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
MIYAJI Atsuko, SUKEGAWA Masahiro
IEICE Trans. Fundamentals Vol. 93 No. 6 p. 1066-1077 2010/06/01
Publisher: The Institute of Electronics, Information and Communication Engineers
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
Keita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi
International Journal of Applied Cryptography Vol. 2 No. 1 p. 46-59 2010 Research paper (scientific journal)
-
APRAP: Another privacy preserving RFID authentication protocol
Atsuko Miyaji, Mohammad Shahriar Rahman
2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010 p. 13-18 2010 Research paper (international conference proceedings)
-
Co-Z addition formulæ and binary ladders on elliptic curves
Raveen R. Goundar, Marc Joye, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 6225 p. 65-79 2010 Research paper (international conference proceedings)
-
RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks
Hisashige Ito, Atsuko Miyaji, Kazumasa Omote
2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010 2010 Research paper (international conference proceedings)
-
Privacy-Preserving Data Mining in Presence of Covert Adversaries
Atsuko Miyaji, Mohammad Shahriar Rahman
ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I Vol. 6440 p. 429-440 2010 Research paper (international conference proceedings)
-
A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance
Jiageng Chen, Atsuko Miyaji
INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS Vol. 6047 p. 30-44 2010 Research paper (international conference proceedings)
-
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication
Keita Emura, Atsuko Miyaji, Kazumasa Omote
PROVABLE SECURITY Vol. 6402 p. 200-+ 2010 Research paper (international conference proceedings)
-
Generalized RC4 Key Collisions and Hash Collisions
Jiageng Chen, Atsuko Miyaji
SECURITY AND CRYPTOGRAPHY FOR NETWORKS Vol. 6280 p. 73-87 2010 Research paper (international conference proceedings)
-
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation
Keita Emura, Atsuko Miyaji, Kazumasa Omote
PROVABLE SECURITY Vol. 6402 p. 184-+ 2010 Research paper (international conference proceedings)
-
Efficient privacy-preserving data mining in malicious model
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 6440 No. 1 p. 370-382 2010 Research paper (international conference proceedings)
Publisher: Springer
-
A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics
Keita Emura, Atsuko Miyaji, Kazumasa Omote
Journal of Information Processing Vol. 17 p. 216-231 2009 Research paper (scientific journal)
Publisher: Information Processing Society of Japan
-
Elliptic curves with a pre-determined embedding degree
Shoujirou Hirasawa, Atsuko Miyaji
IEEE International Symposium on Information Theory - Proceedings p. 2391-2395 2009 Research paper (international conference proceedings)
-
New correlations of RC4 PRGA using nonzero-bit differences
Atsuko Miyaji, Masahiro Sukegawa
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 5594 p. 134-152 2009 Research paper (international conference proceedings)
-
A Secure RFID Authentication Protocol with Low Communication Cost
Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko Miyaji
CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2 p. 559-+ 2009 Research paper (international conference proceedings)
-
A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier
Keita Emura, Atsuko Miyaji, Kazumasa Omote
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2 p. 769-773 2009 Research paper (international conference proceedings)
-
A Selectable k-Times Relaxed Anonymous Authentication Scheme
Keita Emura, Atsuko Miyaji, Kazumasa Omote
INFORMATION SECURITY APPLICATIONS Vol. 5932 p. 281-295 2009 Research paper (international conference proceedings)
-
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length
Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi
INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS Vol. 5451 p. 13-+ 2009 Research paper (international conference proceedings)
-
A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics
Keita Emura, Atsuko Miyaji, Kazumasa Omote
2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2 p. 487-492 2009 Research paper (international conference proceedings)
-
Revisited (hyper)-elliptic curve scalar multiplication with a fixed point
Atsuko Miyaji, Kenji Mizosoe
Journal of Information Processing Vol. 16 p. 176-189 2008 Research paper (scientific journal)
Publisher: Information Processing Society of Japan
-
Generalized scalar multiplication secure against SPA, DPA, and RPA
Atsuko Miyaji
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E91-A No. 10 p. 2833-2842 2008 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
-
Security and access control for vehicular communications
Saber Zrelli, Atsuko Miyaji, Yoichi Shinoda, Thierry Ernst
Proceedings - 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communication, WiMob 2008 p. 561-566 2008 Research paper (international conference proceedings)
-
Quantum Secret Sharing between Multiparty and Multiparty against the Attacks with Single Photons or EPR-pair
Atsushi Waseda, Takayuki Takagi, Masakazu Soshi, Atsuko Miyaji
2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3 p. 303-+ 2008 Research paper (international conference proceedings)
-
Simple Certificateless Signature with Smart Cards
Kazumasa Omote, Atsuko Miyaji, Kazuhiko Kato
EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS p. 431-+ 2008 Research paper (international conference proceedings)
-
Special section on cryptography and information security
Masakatu Morii, Shiho Moriai, Goichiro Hanaoka, Toru Akishita, Tetsuya Izu, Tetsu Iwata, Koji Okada, Toshinobu Kaneko, Hiroaki Kikuchi, Kwangjo Kim, Shinsaku Kiyomoto, Noboru Kunthiro, Hiroki Koga, Kazukuni Kobara, Ryuichi Sakai, Kouichi Sakurai, Kazue Sako, Takashi Satoh, Akira Shiozaki, Hiroki Shizuya, Tsuyoshi Takagi, Mitsuru Tada, Keisuke Tanaka, Hiroshi Doi, Toru Nakanishi, Shoichi Hirose, Eiichiro Fujisaki, Soichi Furuya, Mitsuru Matsui, Natsume Matsuzaki, Tsutomu Matsumoto, Atsuko Miyaji, Maid Yoshida
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E90-A No. 1 2007 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
-
Evaluation of the Security of RC6 against the x(2)-attack
Atsuko Miyaji, Yuuki Takano
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E90A No. 1 p. 22-28 2007/01 Research paper (scientific journal)
-
Mobile agent security with efficient oblivious transfer
Watarn Hasegawa, Masakazu Soshi, Atsuko Miyaji
SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY p. 299-304 2007 Research paper (international conference proceedings)
-
Generalized MMM-algorithm secure against SPA, DPA, and RPA
Atsuko Miyaji
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007 Vol. 4817 p. 282-296 2007 Research paper (international conference proceedings)
-
Special section on discrete mathematics and its applications
Keiko Imai, Hisashi Koga, Mitsuru Matsui, Tomomi Matsui, Atsuko Miyaji, Kunihiko Sadakane, Tetsuo Shibuya, Akiyoshi Shioura, Tsuyoshi Takagi, Yasuhiko Takenaga, Eiji Takimoto, Keisuke Tanaka, Tatsuie Tsukiji, Ryuhei Uehara, Takeaki Uno, Koichi Yamazaki, Satoshi Fujita
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E89-A No. 5 2006/01/01 Research paper (scientific journal)
-
Java Obfuscation Approaches to Construct Tamper-Resistant Object-Oriented Programs
Sakabe Yusuke, Soshi Masakazu, Miyaji Atsuko
Information and Media Technologies Vol. 1 No. 1 p. 134-146 2006
Publisher: Information and Media Technologies Editorial Board
-
Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E89-A No. 8 p. 2207-2215 2006 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
-
n-State Quantum Coin Flipping Protocol.
Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji
International Symposium on Information Technology: Coding and Computing (ITCC 2005) p. 776-777 2005 Research paper (international conference proceedings)
Publisher: IEEE Computer Society
-
On the Success Probability of chi2-attack on RC6.
Atsuko Miyaji, Yuuki Takano
Information Security and Privacy(ACISP) p. 61-74 2005 Research paper (international conference proceedings)
Publisher: Springer
-
Efficient countermeasures against RPA, DPA, and SPA
Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 3156 p. 343-356 2004 Research paper (scientific journal)
Publisher: Springer Verlag
-
A fully-functional group signature scheme over only known-order group
Atsuko Miyaji, Kozue Umeda
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 3089 p. 164-179 2004 Research paper (scientific journal)
Publisher: Springer Verlag
-
Success Probability in Chi2-Attacks.
Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano
Applied Cryptography and Network Security(ACNS) p. 310-325 2004 Research paper (international conference proceedings)
Publisher: Springer
-
Optimized χ2-attack against RC6
Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2846 p. 16-32 2003 Research paper (scientific journal)
Publisher: Springer Verlag
-
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents
Sakabe Yusuke, Soshi Masakazu, Miyaji Atsuko
Lecture Notes in Computer Science Vol. 2828 p. 89-103 2003
Publisher: Springer
-
A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th Root
Omote Kazumasa, Miyaji Atsuko
Lecture Notes in Computer Science Vol. 2357 p. 57-71 2003
Publisher: Springer
-
Evaluation of anonymity of practical anonymous communication networks
Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2727 p. 13-26 2003 Research paper (international conference proceedings)
-
An improved fast signature scheme without online multiplication
T Okamoto, M Tada, A Miyaji
FINANCIAL CRYPTOGRAPHY Vol. 2357 p. 152-167 2003 Research paper (scientific journal)
-
A multi-signature scheme with signers’ intentions secure against active attacks
Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2288 p. 328-340 2002 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
A multi-signature scheme with signers' intentinos secure against active attacks
Kawauchi Kei, Minato Hiroshi, Miyaji Atsuko, Tada Mitsuru
Lecture Notes in Computer Science Vol. 2288 p. 175-196 2002
Publisher: Springer
-
New explicit conditions of elliptic curve traces for FR-reduction
Atsuko Miyaji, Masaki Nakabayashi, Shunzou Takano
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E84-A No. 5 p. 1234-1243 2001 Research paper (scientific journal)
Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
-
An anonymous auction protocol with a single non-trusted center using binary trees
Kazumasa Omote, Atsuko Miyaji
INFORMATION SECURITY, PROCEEDINGS Vol. 1975 p. 108-120 2001 Research paper (scientific journal)
-
Efficient "on the fly" signature schemes based on integer factoring
Okamoto Takeshi, Tada Mitsuru, Miyaji Atsuko
Lecture Notes in Computer Science Vol. 2247 p. 275-286 2001
Publisher: Springer
-
Characterization of elliptic curve traces under FR-reduction
Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2015 p. 90-108 2001 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
A practical english auction with one-time registration
Kazumasa Omote, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2119 p. 221-234 2001 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
Efficient and unconditionally secure verifiable threshold changeable scheme
Ayako Maeda, Atsuko Miyaji, Mitsuru Tada
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2119 p. 403-416 2001 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
An agent-based model of anonymous communication protocols
K. Shigeki, M. Soshi, A. Miyaji
Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE Vol. 2001- p. 177-182 2001 Research paper (international conference proceedings)
Publisher: IEEE Computer Society
-
An anonymous auction protocol with a single non-trusted center using binary trees
Omote Kazumasa, Miyaji Atsuko
Lecture Notes in Computer Science Vol. 1975 p. 461-490 2000
Publisher: Springer
-
A multisignature scheme with message flexibility, order flexibility and order verifiability
Shirow Mitomi, Atsuko Miyaji
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 1841 p. 298-312 2000 Research paper (international conference proceedings)
Publisher: Springer Verlag
-
A message recovery signature scheme equivalent to DSA over elliptic curves
Miyaji Atsuko
Lecture Notes in Computer Science Vol. 1163 p. 1-14 1996
Publisher: Springer