顔写真

PHOTO

Miyaji Atsuko
宮地 充子
Miyaji Atsuko
宮地 充子
Graduate School of Engineering Division of Electrical, Electronic and Information Engineering, Professor

Research History 12

  1. 2024/11 - Present
    The University of Osaka Distinguished Professor

  2. 2015/10 - 2024/10
    Osaka University Graduate School of Engineering

  3. 2016/01 - 2023/05
    Information-technology Promotion Agency,Japan

  4. 2007/10 - 2023/03
    Japan Advanced Institute of Science and Technology Professor

  5. 2008/04 - 2012/03
    Japan Advanced Institute of Science and Technology

  6. 2008/04 - 2010/03
    Nara Institute of Science and Technology Lecturer (part-time)

  7. 2009/04 - 2009/09
    Kyoto University Lecturer (part-time)

  8. 2008/04 - 2008/09
    Kyoto University Lecturer (part-time)

  9. 1998/12 - 2007/10
    Japan Advanced Institute of Science and Technology Associate Professor

  10. 2007/04 - 2007/09
    Kyoto University Lecturer (part-time)

  11. 2001/04 - 2004/03
    University of Tsukuba Lecturer (part-time)

  12. 2002/04 - 2003/02
    University of California, Davis Visiting researcher

Education 2

  1. Osaka University

    - 1990

  2. Osaka University School of Science

    - 1988

Research Areas 3

  1. Informatics / Information networks /

  2. Informatics / Computer systems /

  3. Informatics / Information theory /

Awards 21

  1. Purple Ribbon

    Atsuko Miyaji Cabinet Office 2024/11

  2. Best Research Paper Award

    Japan Society for Software Science and Technology 2024/09

  3. Achievement Award

    IEICE 2023/06

  4. Distinguished Educational Practitioners Award

    教育優秀賞 2021/06

  5. Engineering Sciences Society: Contribution Award

    MIYAJI Atsuko 2012

  6. IPSJ/ITSCJ Project Editor Award

    MIYAJI Atsuko 2012

  7. 航空幕僚長感謝状受賞

    宮地 充子 2010

  8. IPSJ/ITSCJ Project Editor Award

    MIYAJI Atsuko 2010

  9. ADMA2010 Best Paper Award

    MIYAJI Atsuko 2010

  10. IPSJ/ITSCJ Project Editor Award

    MIYAJI Atsuko 2009

  11. IPSJ/ITSCJ Project Editor Award

    MIYAJI Atsuko 2008

  12. DoCoMo Mobile Science Awards

    MIYAJI Atsuko 2008

  13. 2007 Engineering Sciences Society: Certificate of Appreciation

    MIYAJI Atsuko 2007

  14. the Director-General of Industrial Science and Technology Policy and Environment Bureau Award

    MIYAJI Atsuko 2007

  15. AWARD for the contribution to CULTURE of SECURITY

    MIYAJI Atsuko 2007

  16. IPSJ/ITSCJ Project Editor Award

    MIYAJI Atsuko 2007

  17. Certificate of Appreciation

    MIYAJI Atsuko 2005

  18. the Standardization Contribution Award

    MIYAJI Atsuko 2003

  19. the IPSJ Sakai Special Researcher Award

    MIYAJI Atsuko 2002

  20. Notable Invention Award of the Science and Technology Agency

    MIYAJI Atsuko 1997

  21. Young Paper Award of SCIS'93

    MIYAJI Atsuko 1993

Papers 230

  1. Lattice-Based Key-Value Commitment Scheme

    Hideaki Miyaji, Atsuko Miyaji

    IEEE Transactions on Information Theory 2025/06 Research paper (scientific journal)

  2. Generic CCA Secure Key Homomorphic KEM and Updatable Public Key Encryption

    Kaiming Chen, Atsuko Miyaji, Jiageng Chen

    2025 Research paper (international conference proceedings)

  3. Consideration on Defining Field for Efficient Ring-LWE

    Rintaro Yamada, Shinya Okumura, Atsuko Miyaji

    2024 19th Asia Joint Conference on Information Security (AsiaJCIS) p. 25-32 2024/08/13 Research paper (international conference proceedings)

    Publisher: IEEE
  4. Backdoored-input Detection by Trigger Embedding

    Akira Fujimoto, Shintaro Yamashita, Yuntao Wang, Atsuko Miyaji

    2024 19th Asia Joint Conference on Information Security (AsiaJCIS) p. 121-128 2024/08/13 Research paper (international conference proceedings)

    Publisher: IEEE
  5. Secure and Compact Elliptic Curve Scalar Multiplication with Optimized Inversion.

    Yaoan Jin, Atsuko Miyaji

    Comput. J. Vol. 67 No. 2 p. 474-484 2024/02 Research paper (scientific journal)

  6. Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha

    Ryo Watanabe, Nasratullah Ghafoori, Atsuko Miyaji

    2024 Research paper (international conference proceedings)

  7. Revisiting an Extension of Kannan’s Embedding for Ring-LWE

    Satoshi Uesugi, Shinya Okumura, Atsuko Miyaji

    2024 Research paper (international conference proceedings)

  8. Generic Construction of Forward-Secure Chameleon Hash Function

    Pengxuan Wei, Koki Matsubara, Atsuko Miyaji, Yangguang Tian

    2024 Research paper (international conference proceedings)

  9. Proposal for Key-Value Commitments with Offline Batch Update

    Toshiyuki Mineta, Atsuko Miyaji, Hideaki Miyaji

    Proceedings - 2024 19th Asia Joint Conference on Information Security, AsiaJCIS 2024 p. 129-136 2024 Research paper (international conference proceedings)

  10. Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain.

    Hui Cui 0001, Zhiguo Wan, Tianyu Zhaolu, Huaqun Wang, Atsuko Miyaji

    IEEE Trans. Cloud Comput. Vol. 12 No. 1 p. 130-144 2024 Research paper (scientific journal)

  11. PRSafe: A Domain Specific Language Created with LLVM.

    Sai Veerya Mahadevan, Yuuki Takano, Atsuko Miyaji

    J. Inf. Process. Vol. 32 p. 207-222 2024 Research paper (scientific journal)

  12. Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher.

    Nasratullah Ghafoori, Atsuko Miyaji

    IEEE Access Vol. 12 p. 13386-13399 2024 Research paper (scientific journal)

  13. Lattice-based Commitment Scheme for Low Communication Costs

    Hideaki Miyaji, Yuntao Wang, Atsuko Miyaji

    IEEE Access p. 1-1 2024 Research paper (scientific journal)

    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
  14. Revocable Policy-Based Chameleon Hash for Blockchain Rewriting.

    Yangguang Tian, Atsuko Miyaji, Koki Matsubara, Hui Cui 0001, Nan Li

    The Computer Journal Vol. 66 No. 10 p. 2365-2378 2023/10 Research paper (scientific journal)

  15. On the Weakness of Non-Dual Ring-LWE Mod Prime Ideal q by Trace Map.

    Tomoka Takahashi, Shinya Okumura, Atsuko Miyaji

    IEICE Transactions on Information & Systems Vol. 106 No. 9 p. 1423-1434 2023/09 Research paper (scientific journal)

  16. PNB Based Differential Cryptanalysis of Salsa20 and ChaCha.

    Nasratullah Ghafoori, Atsuko Miyaji, Ryoma Ito 0001, Shotaro Miyashita

    IEICE Transactions on Information & Systems Vol. 106 No. 9 p. 1407-1422 2023/09 Research paper (scientific journal)

  17. Compact and Efficient Constant-Time GCD and Modular Inversion with Short-Iteration.

    Yaoan Jin, Atsuko Miyaji

    IEICE Transactions on Information & Systems Vol. 106 No. 9 p. 1397-1406 2023/09 Research paper (scientific journal)

  18. On the Weakness of Non-Dual Ring-LWE Mod Prime Ideal q by Trace Map

    Tomoka TAKAHASHI, Shinya OKUMURA, Atsuko MIYAJI

    IEICE Transactions on Information and Systems Vol. E106.D No. 9 p. 1423-1434 2023/09/01 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
  19. PNB Based Differential Cryptanalysis of Salsa20 and ChaCha

    Nasratullah GHAFOORI, Atsuko MIYAJI, Ryoma ITO, Shotaro MIYASHITA

    IEICE Transactions on Information and Systems Vol. E106.D No. 9 p. 1407-1422 2023/09/01 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communications Engineers ({IEICE})
  20. Authenticated Tree-Based R-LWE Group Key Exchange.

    Hector B. Hougaard, Atsuko Miyaji

    The Computer Journal Vol. 66 No. 2 p. 360-372 2023/02 Research paper (scientific journal)

  21. Preface

    Li, S., Manulis, M., Miyaji, A.

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 13983 LNCS 2023 Research paper (scientific journal)

    Publisher: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
  22. Re-visited Privacy-Preserving Machine Learning.

    Atsuko Miyaji, Tatsuhiro Yamatsuki, Bingchang He, Shintaro Yamashita, Tomoaki Mimoto

    PST p. 1-10 2023 Research paper (international conference proceedings)

  23. Constant-Size Group Signatures with Message-Dependent Opening from Lattices.

    Simin Chen, Jiageng Chen, Atsuko Miyaji, Kaiming Chen

    ProvSec p. 166-185 2023 Research paper (international conference proceedings)

  24. Balanced Privacy Budget Allocation for Privacy-Preserving Machine Learning.

    Bingchang He, Atsuko Miyaji

    ISC p. 42-56 2023 Research paper (international conference proceedings)

  25. Isogeny-Based Multi-signature Scheme.

    Mathieu de Goyon, Atsuko Miyaji

    ISPEC p. 477-491 2023 Research paper (international conference proceedings)

  26. A Practical Forward-Secure DualRing.

    Nan Li 0007, Yingjiu Li, Atsuko Miyaji, Yangguang Tian, Tsz Hon Yuen

    CANS p. 516-537 2023 Research paper (international conference proceedings)

  27. Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties.

    Hideaki Miyaji, Atsuko Miyaji

    CANS p. 497-515 2023 Research paper (international conference proceedings)

  28. Lattice-Based Accumulator with Constant Time List Update and Constant Time Verification.

    Yuta Maeno, Hideaki Miyaji, Atsuko Miyaji

    Codes, Cryptology and Information Security - 4th International Conference(C2SI) p. 204-222 2023 Research paper (international conference proceedings)

    Publisher: Springer
  29. Privacy-Preserving Frequency Estimation Method.

    Naoki Kawahara, Atsuko Miyaji, Tomoaki Mimoto

    AsiaJCIS p. 102-108 2023 Research paper (international conference proceedings)

  30. Revisited linear approximation formula of ChaCha.

    Atsuki Nagai, Atsuko Miyaji

    AsiaJCIS p. 95-101 2023 Research paper (international conference proceedings)

  31. Identification of Static and Dynamic Security Controls Using Machine Learning.

    Florencio Javier González-Rodriguez, Eleazar Aguirre Anaya, Moisés Salinas-Rosales, Atsuko Miyaji

    Computación y Sistemas Vol. 27 No. 2 2023 Research paper (scientific journal)

  32. Blockchain Based M+1st-Price Auction With Exponential Bid Upper Bound.

    Po-Chu Hsu, Atsuko Miyaji

    IEEE Access Vol. 11 p. 91184-91195 2023 Research paper (scientific journal)

  33. Privacy-Preserving Social Media With Unlinkability and Disclosure.

    Hideaki Miyaji, Po-Chu Hsu, Atsuko Miyaji

    IEEE Access Vol. 11 p. 28955-28965 2023 Research paper (scientific journal)

  34. Privacy-Preserving Distributed Medical Data Integration Security System for Accuracy Assessment of Cancer Screening: Development Study of Novel Data Integration System (Preprint)

    Atsuko Miyaji, Kaname Watanabe, Yuuki Takano, Kazuhisa Nakasho, Sho Nakamura, Yuntao Wang, Hiroto Narimatsu

    2022/05/17

    Publisher: JMIR Publications Inc.
  35. Lattice-Based Accumulator with Efficient Updating

    Yuta Maeno, Atsuko Miyaji, Hideaki Miyaji

    Proceedings - 2022 17th Asia Joint Conference on Information Security, AsiaJCIS 2022 p. 33-40 2022 Research paper (international conference proceedings)

  36. Privacy-Preserving Data Analysis without Trusted Third Party.

    Atsuko Miyaji, Tomoka Takahashi, Ping-Lun Wang, Tatsuhiro Yamatsuki, Tomoaki Mimoto

    IEEE International Conference on Trust, Security and Privacy in Computing and Communications(TrustCom) p. 710-717 2022 Research paper (international conference proceedings)

    Publisher: IEEE
  37. PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher

    Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji

    Information Security and Privacy p. 46-66 2022 Part of collection (book)

    Publisher: Springer International Publishing
  38. A Commitment Scheme with Output Locality-3 Fit for the IoT Device

    Hideaki Miyaji, Yuntao Wang, Akinori Kawachi, Atsuko Miyaji

    Security and Communication Networks Vol. 2021 p. 1-10 2021/11/29 Research paper (scientific journal)

    Publisher: Hindawi Limited
  39. A Practical Parallel Computation in a Scalable Multiparty Private Set Intersection

    Seitaro Mishima, Kazuhisa Nakasho, Yuuki Takano, Atsuko Miyaji

    The Ninth International Symposium on Computing and Networking (CANDAR2021) p. 332-338 2021/11 Research paper (international conference proceedings)

  40. A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT

    Mohammad Mamun, Atsuko Miyaji, Rongxing Luv, Chunhua Su

    Peer-to-Peer Networking and Applications Vol. 14 No. 2 p. 708-721 2021/03/01 Research paper (scientific journal)

    Publisher: Springer
  41. PRSafe: Primitive recursive function based domain specific language using LLVM

    Sai Veerya Mahadevan, Yuuki Takano, Atsuko Miyaji

    2021 International Conference on Electronics, Information, and Communication, ICEIC 2021 2021/01/31 Research paper (international conference proceedings)

    Publisher: Institute of Electrical and Electronics Engineers Inc.
  42. Efficient algorithm to compute odd-degree isogenies between Montgomery curves for CSIDH

    Kenta Kodera, Chen-Mou Cheng, Atsuko Miyaji

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104A No. 9 p. 1245-1254 2021 Research paper (scientific journal)

    Publisher: Institute of Electronics Information Communication Engineers
  43. Privacy Risk of Document Data and a Countermeasure Framework.

    Tomoaki Mimoto, Masayuki Hashimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji

    Journal of Information Processing Vol. 29 p. 778-786 2021 Research paper (scientific journal)

  44. Message-Restriction-Free Commitment Scheme Based on Lattice Assumption

    Hideaki Miyaji, Yuntao Wang, Atsuko Miyaji

    Information Security Practice and Experience p. 90-105 2021 Part of collection (book)

    Publisher: Springer International Publishing
  45. New Iterated RC4 Key Correlations and Their Application to Plaintext Recovery on WPA-TKIP

    Ryoma Ito, Atsuko Miyaji

    IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences. Vol.E104-A, No.1 Vol. E104.A No. 1 p. 190-202 2021 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
  46. A practical privacy-preserving algorithm for document data

    Tomoaki Mimoto, Shinsaku Kiyomoto, Koji Kitamura, Atsuko Miyaji

    Proceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 p. 1376-1383 2020/12/01 Research paper (international conference proceedings)

    Publisher: Institute of Electrical and Electronics Engineers Inc.
  47. Homomorphic commitment scheme with constant output locality

    Hideaki Miyaji, Atsuko Miyaji, Yuntao Wang

    2020 Eighth International Symposium on Computing and Networking (CANDAR) p. 167-173 2020/11 Research paper (international conference proceedings)

    Publisher: IEEE
  48. Development and Application of Privacy-preserving Distributed Medical Data Integration System

    Seitaro Mishima, Kazuhisa Nakasho, Kousuke Takeuchi, Naohiro Hayaishi, Yuuki Takano, Atsuko Miyaji

    2020 IEEE International Conference on Consumer Electronics - Taiwan, ICCE-Taiwan 2020 2020/09/28 Research paper (international conference proceedings)

    Publisher: Institute of Electrical and Electronics Engineers Inc.
  49. Efficient algorithm for computing odd-degree isogenies on montgomery curves

    Kenta Kodera, Chen-Mou Cheng, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 12583 p. 258-275 2020 Research paper (international conference proceedings)

    Publisher: Springer Science and Business Media Deutschland GmbH
  50. Secure and Compact Elliptic Curve LR Scalar Multiplication

    Yaoan Jin, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 12248 p. 605-618 2020 Research paper (international conference proceedings)

    Publisher: Springer
  51. Secure Data Management Technology.

    Tomoaki Mimoto, Shinsaku Kiyomoto, Atsuko Miyaji

    Security Infrastructure Technology for Integrated Utilization of Big Data p. 65-105 2020

    Publisher: Springer
  52. Cryptography Core Technology.

    Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji, Shinya Okumura

    Security Infrastructure Technology for Integrated Utilization of Big Data p. 5-33 2020

    Publisher: Springer
  53. Introduction.

    Atsuko Miyaji, Shinsaku Kiyomoto, Katsuya Tanaka, Yoshifumi Nishida, Koji Kitamura

    Security Infrastructure Technology for Integrated Utilization of Big Data p. 1-3 2020

    Publisher: Springer
  54. Security Infrastructure Technology for Integrated Utilization of Big Data - Applied to the Living Safety and Medical Fields

    Security Infrastructure Technology for Integrated Utilization of Big Data 2020

    Publisher: Springer
  55. Online-Efficient Interval Test via Secure Empty-Set Check", IEICE TRANSACTIONS on Information and Systems

    Katsunari Shishido, Atsuko Miyaji

    2020

  56. Compact Elliptic Curve Scalar Multiplication with a Secure Generality

    Yaoan Jin, Atsuko Miyaji

    IPSJ Journal 2020

  57. Anonymization Technique Based on SGD Matrix Factorization.

    Tomoaki Mimoto, Seira Hidano, Shinsaku Kiyomoto, Atsuko Miyaji

    IEICE Trans. Inf. Syst. Vol. 103-D No. 2 p. 299-308 2020 Research paper (scientific journal)

  58. New Pseudo-Random Number Generator for EPC Gen2.

    Hiroshi Nomaguchi, Chunhua Su, Atsuko Miyaji

    IEICE Trans. Inf. Syst. Vol. 103-D No. 2 p. 292-298 2020 Research paper (scientific journal)

  59. String commitment scheme with low output locality

    Hideaki Miyaji, Akinori Kawachi, Atsuko Miyaji

    Proceedings - 2019 14th Asia Joint Conference on Information Security, AsiaJCIS 2019 p. 32-39 2019/08/01 Research paper (international conference proceedings)

    Publisher: Institute of Electrical and Electronics Engineers Inc.
  60. Secure online-efficient interval test based on empty-set check

    Katsunari Shishido, Atsuko Miyaji

    Proceedings - 2019 14th Asia Joint Conference on Information Security, AsiaJCIS 2019 p. 56-63 2019/08/01 Research paper (international conference proceedings)

    Publisher: Institute of Electrical and Electronics Engineers Inc.
  61. Beyond Visual Line of Sight UAV Control for Remote Monitoring Using Directional Antennas.

    Songwei Li, Yixin Gu, Bishrut Subedi, Chenyuan He, Yan Wan, Atsuko Miyaji, Teruo Higashino

    2019 IEEE Globecom Workshops p. 1-6 2019 Research paper (international conference proceedings)

    Publisher: IEEE
  62. Differences among Summation Polynomials over Various Forms of Elliptic Curves.

    Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 102-A No. 9 p. 1061-1071 2019 Research paper (scientific journal)

  63. An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks.

    Akifumi Muroi, Shinya Okumura, Atsuko Miyaji

    Selected Areas in Cryptography - SAC 2019 - 26th International Conference(SAC) p. 421-436 2019 Research paper (international conference proceedings)

    Publisher: Springer
  64. Secure and Compact Elliptic Curve Cryptosystems.

    Yaoan Jin, Atsuko Miyaji

    Information Security and Privacy - 24th Australasian Conference(ACISP) p. 639-650 2019 Research paper (international conference proceedings)

    Publisher: Springer
  65. OTP-IoT: An ownership transfer protocol for the Internet of Things

    Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali Ghorbani

    Journal of Information Security and Applications Vol. 43 p. 73-82 2018/12 Research paper (scientific journal)

  66. Efficient and quasi-Accurate Private Multiset Unions

    Katsunari Shishido, Atsuko Miyaji

    WORKSHOP on Big Data and Iot Security (BITS) 2018/06 Research paper (international conference proceedings)

  67. A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes.

    Tung Chou, Yohei Maezawa, Atsuko Miyaji

    Information Security and Cryptology - ICISC 2018 - 21st International Conference(ICISC) p. 341-353 2018 Research paper (international conference proceedings)

    Publisher: Springer
  68. Development of a Secure Cross-Institutional Data Collection System Based on Distributed Standardized EMR Storage.

    Katsuya Tanaka, Ryuichi Yamamoto, Kazuhisa Nakasho, Atsuko Miyaji

    Studies in Health Technology and Informatics Vol. 255 No. 255 p. 35-39 2018 Research paper (international conference proceedings)

    Publisher: IOS Press
  69. OTP-IoT: An ownership transfer protocol for the Internet of Things.

    Mohammad Saiful Islam Mamun, Chunhua Su, Anjia Yang, Atsuko Miyaji, Ali Ghorbani

    J. Inf. Secur. Appl. Vol. 43 No. 43 p. 73-82 2018 Research paper (scientific journal)

  70. An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields.

    Shota Terada, Hideto Nakano, Shinya Okumura, Atsuko Miyaji

    International Symposium on Information Theory and Its Applications(ISITA) p. 306-310 2018 Research paper (international conference proceedings)

    Publisher: IEEE
  71. Revisited Diffusion Analysis of Salsa and ChaCha.

    Yusuke Matsuoka, Atsuko Miyaji

    International Symposium on Information Theory and Its Applications(ISITA) p. 452-456 2018 Research paper (international conference proceedings)

    Publisher: IEEE
  72. The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.

    Tomoaki Mimoto, Shinsaku Kiyomoto, Seira Hidano, Anirban Basu, Atsuko Miyaji

    16th Annual Conference on Privacy, Security and Trust(PST) p. 1-7 2018 Research paper (international conference proceedings)

    Publisher: IEEE Computer Society
  73. Efficient and Quasi-accurate Multiparty Private Set Union.

    Katsunari Shishido, Atsuko Miyaji

    2018 IEEE International Conference on Smart Computing (SMARTCOMP) p. 309-314 2018 Research paper (international conference proceedings)

    Publisher: IEEE Computer Society
  74. New Iterated RC4 Key Correlations.

    Ryoma Ito, Atsuko Miyaji

    Information Security and Privacy p. 154-171 2018 Research paper (international conference proceedings)

    Publisher: Springer International Publishing
  75. SupAUTH: A new approach to supply chain authentication for the IoT.

    Mohammad Saiful Islam Mamun, Ali A. Ghorbani, Atsuko Miyaji, Uyen Trang Nguyen

    Comput. Intell. Vol. 34 No. 2 p. 582-602 2018 Research paper (scientific journal)

  76. On the computational complexity of ECDLP for elliptic curves in various forms using index calculus

    Chen-Mou Cheng, Kenta Kodera, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10779 p. 245-263 2018 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  77. Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices

    Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin, Komwut Wipusitwarakun

    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY Vol. 12 No. 12 p. 3024-3038 2017/12 Research paper (scientific journal)

  78. Cloud computing security and privacy: Standards and regulations

    Yong Yu, Atsuko Miyaji, Man Ho Au, Willy Susilo

    COMPUTER STANDARDS & INTERFACES Vol. 54 No. 1 p. 1-2 2017/11 Research paper (scientific journal)

  79. (p, N)-identifiability: Anonymity under practical adversaries

    Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka, Atsuko Miyaji

    Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 p. 996-1003 2017/09/07 Research paper (international conference proceedings)

    Publisher: Institute of Electrical and Electronics Engineers Inc.
  80. Evaluation and improvement of pseudo-random number generator for EPC Gen2

    Hiroshi Nomaguchi, Atsuko Miyaji, Chunhua Su

    Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Trustcom/BigDataSE/ICESS 2017 p. 721-728 2017/09/07 Research paper (international conference proceedings)

  81. Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data

    Rashed Mazumder, Atsuko Miyaji, Chunhua Su

    International Journal of Foundations of Computer Science Vol. 28 No. 6 p. 661-682 2017/09/01 Research paper (international conference proceedings)

  82. A simple authentication encryption scheme

    Rashed Mazumder, Atsuko Miyaji, Chunhua Su

    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE Vol. 29 No. 16 2017/08 Research paper (scientific journal)

  83. Applied Cryptography and Network Security

    Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi

    2017/07 Research paper (international conference proceedings)

    Publisher:
  84. A Re-visited Construction of Nonce and Associated-data based Authenticated Encryption

    Rashed Mazumder, Atsuko Miyaji, Chunhua Su

    The 1st US-Japan Workshop Enabling Global Collaborations in Big Data Research p. 15-18 2017/06 Research paper (international conference proceedings)

  85. Robust ORAM: Enhancing availability, confidentiality and integrity

    Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Ayumu Kubota

    Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC p. 30-39 2017/05/05 Research paper (international conference proceedings)

    Publisher: IEEE Computer Society
  86. Variable message encryption through blockcipher compression function

    Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su

    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE Vol. 29 No. 7 2017/04 Research paper (scientific journal)

  87. Privacy-Preserving Integration of Medical Data: A Practical Multiparty Private Set Intersection

    Atsuko Miyaji, Kazuhisa Nakasho, Shohei Nishida

    Journal of Medical Systems Vol. 41 No. 3 2017/03/01 Research paper (scientific journal)

  88. Refined Construction of RC4 Key Setting in WPA

    Ryoma ITO, Atsuko MIYAJI

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E100.A No. 1 p. 138-148 2017 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
  89. A Simple Construction of Encryption for a Tiny Domain Message

    Rashed Mazumder, Atsuko Miyaji, Chunhua Su

    2017 51ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS (CISS) 2017 Research paper (international conference proceedings)

  90. Robust ORAM: Enhancing Availability, Confidentiality and Integrity

    Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Ayumu Kubota

    2017 IEEE 22ND PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING (PRDC 2017) p. 30-39 2017 Research paper (international conference proceedings)

  91. Refined Construction of RC4 Key Setting in WPA

    Ryoma Ito, Atsuko Miyaji

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E100A No. 1 p. 138-148 2017/01 Research paper (scientific journal)

  92. Privacy-Preserving Integration of Medical Data - A Practical Multiparty Private Set Intersection.

    Atsuko Miyaji, Kazuhisa Nakasho, Shohei Nishida

    J. Medical Systems Vol. 41 No. 3 p. 37-10 2017 Research paper (scientific journal)

  93. A New Scheme of (n,n) Blockcipher based Cryptographic Hash: Single Key Scheduling

    Jiageng Chen, Rashed Mazumder, Atsuko Miyaji

    Lecture Notes in Computer Science Vol. XXX(2015) 2016/12 Research paper (international conference proceedings)

    Publisher: Springer-Verlag
  94. Improved Differential Characteristic Searching Methods

    Jiageng Chen, Atsuko Miyaji, Chunhua Su, Je Sen Teh

    IEEE Vol. to appear 2016/12 Research paper (international conference proceedings)

    Publisher: IEEE
  95. Flexible and scalable implementation of elliptic-curve cryptography on FPGA

    B.-Y. Peng, Y.-C. Hsu, Y.-J. Chen, D.-C. Chueh, B.-Y. Yang, C.-M. Cheng, A. Miyaji

    2016/10 Research paper (international conference proceedings)

  96. A Matrix Based ORAM: Design, Implementation and Experimental Analysis

    Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS Vol. E99D No. 8 p. 2044-2055 2016/08 Research paper (scientific journal)

  97. Refined RC4 Key Correlations of Internal States in WPA

    Ryoma Ito, Atsuko Miyaji

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E99A No. 6 p. 1132-1144 2016/06 Research paper (scientific journal)

  98. A New Scheme of Blockcipher Hash

    Rashed Mazumder, Atsuko Miyaji

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS Vol. E99D No. 4 p. 796-804 2016/04 Research paper (scientific journal)

  99. A single key scheduling based compression function

    Jiageng Chen, Rashed Mazumder, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9572 p. 207-222 2016 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  100. Refined Glimpse Correlations of RC4

    Ryoma ITO, Atsuko MIYAJI

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E99.A No. 1 p. 3-13 2016 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
  101. Refined RC4 Key Correlations of Internal States in WPA

    Ryoma ITO, Atsuko MIYAJI

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E99.A No. 6 p. 1132-1144 2016 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
  102. A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256

    Jiageng Chien, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E99A No. 1 p. 14-21 2016/01 Research paper (scientific journal)

  103. Refined Glimpse Correlations of RC4

    Ryoma Ito, Atsuko Miyaji

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E99A No. 1 p. 3-13 2016/01 Research paper (scientific journal)

  104. Secure and Traceable Framework for Data Circulation

    Kaitai Liang, Atsuko Miyaji, Chunhua Su

    INFORMATION SECURITY AND PRIVACY, PT I Vol. 9722 p. 376-388 2016 Research paper (international conference proceedings)

  105. Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space

    Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, Komwut Wipusitwarakun

    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY Vol. 651 p. 130-141 2016 Research paper (international conference proceedings)

  106. Security and Experimental Performance Analysis of a Matrix ORAM

    Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin

    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC) 2016 Research paper (international conference proceedings)

  107. M-ORAM: A matrix ORAM with Log N bandwidth cost

    Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9503 p. 3-15 2016 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  108. Accurate Estimation of the Full Differential Distribution for General Feistel Structures

    Jiageng Chen, Atsuko Miyaji, Chunhua Su, Je Sen Teh

    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2015 Vol. 9589 p. 108-124 2016 Research paper (international conference proceedings)

  109. An Efficient Construction of a Compression Function for Cryptographic Hash

    Rashed Mazumder, Atsuko Miyaji, Chunhua Su

    AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, CD-ARES 2016, PAML 2016 Vol. 9817 p. 124-140 2016 Research paper (international conference proceedings)

  110. A Blockcipher Based Authentication Encryption

    Rashed Mazumder, Atsuko Miyaji, Chunhua Su

    AVAILABILITY, RELIABILITY, AND SECURITY IN INFORMATION SYSTEMS, CD-ARES 2016, PAML 2016 Vol. 9817 p. 106-123 2016 Research paper (international conference proceedings)

  111. Elliptic curve cryptography: Algorithms and implementation analysis over coordinate systems

    Iskandar Setiadi, Achmad Imam Kistijantoro, Atsuko Miyaji

    ICAICTA 2015 - 2015 International Conference on Advanced Informatics: Concepts, Theory and Applications 2015/11/20 Research paper (international conference proceedings)

    Publisher: Institute of Electrical and Electronics Engineers Inc.
  112. Self-healing wireless sensor networks

    Atsuko Miyaji, Kazumasa Omote

    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE Vol. 27 No. 10 p. 2547-2568 2015/07 Research paper (scientific journal)

  113. SKENO: Secret key encryption with non-interactive opening

    Jiageng Chen, Keita Emura, Atsuko Miyaji

    Journal of Mathematical Cryptology Vol. 9 No. 2 p. 63-74 2015/06/01 Research paper (scientific journal)

    Publisher: Walter de Gruyter GmbH
  114. Generic constructions of secure-channel free searchable encryption with adaptive security

    Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote

    SECURITY AND COMMUNICATION NETWORKS Vol. 8 No. 8 p. 1547-1560 2015/05 Research paper (scientific journal)

  115. A privacy-preserving efficient RFID authentication protocol from SLPN assumption

    Mohammad Saiful Islam Mamun, Atsuko Miyaji

    International Journal of Computational Science and Engineering Vol. 10 No. 3 p. 234-243 2015 Research paper (scientific journal)

    Publisher: Inderscience Enterprises Ltd.
  116. An efficient batch verification system and its effect in a real time VANET environment

    Jiageng Chen, Mohammad Saiful Islam Mamun, Atsuko Miyaji

    SECURITY AND COMMUNICATION NETWORKS Vol. 8 No. 2 p. 298-310 2015/01 Research paper (scientific journal)

  117. Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags

    Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su

    2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1 Vol. Volume1 p. 17-24 2015 Research paper (international conference proceedings)

  118. Analysis of Path ORAM toward Practical Utilization

    Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin

    PROCEEDINGS 2015 18TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2015) p. 646-651 2015 Research paper (international conference proceedings)

  119. A new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling

    Atsuko Miyaji, Mazumder Rashed

    2015 IEEE 29th International Conference on Advanced Information Networking and Applications (IEEE AINA 2015) p. 564-570 2015 Research paper (international conference proceedings)

  120. A new statistical approach for integral attack

    Jiageng Chen, Atsuko Miyaji, Chunhua Su, Liang Zhao

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9408 p. 345-356 2015 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  121. A scalable multiparty private set intersection

    Atsuko Miyaji, Shohei Nishida

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 9408 p. 376-385 2015 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  122. Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree

    Atsuko Miyaji, Xiaonan Shi, Satoru Tanaka

    ALGEBRAIC INFORMATICS (CAI 2015) Vol. 9270 p. 165-175 2015 Research paper (international conference proceedings)

  123. New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA

    Ryoma Ito, Atsuko Miyaji

    FAST SOFTWARE ENCRYPTION, FSE 2015 Vol. 9054 p. 557-576 2015 Research paper (international conference proceedings)

  124. How TKIP Induces Biases of Internal States of Generic RC4

    Ryoma Ito, Atsuko Miyaji

    INFORMATION SECURITY AND PRIVACY (ACISP 2015) Vol. 9144 p. 329-342 2015 Research paper (international conference proceedings)

  125. New Integrated Long-Term Glimpse of RC4

    Ryoma Ito, Atsuko Miyaji

    INFORMATION SECURITY APPLICATIONS, WISA 2014 Vol. 8909 p. 137-149 2015 Research paper (international conference proceedings)

  126. A New (n, n) Blockcipher Hash Function Using Feistel Network: Apposite for RFID Security

    Atsuko Miyaji, Mazumder Rashed

    COMPUTATIONAL INTELLIGENCE IN DATA MINING, VOL 3 Vol. 33 p. 519-528 2015 Research paper (international conference proceedings)

  127. POND: A novel protocol for network coding based on hybrid cryptographic scheme

    Chengqiang Huang, Atsuko Miyaji, Longhai Li, Shangmei Xu

    Proceedings - 2014 IEEE International Conference on Computer and Information Technology, CIT 2014 p. 373-380 2014/12/12 Research paper (international conference proceedings)

    Publisher: Institute of Electrical and Electronics Engineers Inc.
  128. Distributed pseudo-random number generation and its application to cloud database

    Jiageng Chen, Atsuko Miyaji, Chunhua Su

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 8434 p. 373-387 2014 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  129. Secure VANET Applications with a refined Group Signature

    Mohammad Saiful Islam Mamun, Atsuko Miyaji

    2014 TWELFTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST) p. 199-206 2014 Research paper (international conference proceedings)

  130. RFID Path Authentication, Revisited

    Mohammad Saiful Islam Mamun, Atsuko Miyaji

    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) p. 245-252 2014 Research paper (international conference proceedings)

  131. A Scalable and Secure RFID Ownership Transfer Protocol

    Mohammad Saiful Islam Mamun, Atsuko Miyaji

    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) p. 343-350 2014 Research paper (international conference proceedings)

  132. A Provable Secure Batch Authentication Scheme for EPCGen2 Tags

    Jiageng Chen, Atsuko Miyaji, Chunhua Su

    PROVABLE SECURITY, PROVSEC 2014 Vol. 8782 p. 103-116 2014 Research paper (international conference proceedings)

  133. Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock

    Jiageng Chen, Yuichi Futa, Atsuko Miyaji, Chunhua Su

    NETWORK AND SYSTEM SECURITY Vol. 8792 p. 184-197 2014 Research paper (international conference proceedings)

  134. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    JOURNAL OF APPLIED MATHEMATICS 2014 Research paper (scientific journal)

  135. A multi-purpose Group Signature for Vehicular Network Security

    Mohammad Saiful Islam Mamun, Atsuko Miyaji, Hiroaki Takada

    2014 17TH INTERNATIONAL CONFERENCE ON NETWORK-BASED INFORMATION SYSTEMS (NBIS 2014) p. 509-514 2014 Research paper (international conference proceedings)

  136. A collision attack on a double-block-length compression function instantiated with round-reduced AES-256

    Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 8949 p. 271-285 2014 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  137. A new (n, n) Blockcipher based Hash Function for Short Messages

    Atsuko Miyaji, Mazumder Rashed, Tsuyoshi Sawada

    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS) p. 56-63 2014 Research paper (international conference proceedings)

  138. Novel strategies for searching RC4 key collisions

    Jiageng Chen, Atsuko Miyaji

    Computers and Mathematics with Applications Vol. 66 No. 1 p. 81-90 2013/08 Research paper (scientific journal)

  139. Differential cryptanalysis and boomerang cryptanalysis of LBlock

    Jiageng Chen, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 8128 p. 1-15 2013 Research paper (international conference proceedings)

  140. Self-healing Schemes Suitable for Various WSNs

    Atsuko Miyaji, Kazumasa Omote

    INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2013 Vol. 8223 p. 92-105 2013 Research paper (international conference proceedings)

  141. A fully-secure RFID authentication protocol from exact LPN assumption

    Mohammad Saiful Islam Mamun, Atsuko Miyaji

    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) p. 102-109 2013 Research paper (international conference proceedings)

  142. Private Multiparty Set Intersection Protocol in Rational Model

    Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman

    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013) p. 431-438 2013 Research paper (international conference proceedings)

  143. How to Build Random Key Pre-distribution Schemes with Self-healing for Multiphase WSNs

    Atsuko Miyaji, Kazumasa Omote

    2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) p. 205-212 2013 Research paper (international conference proceedings)

  144. Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack

    Jiageng Chen, Atsuko Miyaji

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E95A No. 12 p. 2148-2159 2012/12 Research paper (scientific journal)

  145. Dynamic attribute-based signcryption without random oracles

    Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman

    International Journal of Applied Cryptography Vol. 2 No. 3 p. 199-211 2012/02 Research paper (scientific journal)

  146. Privacy-preserving two-party rational set intersection protocol

    Atsuko Miyaji, Mohammad Shahriar Rahman

    Informatica (Slovenia) Vol. 36 No. 3 p. 277-286 2012 Research paper (scientific journal)

  147. A Novel Hybrid IP Traceback Scheme with Packet Counters

    Tomoyuki Karasawa, Soshi Masakazu, Miyaji Atsuko

    Lecture Notes in Computer Science Vol. 7646 p. 71-84 2012

    Publisher: Springer
  148. How to enhance the security on the least significant bit

    Atsuko Miyaji, Yiren Mo

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7712 p. 263-279 2012 Research paper (international conference proceedings)

  149. A secure and private RFID authentication protocol under SLPN problem

    Mohammad S. I. Mamun, Atsuko Miyaji, Mohammad S. Rahman

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7645 p. 476-489 2012 Research paper (international conference proceedings)

  150. Constant-ciphertext-size dual policy attribute based encryption

    Atsuko Miyaji, Phuong V. X. Tran

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7672 p. 400-413 2012 Research paper (international conference proceedings)

  151. A revocable group signature scheme with the property of hiding the number of revoked users

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7259 p. 186-203 2012 Research paper (international conference proceedings)

  152. An intrusion and random-number-leakage resilient scheme in mobile unattended WSNs

    Tatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote

    Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012 p. 552-557 2012 Research paper (international conference proceedings)

  153. Privacy-preserving set operations in the presence of rational parties

    Atsuko Miyaji, Mohammad Shahriar Rahman

    Proceedings - 26th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012 p. 869-874 2012 Research paper (international conference proceedings)

  154. Lightweight integrity for XOR network coding in Wireless Sensor Networks

    Kazuya Izawa, Atsuko Miyaji, Kazumasa Omote

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7232 p. 245-258 2012 Research paper (international conference proceedings)

  155. An Optimized Signature Verification System for Vehicle Ad hoc NETwork

    Mohammad Saiful Islam Mamun, Atsuko Miyaji

    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM) 2012 Research paper (international conference proceedings)

  156. Generalized Analysis on Key Collisions of Stream Cipher RC4

    Jiageng Chen, Atsuko Miyaji

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E94A No. 11 p. 2194-2206 2011/11 Research paper (scientific journal)

  157. Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes

    Atsuko Miyaji, Kazumasa Omote

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS Vol. E94D No. 10 p. 1955-1965 2011/10 Research paper (scientific journal)

  158. A Timed-Release Proxy Re-Encryption Scheme

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E94A No. 8 p. 1682-1695 2011/08 Research paper (scientific journal)

  159. Efficient and low-cost RFID authentication schemes

    Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi

    Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications Vol. 2 No. 3 p. 4-25 2011 Research paper (scientific journal)

    Publisher: Innovative Information Science and Technology Research Group
  160. Scalar multiplication on Weierstraß elliptic curves from Co-Z arithmetic

    Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, Alexandre Venelli

    Journal of Cryptographic Engineering Vol. 1 No. 2 p. 161-176 2011 Research paper (scientific journal)

  161. Unconditionally secure oblivious transfer based on channel delays

    Kai-Yuen Cheong, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7043 p. 112-120 2011 Research paper (international conference proceedings)

  162. T-robust scalable group key exchange protocol with O(log n) complexity

    Tetsuya Hatano, Atsuko Miyaji, Takashi Sato

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 6812 p. 189-207 2011 Research paper (international conference proceedings)

  163. New concrete relation between trace, definition field, and embedding degree

    Shoujiro Hirasawa, Atsuko Miyaji

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E94-A No. 6 p. 1368-1374 2011 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
  164. An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    PUBLIC KEY INFRASTRUCTURES, SERVICES AND APPLICATIONS Vol. 6711 p. 77-+ 2011 Research paper (international conference proceedings)

  165. Sequential Bitwise Sanitizable Signature Schemes

    Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E94A No. 1 p. 392-404 2011/01 Research paper (scientific journal)

  166. Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    INFORMATION SECURITY Vol. 7001 p. 102-+ 2011 Research paper (international conference proceedings)

  167. A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model

    Jiageng Chen, Atsuko Miyaji

    INFORMATION SECURITY AND CRYPTOLOGY Vol. 6584 p. 62-76 2011 Research paper (international conference proceedings)

  168. Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments

    Yvo Desmedt, Atsuko Miyaji

    INFORMATION SECURITY AND CRYPTOLOGY Vol. 6584 p. 236-+ 2011 Research paper (international conference proceedings)

  169. Hidden Credential Retrieval without Random Oracles

    Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi

    INFORMATION SECURITY APPLICATIONS Vol. 6513 p. 160-+ 2011 Research paper (international conference proceedings)

  170. Privacy-Preserving Data Mining: A Game-Theoretic Approach

    Atsuko Miyaji, Mohammad Shahriar Rahman

    DATA AND APPLICATIONS SECURITY AND PRIVACY XXV Vol. 6818 p. 186-200 2011 Research paper (international conference proceedings)

  171. How to Find Short RC4 Colliding Key Pairs

    Jiageng Chen, Atsuko Miyaji

    INFORMATION SECURITY Vol. 7001 p. 32-46 2011 Research paper (international conference proceedings)

  172. POLISH: Proactive Co-operative Link Self-Healing for Wireless Sensor Networks

    Tatsuro Iida, Atsuko Miyaji, Kazumasa Omote

    STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS Vol. 6976 p. 253-267 2011 Research paper (international conference proceedings)

  173. Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks

    Atsuko Miyaji, Kazumasa Omote

    INFORMATION SECURITY APPLICATIONS Vol. 6513 p. 135-149 2011 Research paper (international conference proceedings)

  174. 匿名IDベース暗号を用いたセキュアチャネルフリー検索可能公開鍵暗号方式の一般的構成法

    江村恵太, 宮地充子, 面和成

    暗号と情報セキュリティシンポジウム (SCIS) 2011/01 Research paper (conference, symposium, etc.)

  175. Ideal secret sharing schemes with share selectability

    Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7043 p. 143-157 2011 Research paper (international conference proceedings)

    Publisher: Springer
  176. Non-interactive opening for ciphertexts encrypted by shared keys

    Jiageng Chen, Keita Emura, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7043 p. 57-68 2011 Research paper (international conference proceedings)

    Publisher: Springer
  177. Toward dynamic attribute-based signcryption (poster)

    Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 6812 p. 439-443 2011 Research paper (international conference proceedings)

    Publisher: Springer
  178. New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences

    MIYAJI Atsuko, SUKEGAWA Masahiro

    IEICE Trans. Fundamentals Vol. 93 No. 6 p. 1066-1077 2010/06/01

    Publisher: The Institute of Electronics, Information and Communication Engineers
  179. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length

    Keita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi

    International Journal of Applied Cryptography Vol. 2 No. 1 p. 46-59 2010 Research paper (scientific journal)

  180. APRAP: Another privacy preserving RFID authentication protocol

    Atsuko Miyaji, Mohammad Shahriar Rahman

    2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010 p. 13-18 2010 Research paper (international conference proceedings)

  181. Co-Z addition formulæ and binary ladders on elliptic curves

    Raveen R. Goundar, Marc Joye, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 6225 p. 65-79 2010 Research paper (international conference proceedings)

  182. RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks

    Hisashige Ito, Atsuko Miyaji, Kazumasa Omote

    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010 2010 Research paper (international conference proceedings)

  183. Privacy-Preserving Data Mining in Presence of Covert Adversaries

    Atsuko Miyaji, Mohammad Shahriar Rahman

    ADVANCED DATA MINING AND APPLICATIONS, ADMA 2010, PT I Vol. 6440 p. 429-440 2010 Research paper (international conference proceedings)

  184. A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance

    Jiageng Chen, Atsuko Miyaji

    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS Vol. 6047 p. 30-44 2010 Research paper (international conference proceedings)

  185. A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    PROVABLE SECURITY Vol. 6402 p. 200-+ 2010 Research paper (international conference proceedings)

  186. Generalized RC4 Key Collisions and Hash Collisions

    Jiageng Chen, Atsuko Miyaji

    SECURITY AND CRYPTOGRAPHY FOR NETWORKS Vol. 6280 p. 73-87 2010 Research paper (international conference proceedings)

  187. An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    PROVABLE SECURITY Vol. 6402 p. 184-+ 2010 Research paper (international conference proceedings)

  188. Efficient privacy-preserving data mining in malicious model

    Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 6440 No. 1 p. 370-382 2010 Research paper (international conference proceedings)

    Publisher: Springer
  189. A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    Journal of Information Processing Vol. 17 p. 216-231 2009 Research paper (scientific journal)

    Publisher: Information Processing Society of Japan
  190. Elliptic curves with a pre-determined embedding degree

    Shoujirou Hirasawa, Atsuko Miyaji

    IEEE International Symposium on Information Theory - Proceedings p. 2391-2395 2009 Research paper (international conference proceedings)

  191. New correlations of RC4 PRGA using nonzero-bit differences

    Atsuko Miyaji, Masahiro Sukegawa

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 5594 p. 134-152 2009 Research paper (international conference proceedings)

  192. A Secure RFID Authentication Protocol with Low Communication Cost

    Mohammad Shahriar Rahman, Masakazu Soshi, Atsuko Miyaji

    CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2 p. 559-+ 2009 Research paper (international conference proceedings)

  193. A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2 p. 769-773 2009 Research paper (international conference proceedings)

  194. A Selectable k-Times Relaxed Anonymous Authentication Scheme

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    INFORMATION SECURITY APPLICATIONS Vol. 5932 p. 281-295 2009 Research paper (international conference proceedings)

  195. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

    Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi

    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS Vol. 5451 p. 13-+ 2009 Research paper (international conference proceedings)

  196. A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

    Keita Emura, Atsuko Miyaji, Kazumasa Omote

    2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2 p. 487-492 2009 Research paper (international conference proceedings)

  197. Revisited (hyper)-elliptic curve scalar multiplication with a fixed point

    Atsuko Miyaji, Kenji Mizosoe

    Journal of Information Processing Vol. 16 p. 176-189 2008 Research paper (scientific journal)

    Publisher: Information Processing Society of Japan
  198. Generalized scalar multiplication secure against SPA, DPA, and RPA

    Atsuko Miyaji

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E91-A No. 10 p. 2833-2842 2008 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
  199. Security and access control for vehicular communications

    Saber Zrelli, Atsuko Miyaji, Yoichi Shinoda, Thierry Ernst

    Proceedings - 4th IEEE International Conference on Wireless and Mobile Computing, Networking and Communication, WiMob 2008 p. 561-566 2008 Research paper (international conference proceedings)

  200. Quantum Secret Sharing between Multiparty and Multiparty against the Attacks with Single Photons or EPR-pair

    Atsushi Waseda, Takayuki Takagi, Masakazu Soshi, Atsuko Miyaji

    2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3 p. 303-+ 2008 Research paper (international conference proceedings)

  201. Simple Certificateless Signature with Smart Cards

    Kazumasa Omote, Atsuko Miyaji, Kazuhiko Kato

    EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS p. 431-+ 2008 Research paper (international conference proceedings)

  202. Special section on cryptography and information security

    Masakatu Morii, Shiho Moriai, Goichiro Hanaoka, Toru Akishita, Tetsuya Izu, Tetsu Iwata, Koji Okada, Toshinobu Kaneko, Hiroaki Kikuchi, Kwangjo Kim, Shinsaku Kiyomoto, Noboru Kunthiro, Hiroki Koga, Kazukuni Kobara, Ryuichi Sakai, Kouichi Sakurai, Kazue Sako, Takashi Satoh, Akira Shiozaki, Hiroki Shizuya, Tsuyoshi Takagi, Mitsuru Tada, Keisuke Tanaka, Hiroshi Doi, Toru Nakanishi, Shoichi Hirose, Eiichiro Fujisaki, Soichi Furuya, Mitsuru Matsui, Natsume Matsuzaki, Tsutomu Matsumoto, Atsuko Miyaji, Maid Yoshida

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E90-A No. 1 2007 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
  203. Evaluation of the Security of RC6 against the x(2)-attack

    Atsuko Miyaji, Yuuki Takano

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E90A No. 1 p. 22-28 2007/01 Research paper (scientific journal)

  204. Mobile agent security with efficient oblivious transfer

    Watarn Hasegawa, Masakazu Soshi, Atsuko Miyaji

    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY p. 299-304 2007 Research paper (international conference proceedings)

  205. Generalized MMM-algorithm secure against SPA, DPA, and RPA

    Atsuko Miyaji

    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007 Vol. 4817 p. 282-296 2007 Research paper (international conference proceedings)

  206. Special section on discrete mathematics and its applications

    Keiko Imai, Hisashi Koga, Mitsuru Matsui, Tomomi Matsui, Atsuko Miyaji, Kunihiko Sadakane, Tetsuo Shibuya, Akiyoshi Shioura, Tsuyoshi Takagi, Yasuhiko Takenaga, Eiji Takimoto, Keisuke Tanaka, Tatsuie Tsukiji, Ryuhei Uehara, Takeaki Uno, Koichi Yamazaki, Satoshi Fujita

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E89-A No. 5 2006/01/01 Research paper (scientific journal)

  207. Java Obfuscation Approaches to Construct Tamper-Resistant Object-Oriented Programs

    Sakabe Yusuke, Soshi Masakazu, Miyaji Atsuko

    Information and Media Technologies Vol. 1 No. 1 p. 134-146 2006

    Publisher: Information and Media Technologies Editorial Board
  208. Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA

    Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E89-A No. 8 p. 2207-2215 2006 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
  209. n-State Quantum Coin Flipping Protocol.

    Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji

    International Symposium on Information Technology: Coding and Computing (ITCC 2005) p. 776-777 2005 Research paper (international conference proceedings)

    Publisher: IEEE Computer Society
  210. On the Success Probability of chi2-attack on RC6.

    Atsuko Miyaji, Yuuki Takano

    Information Security and Privacy(ACISP) p. 61-74 2005 Research paper (international conference proceedings)

    Publisher: Springer
  211. Efficient countermeasures against RPA, DPA, and SPA

    Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 3156 p. 343-356 2004 Research paper (scientific journal)

    Publisher: Springer Verlag
  212. A fully-functional group signature scheme over only known-order group

    Atsuko Miyaji, Kozue Umeda

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 3089 p. 164-179 2004 Research paper (scientific journal)

    Publisher: Springer Verlag
  213. Success Probability in Chi2-Attacks.

    Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano

    Applied Cryptography and Network Security(ACNS) p. 310-325 2004 Research paper (international conference proceedings)

    Publisher: Springer
  214. Optimized χ2-attack against RC6

    Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2846 p. 16-32 2003 Research paper (scientific journal)

    Publisher: Springer Verlag
  215. Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents

    Sakabe Yusuke, Soshi Masakazu, Miyaji Atsuko

    Lecture Notes in Computer Science Vol. 2828 p. 89-103 2003

    Publisher: Springer
  216. A Second-price Sealed-bid Auction with the Discriminant of the p_<0>-th Root

    Omote Kazumasa, Miyaji Atsuko

    Lecture Notes in Computer Science Vol. 2357 p. 57-71 2003

    Publisher: Springer
  217. Evaluation of anonymity of practical anonymous communication networks

    Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2727 p. 13-26 2003 Research paper (international conference proceedings)

  218. An improved fast signature scheme without online multiplication

    T Okamoto, M Tada, A Miyaji

    FINANCIAL CRYPTOGRAPHY Vol. 2357 p. 152-167 2003 Research paper (scientific journal)

  219. A multi-signature scheme with signers’ intentions secure against active attacks

    Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2288 p. 328-340 2002 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  220. A multi-signature scheme with signers' intentinos secure against active attacks

    Kawauchi Kei, Minato Hiroshi, Miyaji Atsuko, Tada Mitsuru

    Lecture Notes in Computer Science Vol. 2288 p. 175-196 2002

    Publisher: Springer
  221. New explicit conditions of elliptic curve traces for FR-reduction

    Atsuko Miyaji, Masaki Nakabayashi, Shunzou Takano

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E84-A No. 5 p. 1234-1243 2001 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
  222. An anonymous auction protocol with a single non-trusted center using binary trees

    Kazumasa Omote, Atsuko Miyaji

    INFORMATION SECURITY, PROCEEDINGS Vol. 1975 p. 108-120 2001 Research paper (scientific journal)

  223. Efficient "on the fly" signature schemes based on integer factoring

    Okamoto Takeshi, Tada Mitsuru, Miyaji Atsuko

    Lecture Notes in Computer Science Vol. 2247 p. 275-286 2001

    Publisher: Springer
  224. Characterization of elliptic curve traces under FR-reduction

    Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2015 p. 90-108 2001 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  225. A practical english auction with one-time registration

    Kazumasa Omote, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2119 p. 221-234 2001 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  226. Efficient and unconditionally secure verifiable threshold changeable scheme

    Ayako Maeda, Atsuko Miyaji, Mitsuru Tada

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 2119 p. 403-416 2001 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  227. An agent-based model of anonymous communication protocols

    K. Shigeki, M. Soshi, A. Miyaji

    Proceedings of the Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE Vol. 2001- p. 177-182 2001 Research paper (international conference proceedings)

    Publisher: IEEE Computer Society
  228. An anonymous auction protocol with a single non-trusted center using binary trees

    Omote Kazumasa, Miyaji Atsuko

    Lecture Notes in Computer Science Vol. 1975 p. 461-490 2000

    Publisher: Springer
  229. A multisignature scheme with message flexibility, order flexibility and order verifiability

    Shirow Mitomi, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 1841 p. 298-312 2000 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  230. A message recovery signature scheme equivalent to DSA over elliptic curves

    Miyaji Atsuko

    Lecture Notes in Computer Science Vol. 1163 p. 1-14 1996

    Publisher: Springer

Misc. 146

  1. Data Analysis Framework based on Local Differential Privacy

    p. 848-855 2022/10/17

  2. Secure Primitive for Big Data Utilization.

    Akinori Kawachi, Atsuko Miyaji, Kazuhisa Nakasho, Yiying Qi, Yuuki Takano

    Security Infrastructure Technology for Integrated Utilization of Big Data p. 35-63 2020

    Publisher: Springer
  3. ドキュメントにおけるプライバシとリスク評価ツールの試作—Privacy for Documents and Prototype of Risk Evaluation Tool

    三本 知明, 清本 晋作, 北村 光司, 宮地 充子

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 Vol. 119 No. 142 p. 113-118 2019/07

    Publisher: 東京 : 電子情報通信学会
  4. Anonymous Oblivious RAM for Multi-user Environment

    Vol. 116 No. 504 p. 121-128 2017/03/09

    Publisher: 電子情報通信学会
  5. Security evaluation of elliptic curve cryptosystems with special addition formula

    Vol. 116 No. 504 p. 73-78 2017/03/09

    Publisher: 電子情報通信学会
  6. Preface

    Dieter Gollmann, Atsuko Miyaji

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10355 2017 Other

    Publisher: Springer Verlag
  7. Forum : Explicit Relations between Mathematical Features and Security Parameter in ECDLP

    Vol. 26 No. 2 p. 85-89 2016/06

    Publisher: 日本応用数理学会 ; 1991-
  8. A New Key Correlation in the Stream Cipher RC4

    Vol. 115 No. 488 p. 111-116 2016/03/03

    Publisher: 電子情報通信学会
  9. A Scalable Multiparty Private Set Intersection

    Vol. 115 No. 215 p. 43-48 2015/09/04

    Publisher: 電子情報通信学会
  10. Experimental Analysis of Path ORAM in Practical Implementation (マルチメディア情報ハイディング・エンリッチメント)

    スモンカヨシン カリン, 宮地 充子, 蘇 春華

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 Vol. 115 No. 122 p. 73-79 2015/07/02

    Publisher: 電子情報通信学会
  11. Experimental Analysis of Path ORAM in Practical Implementation (情報通信システムセキュリティ)

    スモンカヨシン カリン, 宮地 充子, 蘇 春華

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 Vol. 115 No. 121 p. 73-79 2015/07/02

    Publisher: 電子情報通信学会
  12. New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA

    MICHIHIRO Daiki, MIYAJI Atsuko, ITO Ryoma

    IEICE technical report. Information and communication system security Vol. 114 No. 489 p. 133-138 2015/03/03

    Publisher: The Institute of Electronics, Information and Communication Engineers
  13. Scalar Multiplication Algorithm with Resistance for Side-channel Attacks

    KITO Keisuke, MIYAJI Atsuko, TAKAHASHI Ryota

    IEICE technical report. Information and communication system security Vol. 114 No. 489 p. 85-90 2015/03/03

    Publisher: The Institute of Electronics, Information and Communication Engineers
  14. A Study on the Safety of the Pseudo-Random Number Generator -Whirlwind- in the Virtual Environment

    Vol. 2014 No. 2 p. 434-441 2014/10/15

  15. How to Construct PRNGs for distributed Cloud Databases

    CHEN JIAGENG, MIYAJI ATSUKO, SU CHUNHUA

    Vol. 114 No. 118 p. 181-186 2014/07/03

    Publisher: The Institute of Electronics, Information and Communication Engineers
  16. How to Construct PRNGs for distributed Cloud Databases

    CHEN JIAGENG, MIYAJI ATSUKO, SU CHUNHUA

    Technical report of IEICE. ISEC Vol. 114 No. 115 p. 181-186 2014/07/03

    Publisher: The Institute of Electronics, Information and Communication Engineers
  17. How to Construct PRNGs for distributed Cloud Databases

    Jiageng Chen, Atsuko Miyaji, Chunhua Su

    IPSJ SIG Notes Vol. 2014 No. 27 p. 1-6 2014/06/26

    Publisher: Information Processing Society of Japan (IPSJ)
  18. Efficient Multi-Party Private Set Intersection Protocol

    MIMOTO Tomoaki, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 113 No. 326 p. 29-34 2013/11/28

    Publisher: The Institute of Electronics, Information and Communication Engineers
  19. A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256

    CHEN Jiageng, HIROSE Shoichi, KUWAKADO Hidenori, MIYAJI Atsuko

    IEICE technical report. Information and communication system security Vol. 113 No. 137 p. 59-66 2013/07/18

    Publisher: The Institute of Electronics, Information and Communication Engineers
  20. A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256

    Vol. 2013 No. 10 p. 1-8 2013/07/11

  21. A discussion about efficient double length hash function

    SAWADA Tsuyoshi, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 112 No. 461 p. 25-30 2013/03/07

    Publisher: The Institute of Electronics, Information and Communication Engineers
  22. A proposal of double length hash function using (n, n) Blockcipher

    Vol. 2012 No. 3 p. 617-623 2012/10/23

  23. Efficient Privacy Preserving Set Operations

    MIYAJI Atsuko, RAHMAN Mohammad

    IEICE technical report. Life intelligence and office information systems Vol. 111 No. 286 p. 115-122 2011/11/14

    Publisher: The Institute of Electronics, Information and Communication Engineers
  24. Optimized Right-to-Left Scalar Multiplication RIP Algorithms

    MIYAJI Atsuko, MO Yiren

    Vol. 111 No. 286 p. 109-113 2011/11/07

  25. Comparison of XOR Network Coding against Pollution Attacks

    Vol. 2011 No. 3 p. 498-503 2011/10/12

  26. Proactive co-Operative Link Self-Healing for WSNs

    Vol. 2010 No. 6 p. 1-8 2011/04

    Publisher: 情報処理学会
  27. Evaluation of an IP Traceback Scheme with Counters

    Vol. 2011 No. 7 p. 1-8 2011/03/03

    Publisher: 情報処理学会
  28. Consideration of Implementation of Data Aggregation on MicaZ for Wireless Sensor Networks

    Vol. 2011 No. 32 p. 1-6 2011/03/03

    Publisher: 情報処理学会
  29. Proposition of precomputation schemes considering memory

    SASAHARA Taiki, MIYAJI Atsuko

    IEICE technical report Vol. 110 No. 443 p. 159-166 2011/02/24

    Publisher: The Institute of Electronics, Information and Communication Engineers
  30. Performance Evaluations of Robust Group Key Exchange Protocols

    SATO Takashi, MIYAJI Atsuko

    IEICE technical report Vol. 110 No. 443 p. 167-175 2011/02/24

    Publisher: The Institute of Electronics, Information and Communication Engineers
  31. Improved State Recovery Algorithm of RC4 PRGA by Using Differences between Two Internal States

    KAKIWAKI Kazuho, MIYAJI Atsuko

    IEICE technical report Vol. 110 No. 443 p. 57-64 2011/02/24

    Publisher: The Institute of Electronics, Information and Communication Engineers
  32. Scalar Multiplication Method using efficient Tripling Formurae

    Taiki Sasahara, Atsuko Miyaji

    IPSJ SIG Notes Vol. 2010 No. 10 p. 1-7 2010/12/03

    Publisher: Information Processing Society of Japan (IPSJ)
  33. A Timed-Release Proxy Re-Encryption Scheme and its Applications

    EMURA Keita, MIYAJI Atsuko, OMOTE Kazumasa

    IEICE technical report Vol. 110 No. 266 p. 23-28 2010/11/05

    Publisher: The Institute of Electronics, Information and Communication Engineers
  34. An Anonymous Designated Verifier Signature Scheme with Revocation and its Applications

    EMURA Keita, MIYAJI Atsuko, OMOTE Kazumasa

    IEICE technical report Vol. 110 No. 266 p. 17-22 2010/11/05

    Publisher: The Institute of Electronics, Information and Communication Engineers
  35. Efficient Group Key Agreement Robust against Some Node Faults

    HATANO TETSUYA, MIYAJI ATSUKO

    Vol. 2010 No. 28 p. 1-8 2010/02/25

  36. State Recovery of RC4 PRGA by Using Difference Location and Output Difference

    AJIRO MITSUKI, MIYAJI ATSUKO

    Vol. 2010 No. 30 p. 1-8 2010/02/25

    Publisher: 情報処理学会
  37. An Efficient Random Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks (2)

    ITO Hisashige, MIYAJI Atsuko, OMOTE Kazumasa

    IEICE technical report Vol. 109 No. 446 p. 247-254 2010/02/25

    Publisher: The Institute of Electronics, Information and Communication Engineers
  38. State Recovery of RC4 PRGA by Using Nonzero Bit Differences

    AJIRO Mitsuki, MIYAJI Atsuko

    IEICE technical report Vol. 109 No. 271 p. 95-100 2009/11/05

    Publisher: The Institute of Electronics, Information and Communication Engineers
  39. Efficient Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks

    ITO Hisashige, MIYAJI Atsuko, OMOTE Kazumasa

    IEICE technical report Vol. 109 No. 271 p. 101-106 2009/11/05

    Publisher: The Institute of Electronics, Information and Communication Engineers
  40. On a Tree-Based Group Key Management

    Vol. 2009 No. 18 p. 1-7 2009/05/21

    Publisher: 情報処理学会
  41. A Pairing-based Group Key Exchange with an Edge-based Tree

    MIYAJI Atsuko, DESMEDT Yvo

    IEICE technical report Vol. 109 No. 42 p. 69-76 2009/05/15

    Publisher: The Institute of Electronics, Information and Communication Engineers
  42. Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (2)

    AJIRO Mitsuki, SUKEGAWA Masahiro, MIYAJI Atsuko

    IEICE technical report Vol. 108 No. 473 p. 239-244 2009/03/02

    Publisher: The Institute of Electronics, Information and Communication Engineers
  43. Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (1)

    SUKEGAWA Masahiro, MIYAJI Atsuko

    IEICE technical report Vol. 108 No. 473 p. 231-237 2009/03/02

    Publisher: The Institute of Electronics, Information and Communication Engineers
  44. Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point

    Atsuko Miyaji, Kenji Mizosoe

    IPSJ Trans Vol. 49 No. 9 p. 2975-2988 2008/09/15

    Publisher: 情報処理学会
  45. On the Standardization of Information Security -ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008-

    MIYAJI Atsuko, CHIKAZAWA Takeshi, TATSUTA Toshio, WATANABE Hajime, OHKUMA Kenji

    IPSJ SIG Notes Vol. 2008 No. 71 p. 27-35 2008/07/17

    Publisher: Information Processing Society of Japan (IPSJ)
  46. On the Standardization of Information Security : ISO/IEC JTC1/SC27/WG2 Report on the Kyoto Meeting in April, 2008

    MIYAJI Atsuko, CHIKAZAWA Takeshi, TATSUTA Toshio, WATANABE Hajime, OHKUMA Kenji

    IEICE technical report Vol. 108 No. 161 p. 27-35 2008/07/17

    Publisher: The Institute of Electronics, Information and Communication Engineers
  47. A Fully Secure Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for collection of Attribute Statistics

    EMURA Keita, MIYAJI Atsuko

    IEICE technical report Vol. 108 No. 38 p. 61-68 2008/05/16

    Publisher: The Institute of Electronics, Information and Communication Engineers
  48. An Efficient IP Traceback Scheme with Variable Packet Sampling Probabilities

    KARASAWA Tomoyuki, SOSHI Masakazu, MIYAJI Atsuko

    IPSJ SIG Notes Vol. 2008 No. 21 p. 67-72 2008/03/06

    Publisher: Information Processing Society of Japan (IPSJ)
  49. New Weakness in Alleged RC4 Keystream Generator (1)

    IMAYA Yuta, SUKEGAWA Masahiro, MIYAJI Atsuko

    IEICE technical report Vol. 107 No. 503 p. 89-94 2008/02/29

    Publisher: The Institute of Electronics, Information and Communication Engineers
  50. New Weakness in Alleged RC4 Keystream Generator (2)

    SUKEGAWA Masahiro, IMAYA Yuta, MIYAJI Atsuko

    IEICE technical report Vol. 107 No. 503 p. 95-100 2008/02/29

    Publisher: The Institute of Electronics, Information and Communication Engineers
  51. Generalized EBRIP

    MIYAJI Atsuko

    IEICE technical report Vol. 107 No. 397 p. 67-78 2007/12/12

    Publisher: The Institute of Electronics, Information and Communication Engineers
  52. AT-2-2 The recent tendency of research and standalization of elliptic curves suitable for bilinear-pairing application

    Miyaji Atsuko

    Proceedings of the Society Conference of IEICE Vol. 2007 p. "SS-17"-"SS-18" 2007/08/29

    Publisher: The Institute of Electronics, Information and Communication Engineers
  53. On the Standardization of Information Security -Report on the Russia Meeting in May, 2007-

    MIYAJI Atsuko, CHIKAZAWA Takeshi, TATSUTA Toshio, WATANABE Hajime, OHKUMA Kenji

    IPSJ SIG Notes Vol. 2007 No. 71 p. 159-169 2007/07/19

    Publisher: Information Processing Society of Japan (IPSJ)
  54. Consideration for Quantum Multi-secret Sharing

    WASEDA ATSUSHI, SOSHI MASAKAZU, MIYAJI ATSUKO

    IPSJ journal Vol. 48 No. 7 p. 2447-2464 2007/07/15

    Publisher: Information Processing Society of Japan (IPSJ)
  55. On the Standardization of Information Security : Report on the Russia Meeting in May, 2007

    MIYAJI Atsuko, CHIKAZAWA Takeshi, TATSUTA Toshio, WATANABE Hajime, OHKUMA Kenji

    IEICE technical report Vol. 107 No. 140 p. 159-170 2007/07/12

    Publisher: The Institute of Electronics, Information and Communication Engineers
  56. Consideration of quantum oblivious transfer

    WASEDA Atsushi, TAKAGI Takayuki, SOSHI Masakazu, MIYAJI Atsuko

    IEICE technical report Vol. 107 No. 44 p. 65-68 2007/05/11

    Publisher: The Institute of Electronics, Information and Communication Engineers
  57. Efficient ID-Based Signature without Random Oracle

    CHEN Jiageng, MIYAJI Astuko

    IEICE technical report Vol. 107 No. 44 p. 53-56 2007/05/11

    Publisher: The Institute of Electronics, Information and Communication Engineers
  58. On Quantum Secret Sharing between Multiparty and Multiparty without Quantum Memory

    TAKAGI Takayuiki, WASEDA Atsushi, SOSHI Masakazu, MIYAJI Atsuko

    IEICE technical report Vol. 106 No. 595 p. 185-190 2007/03/09

    Publisher: The Institute of Electronics, Information and Communication Engineers
  59. Share selectable secret sharing scheme on inefficiency concentrated for particular user

    EMURA Keita, NOMURA Akito, SOSHI Masakazu, MIYAJI Atsuko

    IEICE technical report Vol. 106 No. 595 p. 173-178 2007/03/09

    Publisher: The Institute of Electronics, Information and Communication Engineers
  60. Group Signature with Efficient Revocation

    NOMURA Nao, MIYAJI Atsuko, EMURA Keita

    IEICE technical report Vol. 106 No. 595 p. 179-184 2007/03/09

    Publisher: The Institute of Electronics, Information and Communication Engineers
  61. Efficient Elliptic Curve Scalar Multiplication with triple bases

    MIZOSOE Kenji, MIYAJI Atsuko, KAMEI Toshiaki

    IEICE technical report Vol. 106 No. 596 p. 81-86 2007/03/08

    Publisher: The Institute of Electronics, Information and Communication Engineers
  62. An Approach and evaluation of improved unforgeble packet marking scheme against DoS attacks

    TAKEMOTO Hideki, SOSHI Masakazu, MIYAJI Atsuko

    IPSJ SIG Notes Vol. 2007 No. 16 p. 103-110 2007/03/01

    Publisher: Information Processing Society of Japan (IPSJ)
  63. Consideration for Quantum Multi-secret Sharing

    早稲田篤志, 早稲田篤志, 双紙正和, 宮地充子

    情報処理学会論文誌 Vol. 48 No. 7 2007

  64. Application of Number Theory to Elliptic-Curve Generation

    MIYAJI Atsko

    IEICE technical report Vol. 106 No. 384 p. 1-6 2006/11/21

    Publisher: The Institute of Electronics, Information and Communication Engineers
  65. Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae

    Hideyo Mamiya, Atsuko Miyaji

    IPSJ journal Vol. 47 No. 8 p. 2430-2439 2006/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  66. On the Standardization of Information Security-Report on the Madrid Meeting in May, 2006-

    MIYAJI Atsuko, CHIKAZAWA Takeshi, TATSUTA Toshio, OTSUKA Akira, YASUDA Kan, MORI Kengo, SAISHO Toshiaki

    IPSJ SIG Notes Vol. 2006 No. 81 p. 273-282 2006/07/21

    Publisher: Information Processing Society of Japan (IPSJ)
  67. Reconsideration of the security of RC6 against asymmetric chi-square test attack

    WADA Takatomi, MIYAJI Atsuko, HINOUE Tomohiko

    IPSJ SIG Notes Vol. 2006 No. 81 p. 149-154 2006/07/20

    Publisher: Information Processing Society of Japan (IPSJ)
  68. Reconsideration of the security of RC6 against asymmetric chi-square test attack

    WADA Takatomi, MIYAJI Atsuko, HINOUE Tomohiko

    IEICE technical report Vol. 106 No. 174 p. 149-154 2006/07/13

    Publisher: The Institute of Electronics, Information and Communication Engineers
  69. ID-based Encryption Scheme with a Hierarchical Structure and Its Application

    MIYAJI Atsuko

    IEICE technical report Vol. 106 No. 51 p. 15-22 2006/05/12

    Publisher: The Institute of Electronics, Information and Communication Engineers
  70. An Approach to Hierarchical Identity-Based Signature

    JIKEYA Jun, MIYAJI Atsuko

    IEICE technical report Vol. 105 No. 662 p. 109-112 2006/03/17

    Publisher: The Institute of Electronics, Information and Communication Engineers
  71. Efficient DPA-and-SPA Secure Scalar Elliptic Curve Multiplication with Pre-computed Tables

    KIYOMIYA Takeshi, MIYAJI Atsuko, MIZOSOE Kenji

    IEICE technical report Vol. 105 No. 662 p. 123-128 2006/03/17

    Publisher: The Institute of Electronics, Information and Communication Engineers
  72. An Obfuscation Technique with Tampar-resistance against Dynamic Analysis

    HATTORI Taro, SOSHI Masakazu, MIYAJI Atsuko

    IPSJ SIG Notes Vol. 2006 No. 26 p. 239-244 2006/03/17

    Publisher: Information Processing Society of Japan (IPSJ)
  73. Group Signature Scheme with An Efficient Revocation

    TANAKA Daiji, MIYAJI Atsuko

    IPSJ SIG Notes Vol. 2006 No. 26 p. 171-176 2006/03/16

    Publisher: Information Processing Society of Japan (IPSJ)
  74. Improved address-bit DPA Countermeasure on BRIP

    MIYAJI Atsuko, KIYOMIYA Takeshi

    IEICE technical report Vol. 105 No. 484 p. 47-52 2005/12/09

    Publisher: The Institute of Electronics, Information and Communication Engineers
  75. Consideration for the quantum multi-secret sharing using MSP

    WASEDA Atsushi, SOSHI Masakazu, MIYAJI Atsuko

    IEICE technical report Vol. 105 No. 484 p. 53-60 2005/12/09

    Publisher: The Institute of Electronics, Information and Communication Engineers
  76. A privacy-enhanced group signature scheme based on a modified Nyberg-Rueppel signature

    UMEDA Kozue, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 105 No. 290 p. 79-86 2005/09/09

    Publisher: The Institute of Electronics, Information and Communication Engineers
  77. Java Obfuscation??Approaches to Construct Tamper-Resistant Object-Oriented Programs

    Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji

    IPSJ journal Vol. 46 No. 8 p. 2107-2119 2005/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  78. Quantum Coin Flipping Protocol Using n-dimensional Quantum States

    WASEDA ATSUSHI, SOSHI MASAKAZU, MIYAJI ATSUKO

    IPSJ journal Vol. 46 No. 8 p. 1903-1911 2005/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  79. Efficient Group Signature Scheme Based on a Modified Nyberg-Rueppel Signature

    Atsuko Miyaji, Kozue Umeda

    IPSJ journal Vol. 46 No. 8 p. 1889-1902 2005/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  80. On the Standardization of Information Security : Report on the Vienna Meeting in April, 2005

    MIYAJI Atsuko, CHIKAZAWA Takeshi, TATSUTA Toshio, OTSUKA Akira, YASUDA Kan

    IPSJ SIG Notes Vol. 2005 No. 70 p. 155-164 2005/07/21

    Publisher: Information Processing Society of Japan (IPSJ)
  81. On Public-key Broadcast Encryption

    MIYAJI ATSUKO

    IPSJ SIG Notes Vol. 2005 No. 41 p. 31-38 2005/05/19

    Publisher: Information Processing Society of Japan (IPSJ)
  82. Application of bilinear map to public-key encryption (Algebraic Aspects of Coding Theory and Cryptography)

    Vol. 1420 p. 117-127 2005/04

    Publisher: 京都大学数理解析研究所
  83. Consideration for mobile agent security

    MORI Masayuki, SOHSI Masakazu, MIYAJI Atsuko

    IPSJ SIG Notes Vol. 2005 No. 33 p. 123-128 2005/03/22

    Publisher: Information Processing Society of Japan (IPSJ)
  84. Consideration for Quantum Secret Sharing

    SASAKI Ken, WASEDA Atsushi, SOSHI Masakazu, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 104 No. 732 p. 7-11 2005/03/18

    Publisher: The Institute of Electronics, Information and Communication Engineers
  85. Quantum Coin Flipping Protocol Using n-dimensional Quantum States

    早稲田篤志, 双紙正和, 宮地充子

    情報処理学会論文誌 Vol. 46 No. 8 2005

  86. On the Standardization of Information Security-Report on the Vienna Meeting in April, 2005-

    宮地充子, 近沢武, 竜田敏男, 大塚玲, 大塚玲, 安田幹

    電子情報通信学会技術研究報告 Vol. 105 No. 192(SITE2005 7-40) 2005

  87. Toward Modeling of a Pushback Mechanism

    TERADA TAKEAKI, SOSHI MASAKAZU, MIYAJI ATSUKO

    IPSJ journal Vol. 45 No. 8 p. 1948-1953 2004/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  88. On Anonymity Metrics for Practical Anonymous Communication Protocols

    Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji

    IPSJ journal Vol. 45 No. 8 p. 1887-1897 2004/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  89. Elliptic Curve Cryptosystems secure against ZPA

    MORIMOTO Hiroaki, MAMIYA Hideyo, MIYAJI Atsuko

    Technical report of IEICE Vol. 103 No. 712 p. 43-48 2004/03/08

    Publisher: The Institute of Electronics, Information and Communication Engineers
  90. A proposal of quantum coin tossing using n-states

    早稲田篤志, 双紙正和, 宮地充子

    電子情報通信学会技術研究報告 Vol. 104 No. 53(ISEC2004 1-12) 2004

  91. Efficient exponentiation on Hyperelliptic Curves with Genus two

    MORIMOTO Hiroaki, MIYAJI Atsuko

    Vol. 103 No. 419 p. 7-13 2003/11/07

  92. Model of Pushback Protocols and the Evaluation

    TERADA Takeaki, SOSHI Masakazu, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 103 No. 416 p. 29-32 2003/11/06

    Publisher: The Institute of Electronics, Information and Communication Engineers
  93. Anonymous Multiple Credential System

    TAMURA Yuko, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 103 No. 416 p. 23-28 2003/11/06

    Publisher: The Institute of Electronics, Information and Communication Engineers
  94. Intrusion-Resilient Public-Key Encryption

    DODIS Yevgeniy, FRANKLIN Matt, KATZ Jonathan, MIYAJI Atsuko, YUNG Moti

    Technical report of IEICE. ISEC Vol. 103 No. 416 p. 41-48 2003/11/06

    Publisher: The Institute of Electronics, Information and Communication Engineers
  95. A proposal of a signature system based on the knapsack problem

    WASEDA Atsushi, SOSHI Masakazu, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 103 No. 315 p. 49-51 2003/09/19

    Publisher: The Institute of Electronics, Information and Communication Engineers
  96. Efficient Proxy-bidding System

    TAMURA Yuko, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 103 No. 315 p. 29-34 2003/09/19

    Publisher: The Institute of Electronics, Information and Communication Engineers
  97. A privacy-enhanced efficient group signature scheme

    UMEDA Kozue, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 103 No. 196 p. 1-8 2003/07/11

    Publisher: The Institute of Electronics, Information and Communication Engineers
  98. Prominent Books and Articles in the 20th Century : R. L. Rivest, A. Shamir and L. Adleman : A Method for Obtaining Digital Signature and Public-key Cryptosystems

    MIYAJI Atsuko

    IPSJ Magazine Vol. 44 No. 6 p. 650-650 2003/06/15

    Publisher: Information Processing Society of Japan (IPSJ)
  99. Recent Topic of Elliptic Curve on Security Application

    MIYAJI Atsko

    IEICE technical report. Information theory Vol. 103 No. 99 p. 17-22 2003/05/23

    Publisher: The Institute of Electronics, Information and Communication Engineers
  100. A Consideration for the Bias of Quantum Coin Flipping Extension to 4 states protocol from 3 states

    FUKUDA Sayaka, SOSHI Masakazu, MIYAJI Atsuko

    IEICE Japan Tech. Rep. Vol. 103 No. 61 p. 21-24 2003/05/14

    Publisher: The Institute of Electronics, Information and Communication Engineers
  101. Construction of Elliptic Curves with a suitable Embedding Degree

    HIRAI Tarou, MIYAJI Atsuko

    Vol. 102 No. 748 p. 53-58 2003/03/20

    Publisher: The Institute of Electronics, Information and Communication Engineers
  102. Efficient exponentiation on Genus Two Hyperelliptic Curves(II)

    TAKAHASHI Naoyuki, MORIMOTO Hiroaki, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 102 No. 744 p. 59-63 2003/03/20

    Publisher: The Institute of Electronics, Information and Communication Engineers
  103. Software Obfuscation on a Theoretical Basis and Its Implementation

    OGISO Toshio, SAKABE Yusuke, SOSHI Masakazu, MIYAJI Atsuko

    IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Vol. 86 No. 1 p. 176-186 2003/01/01

    Publisher: The Institute of Electronics, Information and Communication Engineers
  104. The Security of RC6 against χ^2-attack

    ISOGAI Norihisa, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 102 No. 511 p. 27-34 2002/12/09

    Publisher: The Institute of Electronics, Information and Communication Engineers
  105. A Second-price Sealed-bid Auction with Public Verifiability

    Kazumasa Omote, Atsuko Miyaji

    Transactions of Information Processing Society of Japan Vol. 43 No. 8 p. 1405-2413 2002/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  106. Provably Secure Multi-signature Scheme with Signers' Intentions

    Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada

    Transactions of Information Processing Society of Japan Vol. 43 No. 8 p. 2425-2434 2002/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  107. An English Auction Protocol with Proxy Bidding

    SHIOTSUKI Toru, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 102 No. 212 p. 25-29 2002/07/12

    Publisher: The Institute of Electronics, Information and Communication Engineers
  108. A Practical English Auction with Simple Revocation

    OMOTE Kazumasa, MIYAJI Atsuko

    IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Vol. 85 No. 5 p. 1054-1061 2002/05/01

    Publisher: The Institute of Electronics, Information and Communication Engineers
  109. An Extension of Collusion Problem and its Application to Protocol Analysis

    WASEDA Atsushi, SOSHI Masakazu, MIYAJI Atsuko

    Technical report of IEICE. SST Vol. 101 No. 730 p. 75-80 2002/03/19

    Publisher: The Institute of Electronics, Information and Communication Engineers
  110. Efficient Exponentiation on Elliptic Curve Cryptosystem

    MIYAKE Hideyuki, MIYAJI Atsuko

    Technical report of IEICE. SST Vol. 101 No. 730 p. 69-74 2002/03/19

    Publisher: The Institute of Electronics, Information and Communication Engineers
  111. Efficient Group Signature Scheme with Revocation

    UMEDA Kozue, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 101 No. 507 p. 1-8 2001/12/10

    Publisher: The Institute of Electronics, Information and Communication Engineers
  112. Security Analysis of Signature Schemes Based on Fast on-line Computation

    OKAMOTO Takeshi, TADA Mitsuru, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 101 No. 403 p. 1-8 2001/11/02

    Publisher: The Institute of Electronics, Information and Communication Engineers
  113. An English Auction with Complete Unlinkability among Plural Auctions

    OMOTE Kazumasa, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 101 No. 402 p. 9-14 2001/11/01

    Publisher: The Institute of Electronics, Information and Communication Engineers
  114. A Signature Scheme with a Guarantee

    TAMURA Yuko, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 101 No. 402 p. 1-8 2001/11/01

    Publisher: The Institute of Electronics, Information and Communication Engineers
  115. A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability

    MITOMI Shirow, MIYAJI Atsuko

    IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Vol. 84 No. 10 p. 2488-2499 2001/10/01

    Publisher: The Institute of Electronics, Information and Communication Engineers
  116. G.V.A.における架空名義入札の効用

    面 和成, 東条 敏, 宮地 充子

    Research report Vol. 2001 p. 1-22 2001/08/20

    Publisher: 北陸先端科学技術大学院大学
  117. Proposal of Efficient Signature Schemes Based on Factoring

    OKAMOTO Takeshi, TADA Mitsuru, MIYAJI Atsuko

    Transactions of Information Processing Society of Japan Vol. 42 No. 8 p. 2123-2133 2001/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  118. An Anonymous Sealed-bid Auction with a Feature of Entertainment

    Kazumasa Omote, Atsuko Miyaji

    Transactions of Information Processing Society of Japan Vol. 42 No. 8 p. 2049-2056 2001/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  119. Study of multi - signature schemes with signers' intentions

    KAWAUCHI Kei, TADA Mitsuru, MIYAJI Atsuko

    IPSJ SIG Notes Vol. 2001 No. 75 p. 59-65 2001/07/25

    Publisher: Information Processing Society of Japan (IPSJ)
  120. Study of multi-signature schemes with signers' intentions

    KAWAUCHI Kei, TADA Mitsuru, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 101 No. 214 p. 59-65 2001/07/18

    Publisher: The Institute of Electronics, Information and Communication Engineers
  121. A Fast Signature Scheme without on-line Modular Multiplication

    OKAMOTO Takeshi, TADA Mitsuru, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 101 No. 48 p. 59-66 2001/05/11

    Publisher: The Institute of Electronics, Information and Communication Engineers
  122. A Practical English Auction with One-time Registration

    OMOTE Kazumasa, MIYAJI Atsuko

    Technical report of IEICE. SST Vol. 100 No. 694 p. 57-62 2001/03/16

    Publisher: The Institute of Electronics, Information and Communication Engineers
  123. Interactive Signature Scheme between Confirmer and Signer

    TAMURA Yuko, MIYAJI Atsuko

    Technical report of IEICE. SST Vol. 100 No. 694 p. 63-70 2001/03/16

    Publisher: The Institute of Electronics, Information and Communication Engineers
  124. A Collusion Model with Shared/Unshared Keys and Consideration on Collusion Relation.

    早稲田篤志, 双紙正和, 宮地充子

    電子情報通信学会技術研究報告 Vol. 101 No. 403(ISEC2001 79-86) 2001

  125. Multi-signature schemes with signers' intentions

    MINATO Hiroshi, TADA Mitsuru, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 100 No. 421 p. 67-74 2000/11/13

    Publisher: The Institute of Electronics, Information and Communication Engineers
  126. An Idea to Build More Secure Cryptosystem Using Conventional Block Ciphers

    TERAUHI Norio, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 100 No. 421 p. 53-59 2000/11/13

    Publisher: The Institute of Electronics, Information and Communication Engineers
  127. A Practical Anonymous Electronic English Auction by Using Bulletin Board

    OMOTE Kazumasa, MIYAJI Atsuko

    TECHNICAL REPORT OF IEICE Vol. 100 No. 421 p. 45-52 2000/11/13

    Publisher: The Institute of Electronics, Information and Communication Engineers
  128. Efficient Signature Schemes Based on Factoring

    OKAMOTO Takeshi, TADA Mitsuru, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 100 No. 323 p. 21-28 2000/09/28

    Publisher: The Institute of Electronics, Information and Communication Engineers
  129. 楕円曲線暗号 (特集 暗号の数理--デジタル社会のセキュリティ)

    宮地 充子

    数理科学 Vol. 38 No. 9 p. 27-33 2000/09

    Publisher: サイエンス社
  130. Anonymous Communication with Elementary Cyclic Routes

    KITAZAWA Shigeki, NAGANO Satoru, SOSHI Masakazu, MIYAJI Atsuko

    Transactions of Information Processing Society of Japan Vol. 41 No. 8 p. 2148-2160 2000/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  131. The Secure Renewal of Cryptosystems in the Open Network Architecture

    YAMADA Tatsuya, MIYAJI Atsuko, SOSHI Masakazu

    Transactions of Information Processing Society of Japan Vol. 41 No. 8 p. 2102-2109 2000/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  132. Efficient Construction of Elliptic Curves over Optimal Extension Field

    Yuichi Futa, Atsuko Miyaji

    Transactions of Information Processing Society of Japan Vol. 41 No. 8 p. 2092-2101 2000/08/15

    Publisher: Information Processing Society of Japan (IPSJ)
  133. Security of a multisignature scheme with flexibility and verifiability

    MITOMI Shirow, MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 100 No. 77 p. 87-94 2000/05/26

    Publisher: The Institute of Electronics, Information and Communication Engineers
  134. On the weakness in an order-specified multisignature scheme

    MITOMI Shirow, MIYAJI Atsuko, TADA Mitsuru

    Technical report of IEICE. ISEC Vol. 100 No. 77 p. 79-86 2000/05/26

    Publisher: The Institute of Electronics, Information and Communication Engineers
  135. The Anonymous Communication Framework and its Evaluation

    KITAZAWA Shigeki, SOSHI Masakazu, MIYAJI Atsuko

    IPSJ SIG Notes Vol. 2000 No. 36 p. 41-46 2000/05/10

    Publisher: Information Processing Society of Japan (IPSJ)
  136. Linkable Anonymous Off - line E - cash

    KOIDE ATSUSHI, TADA MITSURU, MIYAJI ATSUKO

    IPSJ SIG Notes Vol. 2000 No. 30 p. 143-148 2000/03/21

    Publisher: Information Processing Society of Japan (IPSJ)
  137. Framework of Anonymous Communication Protocols

    KITAZAWA Shigeki, SOSHI Masakazu, MIYAJI Atsuko

    IPSJ SIG Notes Vol. 2000 No. 30 p. 149-154 2000/03/21

    Publisher: Information Processing Society of Japan (IPSJ)
  138. Integration of DLP-based cryptosystems

    Vol. 99 No. 329 p. 73-80 1999/09/24

    Publisher: 電子情報通信学会
  139. Mathematics of Elliptic Curve Cryptography

    KOYAMA Kenji, MIYAJI Atsuko, UCHIYAMA Shigenori

    The Transactions of the Institute of Electronics,Information and Communication Engineers. A Vol. 82 No. 8 p. 1212-1222 1999/08

    Publisher: The Institute of Electronics, Information and Communication Engineers
  140. Elliptic curve cryptosystems (Applied Mathematics of Discrete Integrable Systems)

    Miyaji Atsuko

    RIMS Kokyuroku Vol. 1098 p. 138-146 1999/04

    Publisher: Kyoto University
  141. Another Coutermeasure to Forgeries over Message Recovery Signature

    MIYAJI Atsuko

    IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Vol. 80 No. 11 p. 2192-2200 1997/11/25

    Publisher: The Institute of Electronics, Information and Communication Engineers
  142. A message recovery signature scheme equivalent to DSA

    MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 96 No. 167 p. 73-83 1996/07/22

    Publisher: The Institute of Electronics, Information and Communication Engineers
  143. Signature equation suitable for message recovery schemes

    MIYAJI Atsuko

    Proceedings of the IEICE General Conference Vol. 1996 p. 268-268 1996/03/11

    Publisher: The Institute of Electronics, Information and Communication Engineers
  144. Weakness in Message recovery signature schemes based on discrete logarithm problems 2

    MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 95 No. 422 p. 31-38 1995/12/14

    Publisher: The Institute of Electronics, Information and Communication Engineers
  145. Weakness in Message recovery signature schemes based on discrete logarithm problems 1

    MIYAJI Atsuko

    Technical report of IEICE. ISEC Vol. 95 No. 172 p. 47-57 1995/07/21

    Publisher: The Institute of Electronics, Information and Communication Engineers
  146. On Secure and Fast Elliptic Curve Cryptosystems over F_p

    Miyaji Atsuko

    IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Vol. 77 No. 4 p. 630-635 1994/04

    Publisher: The Institute of Electronics, Information and Communication Engineers

Publications 8

  1. 応用基礎としてのデータサイエンス : AI×データ活用の実践

    北川, 源四郎, 竹村, 彰通, 赤穂, 昭太郎, 今泉, 允聡, 内田, 誠一, 岡崎, 直観, 清, 智也, 高野, 渉, 辻, 真吾, 原, 尚幸, 久野, 遼平, 松原, 仁, 宮地, 充子, 森畑, 明昌, 宿久, 洋

    講談社 2025/02

    ISBN: 9784065386187

  2. Security infrastructure technology for integrated utilization of big data : applied to the living safety and medical fields

    Miyaji, Atsuko, Mimoto, Tomoaki

    Springer Open 2020

    ISBN: 9789811536533

  3. Security Infrastructure Technology for Integrated Utilization of Big Data - Applied to the Living Safety and Medical Fields

    Atsuko Miyaji, Tomoaki Mimoto

    2020

  4. 代数学から学ぶ暗号理論

    宮地充子

    日本評論社 2012/03 Scholarly book

    ISBN: 9784535786790

  5. 情報セキュリティ-暗号,認証,倫理まで-

    宮地充子他

    昭晃堂 2003/10 Scholarly book

    ISBN: 9784785631420

  6. 情報セキュリティ

    宮地充子菊池浩明

    オーム社 2003/10 Scholarly book

    ISBN: 9784274132841

  7. 情報セキュリティ

    宮地充子他

    ビット別冊, 共立出版 2000/09 Scholarly book

    ISBN: 9784320029934

  8. 暗号・ゼロ知識証明・数論

    宮地充子他

    共立出版 1995/06 Scholarly book

    ISBN: 9784320027404

Institutional Repository 6

Content Published in the University of Osaka Institutional Repository (OUKA)
  1. Authenticated logarithmic-order supersingular isogeny group key exchange

    Hougaard B. Hector, Miyaji Atsuko

    International Journal of Information Security Vol. 21 p. 207-221 2021/05/07

  2. A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT

    Mamun Mohammad, Miyaji Atsuko, Luv Rongxing, Su Chunhua

    Peer-to-Peer Networking and Applications Vol. 14 p. 708-721 2021/03

  3. Efficient Multi-Party Contact Tracing

    De Goyon Mathieu, Miyaji Atsuko, Tian Yangguang

    2021 9th International Symposium on Computing and Networking, CANDAR 2021 p. 10-18 2021

  4. Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity

    Hougaard Hector B., Miyaji Atsuko

    ICICS 2020: Information and Communications Security p. 91-106 2020/11/28

  5. Practice and Evaluation of Educational Measurement of enPiT

    山本 雅基, 小林 隆志, 宮地 充子, 奥野 拓, 粂野 文洋, 櫻井 浩子, 海上 智昭, 春名 修介, 井上 克郎

    Computer Software Vol. 32 No. 1 p. 1_213-1_219 2015/01/26

  6. Studies on security and efficiency of elliptic curve cryptosystems

    宮地 充子