• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Miyaji Atsuko  宮地 充子

ORCIDConnect your ORCID iD *help
… Alternative Names

MIYAJI Atsuko  宮地 充子

Less
Researcher Number 10313701
Other IDs
External Links
Affiliation (Current) 2025: 大阪大学, 大学院工学研究科, 教授
Affiliation (based on the past Project Information) *help 2022 – 2024: 大阪大学, 大学院工学研究科, 教授
2021: 大阪大学, 工学研究科, 教授
2017 – 2018: 大阪大学, 工学研究科, 教授
2016 – 2017: 大阪大学, 工学系研究科, 教授
2016: 北陸先端科学技術大学院大学, 先端科学技術研究科, 教授 … More
2007 – 2015: Japan Advanced Institute of Science and Technology, 情報科学研究科, 教授
2008: 北陸先端科学技術大学院大学, 情報科学研究科・教授, 教授
2004 – 2006: 北陸先端科学技術大学院大学, 情報科学研究科, 助教授 Less
Review Section/Research Field
Principal Investigator
Fundamental theory of informatics / Basic Section 60070:Information security-related / Computer system/Network / Science and Engineering
Except Principal Investigator
Computer system/Network / Information security / Fundamental theory of informatics
Keywords
Principal Investigator
暗号・認証等 / 楕円曲線 / セキュリティ / 公開鍵暗号 / 安全性証明 / サイドチャンネル / IoT / FPGA / 耐量子暗号 / 暗号・認証 … More / 安全性評価 / 楕円曲線暗号 / センサネットワーク / 暗号・承認等 / センサーネットワーク / サイドチャネル / グループ署名 / ソフトウェア解析 / 難読化 / マルチパーティプロトコル / oblivious transfer / secure function evaluation / モバイルエージェント / 一方向性関数 / forward security / 双線形写像 / 鍵露呈攻撃 / 鍵進化 / ディジタル署名 / 鍵進化公開鍵暗号 / IDベース暗号 / ブロードキャスト暗号 / 階層的IDベース暗号 … More
Except Principal Investigator
セキュリティ / ネットワーク / DoS / ユビキタス / ハッシュ関数 / 認証 / プロトコル / 理論的解析 / モデル / トレースバック / サービス不能攻撃 / 通信 / ハッシュ連鎖 / モバイルコンピューティング / IoT / 非線形変換 / 難読化技術 / ProVerif / 形式検証 / 耐タンパー技術 / White-Box Cryptography / packet filtering / IP traceback / analysis / model / Denial of Service attack / フィルタリング / IPトレースバック / 解析 / シミュレーション / 実装 / 暗号・認証 / セキュア・ネットワーク / 情報基礎 / 暗号・認証等 Less
  • Research Projects

    (13 results)
  • Research Products

    (694 results)
  • Co-Researchers

    (9 People)
  •  量子計算機に対してシームレス安全な暗号基盤の構築Principal Investigator

    • Principal Investigator
      宮地 充子
    • Project Period (FY)
      2021 – 2025
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Osaka University
  •  Study on tamper-resistant software technology with theoretic security evaluation

    • Principal Investigator
      FUTA Yuichi
    • Project Period (FY)
      2015 – 2018
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      Tokyo University of Technology
      Japan Advanced Institute of Science and Technology
  •  Flexible and efficient hash chain constructions and its applications for lightweight authentication

    • Principal Investigator
      Soshi Masakazu
    • Project Period (FY)
      2015 – 2017
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      Hiroshima City University
  •  Flexible and Efficient Authentication with Hash Chains

    • Principal Investigator
      SOSHI Masakazu
    • Project Period (FY)
      2012 – 2014
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Computer system/Network
    • Research Institution
      Hiroshima City University
  •  Study on the security of elliptic curve discrete logarithm problemsPrincipal Investigator

    • Principal Investigator
      MIYAJI Atsuko
    • Project Period (FY)
      2011 – 2014
    • Research Category
      Grant-in-Aid for Challenging Exploratory Research
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Japan Advanced Institute of Science and Technology
  •  Study on secure and safety technology for sensor networksPrincipal Investigator

    • Principal Investigator
      MIYAJI Atsuko
    • Project Period (FY)
      2009 – 2014
    • Research Category
      Grant-in-Aid for Scientific Research (A)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Japan Advanced Institute of Science and Technology
  •  Study on techniques to keep confidentiality and integrity of a large amount of information

    • Principal Investigator
      HIROSE Shoichi
    • Project Period (FY)
      2008 – 2011
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      University of Fukui
  •  Efficient Countermeasures against DoS Attacks

    • Principal Investigator
      SOSHI Masakazu
    • Project Period (FY)
      2008 – 2010
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Computer system/Network
    • Research Institution
      Hiroshima City University
  •  楕円曲線上の離散対数問題の安全性評価に関する研究Principal Investigator

    • Principal Investigator
      宮地 充子
    • Project Period (FY)
      2007 – 2009
    • Research Category
      Grant-in-Aid for Challenging Exploratory Research
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Japan Advanced Institute of Science and Technology
  •  Research on Public Key Cryptosystems Secure against Side Chanel AttackPrincipal Investigator

    • Principal Investigator
      MIYAJI Atsuko
    • Project Period (FY)
      2005 – 2008
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Japan Advanced Institute of Science and Technology
  •  A Study on Efficient IP Traceback and its Theoretical Analysis

    • Principal Investigator
      SOSHI Masakazu
    • Project Period (FY)
      2005 – 2006
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Computer system/Network
    • Research Institution
      JapanAdvanced Institute of Science and Technology
  •  秘密鍵の動的な攻撃(鍵露呈攻撃)に対して安全な鍵進化公開鍵暗号に関する研究Principal Investigator

    • Principal Investigator
      宮地 充子
    • Project Period (FY)
      2004 – 2005
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Japan Advanced Institute of Science and Technology
  •  モバイルエージェントにおけるセキュリティ技術の研究開発Principal Investigator

    • Principal Investigator
      宮地 充子
    • Project Period (FY)
      2004 – 2005
    • Research Category
      Grant-in-Aid for Exploratory Research
    • Research Field
      Computer system/Network
    • Research Institution
      Japan Advanced Institute of Science and Technology

All 2023 2022 2021 2020 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 Other

All Journal Article Presentation Book Patent

  • [Book] 応用基礎としてのデータサイエンスAI ×データ活用の実践2023

    • Author(s)
      北川 源四郎 (編集), 竹村 彰通 (編集), 赤穂 昭太郎 (著), 今泉 允聡 (著), 内田 誠一 (著), 清 智也 (著), 高野 渉 (著), 辻 真吾 (著), 原 尚幸 (著), 久野 遼平 (著), 松原 仁 (著), 宮地 充子 (著), 森畑 明昌 (著), 宿久 洋
    • Total Pages
      384
    • Publisher
      講談社
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Book] Applied Cryptography and Network Security - 15th International Conference, ACNS 20172017

    • Author(s)
      Dieter Gollmann, Atsuko Miyaji, Hiroaki Kikuchi
    • Total Pages
      707
    • Publisher
      Springer
    • ISBN
      9783319612034
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Book] 代数学から学ぶ暗号理論2012

    • Author(s)
      宮地 充子
    • Total Pages
      288
    • Publisher
      日本評論社
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Book] 代数学から学ぶ暗号理論2012

    • Author(s)
      宮地 充子
    • Total Pages
      288
    • Publisher
      日本評論社
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Compact and Efficient Constant-Time GCD and Modular Inversion with Short-Iteration2023

    • Author(s)
      JIN Yaoan、MIYAJI Atsuko
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: E106.D Issue: 9 Pages: 1397-1406

    • DOI

      10.1587/transinf.2022ICP0009

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2023-09-01
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] PNB Based Differential Cryptanalysis of Salsa20 and ChaCha2023

    • Author(s)
      GHAFOORI Nasratullah、MIYAJI Atsuko、ITO Ryoma、MIYASHITA Shotaro
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: E106.D Issue: 9 Pages: 1407-1422

    • DOI

      10.1587/transinf.2022ICP0015

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2023-09-01
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] On the Weakness of Non-Dual Ring-LWE Mod Prime Ideal q by Trace Map2023

    • Author(s)
      TAKAHASHI Tomoka、OKUMURA Shinya、MIYAJI Atsuko
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: E106.D Issue: 9 Pages: 1423-1434

    • DOI

      10.1587/transinf.2022ICP0017

    • ISSN
      0916-8532, 1745-1361
    • Year and Date
      2023-09-01
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] Efficient Multi-Party Contact Tracing2022

    • Author(s)
      Goyon Mathieu de、Miyaji Atsuko、Tian Yangguang
    • Journal Title

      Journal of Information Processing

      Volume: 30 Issue: 0 Pages: 878-887

    • DOI

      10.2197/ipsjjip.30.878

    • ISSN
      1882-6652
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] Publicly Verifiable M+1st-Price Auction Fit for IoT with Minimum Storage2021

    • Author(s)
      Hsu Po-Chu, Miyaji Atsuko
    • Journal Title

      Security and Communication Networks

      Volume: 2021 Pages: 1-10

    • DOI

      10.1155/2021/1615117

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] Verifiable M+lst-Price Auction without Manager2021

    • Author(s)
      Hsu Po-Chu, Miyaji Atsuko
    • Journal Title

      IEEE TrustCom

      Volume: X Pages: 1-10

    • DOI

      10.1109/dsc49826.2021.9346242

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems2021

    • Author(s)
      Tanaka Kiyofumi, Miyaji Atsuko, Jin Yaoan
    • Journal Title

      Springer

      Volume: 12726 Pages: 393-414

    • DOI

      10.1007/978-3-030-78372-3_15

    • ISBN
      9783030783716, 9783030783723
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] Authenticated Tree-Based R-LWE Group Key Exchange2021

    • Author(s)
      Hougaard Hector, Miyaji Atsuko
    • Journal Title

      The Computer Journal

      Volume: 00 Issue: 2 Pages: 360-372

    • DOI

      10.1093/comjnl/bxab165

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] Message-Restriction-Free Commitment Scheme Based on?Lattice Assumption2021

    • Author(s)
      Miyaji Hideaki, Wang Yuntao, Miyaji Atsuko
    • Journal Title

      Springer

      Volume: 13107 Pages: 90-105

    • DOI

      10.1007/978-3-030-93206-0_7

    • ISBN
      9783030932053, 9783030932060
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] Efficient Multi-Party Contact Tracing2021

    • Author(s)
      de Goyon Mathieu, Miyaji Atsuko, Tian Yangguang
    • Journal Title

      IEEE

      Volume: X Pages: 10-18

    • DOI

      10.1109/candar53791.2021.00010

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] A Commitment Scheme with Output Locality-3 Fit for the IoT Device2021

    • Author(s)
      Hideaki Miyaji, Yuntao Wang, Akinori Kawachi, and Atsuko Miyaji
    • Journal Title

      Security and Communication Networks

      Volume: 2021 Issue: Article ID 2949513 Pages: 1-10

    • DOI

      10.1155/2021/2949513

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-17K12640, KAKENHI-PROJECT-21K11751, KAKENHI-PROJECT-21K11887, KAKENHI-PROJECT-21H04879, KAKENHI-PROJECT-23K21669
  • [Journal Article] A Practical Parallel Computation in a Scalable Multiparty Private Set Intersection2021

    • Author(s)
      Mishima Seitaro, Nakasho Kazuhisa, Takano Yuuki, Miyaji Atsuko
    • Journal Title

      IEEE

      Volume: X Pages: 332-338

    • DOI

      10.1109/candarw53999.2021.00063

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] Group Key Exchange Compilers from?Generic Key Exchanges2021

    • Author(s)
      Hougaard Hector B, Miyaji Atsuko
    • Journal Title

      Springer

      Volume: X Pages: 162-184

    • DOI

      10.1007/978-3-030-92708-0_10

    • ISBN
      9783030927073, 9783030927080
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] Authenticated logarithmic-order supersingular isogeny group key exchange2021

    • Author(s)
      Hougaard Hector B, Miyaji Atsuko
    • Journal Title

      International Journal of Information Security

      Volume: 21 Issue: 2 Pages: 207-221

    • DOI

      10.1007/s10207-021-00549-4

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Journal Article] A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT2020

    • Author(s)
      Mamun Mohammad、Miyaji Atsuko、Luv Rongxing、Su Chunhua
    • Journal Title

      Peer-to-Peer Networking and Applications

      Volume: 14 Issue: 2 Pages: 708-721

    • DOI

      10.1007/s12083-020-01007-z

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298, KAKENHI-PROJECT-23K21669
  • [Journal Article] OTP-IoT: An ownership transfer protocol for the Internet of Things2018

    • Author(s)
      Mamun Mohammad Saiful Islam、Su Chunhua、Yang Anjia、Miyaji Atsuko、Ghorbani Ali
    • Journal Title

      Journal of Information Security and Applications

      Volume: 43 Pages: 73-82

    • DOI

      10.1016/j.jisa.2018.10.009

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18K11298, KAKENHI-PROJECT-15K00183
  • [Journal Article] Refined RC4 key correlations of internal states in WPA2017

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamental

      Volume: E99-A Pages: 1132-1144

    • NAID

      130005154235

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Journal Article] Refined Construction of RC4 Key Setting in WPA2017

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E100.A Issue: 1 Pages: 138-148

    • DOI

      10.1587/transfun.E100.A.138

    • NAID

      130005180798

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Journal Article] A simple authentication encryption scheme2017

    • Author(s)
      Mazumder Rashed、Miyaji Atsuko、Su Chunhua
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: 29 Issue: 16 Pages: 16-16

    • DOI

      10.1002/cpe.4058

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005, KAKENHI-PROJECT-15K00189
  • [Journal Article] Privacy-Preserving Integration of Medical Data A Practical Multiparty Private Set Intersection2017

    • Author(s)
      Atsuko Miyaji, Kazuhisa Nakasho and Shohei Nishida
    • Journal Title

      Journal of Medical Systems

      Volume: 41 Issue: 3 Pages: 1-10

    • DOI

      10.1007/s10916-016-0657-4

    • Peer Reviewed / Acknowledgement Compliant / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00183, KAKENHI-PROJECT-15K00189
  • [Journal Article] Variable message encryption through blockcipher compression function2017

    • Author(s)
      Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: Volume 29, Issue 7 Issue: 7 Pages: 1-16

    • DOI

      10.1002/cpe.3956

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005, KAKENHI-PROJECT-15K00189
  • [Journal Article] Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data2017

    • Author(s)
      Mazumder Rashed、Miyaji Atsuko、Su Chunhua
    • Journal Title

      International Journal of Foundations of Computer Science

      Volume: 28 Issue: 06 Pages: 661-682

    • DOI

      10.1142/s0129054117400123

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005, KAKENHI-PROJECT-15K00189
  • [Journal Article] Construction of RC4 Key Setting in WPA2017

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamental

      Volume: E100-A Pages: 138-148

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Journal Article] Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices2017

    • Author(s)
      Gordon Steven、Huang Xinyi、Miyaji Atsuko、Su Chunhua、Sumongkayothin Karin、Wipusitwarakun Komwut
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 12 Issue: 12 Pages: 3024-3038

    • DOI

      10.1109/tifs.2017.2730584

    • NAID

      120006469242

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16005, KAKENHI-PROJECT-15K00189
  • [Journal Article] Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices2017

    • Author(s)
      Steven Gordon, Xinyi Huang, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin and Komwut Wipusitwarakun
    • Journal Title

      IEEE Trans. Information Forensics and Security

      Volume: 12 Pages: 3024-3038

    • NAID

      120006469242

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-2562016

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E99-A Pages: 14-21

    • NAID

      130005115228

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Journal Article] Refined Glimpse correlations of RC42016

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E99-A Pages: 3-13

    • NAID

      130005115256

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Journal Article] A New Scheme of Blockcipher Hash2016

    • Author(s)
      Mazumder Rashed and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Information and Systems

      Volume: E99-D Pages: 796-804

    • NAID

      130005141349

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Journal Article] A New Scheme of Blockcipher Hash2016

    • Author(s)
      Mazumder Rashed and Atsuko Miyaji
    • Journal Title

      IEICE Trans. Inf. & Syst.

      Volume: E99.D Issue: 4 Pages: 796-804

    • DOI

      10.1587/transinf.2015ICP0028

    • NAID

      130005141349

    • ISSN
      0916-8532, 1745-1361
    • Language
      English
    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-2562016

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E99.A Issue: 1 Pages: 14-21

    • DOI

      10.1587/transfun.E99.A.14

    • NAID

      130005115228

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189, KAKENHI-PROJECT-25330150
  • [Journal Article] A new (n, n) blockcipher hash function using Feistel Network: Apposite for RFID Security2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      International Conference on Computational Intelligence in Data Mining (ICCIDM 2014), Lecture Notes in Computer Science, Volume 33(2015), Springer-Verlag

      Volume: Volume 33 Pages: 519-528

    • NAID

      120005678257

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] How TKIP induces biases of internal states of generic RC42015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, XXX(2015), Springer-Verlag

      Volume: -

    • NAID

      120005767114

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA2015), IEEE

      Volume: NA Pages: 564-570

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] New Linear Correlations related to State Information of RC4 PRGA2015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 22nd International Workshop on Fast Software Encryption (FSE 2015), Lecture Notes in Computer Science, Springer-Verlag

      Volume: -

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-2562015

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      The 17th International Conference on Information and Security Cryptology, ICISC 2014, Lecture Notes in Computer Science, 8949(2015), Springer-Verlag

      Volume: 8949 Pages: 271-285

    • NAID

      110009778465

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] New Linear Correlations related to State Information of RC4 PRGA2015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 22nd International Workshop on Fast Software Encryption (FSE 2015), Lecture Notes in Computer Science, Springer-Verlag

      Volume: -

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] New Integrated Long-Term Glimpse of RC42015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science, Volume 8909(2015), Springer-Verlag

      Volume: 8909 Pages: 137-149

    • NAID

      120005691304

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] A new (n; n) blockcipher hash function using Feistel Network: Apposite for RFID Security2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      International Conference on Computational Intelligence in Data Mining (ICCIDM 2014), Lecture Notes in Computer Science, Volume 33(2015), Springer-Verlag

      Volume: 33 Pages: 519-528

    • NAID

      120005678257

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] How TKIP induces biases of internal states of generic RC42015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, (2015), Springer-Verlag

      Volume: -

    • NAID

      120005767114

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] A new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA 2015), IEEE

      Volume: - Pages: 564-570

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] enPiT における教育効果測定の実践と評価2015

    • Author(s)
      山本雅基,小林隆志,宮地充子,奥野拓,粂野文洋,櫻井浩子,海上智昭,春名修介,井上克郎
    • Journal Title

      コンピュータソフトウェア

      Volume: Vol. 32, No.1 Pages: 213-219

    • NAID

      40020582107

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] enPiT における教育効果測定の実践と評価2015

    • Author(s)
      山本雅基,小林隆志,宮地充子,奥野拓,粂野文洋,櫻井浩子,海上智昭,春名修介,井上克郎
    • Journal Title

      コンピュータソフトウェア

      Volume: Vol. 32, No.1 Pages: 213-219

    • NAID

      40020582107

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] A new (n, n) blockcipher hash function using Feistel Network: Apposite for RFID Security2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      International Conference on Computational Intelligence in Data Mining (ICCIDM 2014), Lecture Notes in Computer Science, Volume 33(2015), Springer-Verlag

      Volume: Volume 33 Pages: 519-528

    • NAID

      120005678257

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-2562015

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      The 17th International Conference on Information and Security Cryptology, ICISC 2014, , Lecture Notes in Computer Science, 8949(2015), Springer-Verlag

      Volume: 8949 Pages: 271-285

    • NAID

      120005723611

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] New Integrated Long-Term Glimpse of RC42015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science, Volume 8909(2015), Springer-Verlag

      Volume: 8909 Pages: 137-149

    • NAID

      120005691304

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-2562015

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      The 17th International Conference on Information and Security Cryptology, ICISC 2014, Lecture Notes in Computer Science, 8949(2015), Springer-Verlag

      Volume: 8949 Pages: 271-285

    • NAID

      120005723611

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Self-healing wireless sensor networks2015

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: - Issue: 10 Pages: 2547-2568

    • DOI

      10.1002/cpe.3434

    • NAID

      120005624453

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001, KAKENHI-PROJECT-23650006, KAKENHI-PROJECT-24500092, KAKENHI-PROJECT-25730083
  • [Journal Article] A new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA 2015), IEEE

      Volume: - Pages: 564-570

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] ユビキタスネットワークにおけるセキュリティ技術-積極的利用を促すセキュリティ技術-2014

    • Author(s)
      宮地充子
    • Journal Title

      「電気評論」

      Volume: 夏季増刊号特集 Pages: 12-15

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A new (n, n) Blockcipher based Hash Function for Short Messages2014

    • Author(s)
      Atsuko Miyaji, Mazumder Rashed and Tsuyoshi Sawada
    • Journal Title

      2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS), IEEE

      Volume: - Pages: 56-63

    • NAID

      120006675662

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Scalable and Secure RFID Ownership Transfer Protocol2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE

      Volume: NA Pages: 343-350

    • NAID

      120007005446

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] RFID Path Authentication, Revisited2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA2014), IEEE

      Volume: NA Pages: 245-252

    • NAID

      120007005447

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] A Scalable and Secure RFID Ownership Transfer Protocol2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE

      Volume: - Pages: 343-350

    • NAID

      120007005446

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] RFID Path Authentication, Revisited2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE

      Volume: - Pages: 245-252

    • NAID

      120007005447

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] ユビキタスネットワークにおけるセキュリティ技術-積極的利用を促すセキュリティ技術-2014

    • Author(s)
      宮地充子
    • Journal Title

      「電気評論」

      Volume: 夏季増刊号特集 Pages: 12-15

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock2014

    • Author(s)
      Jiageng Chen, Yuichi Futa, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 8th International Conference on Network and System Security (NSS 2014), Lecture Notes in Computer Science, 8792(2014), Springer-Verlag

      Volume: 8792 Pages: 184-197

    • NAID

      120005661888

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A multi-purpose Group Signature for Vehicular Network Security2014

    • Author(s)
      Mohammad Saiful Islam Mamun, Atsuko Miyaji, and Hiroaki Takada
    • Journal Title

      2014 17th International Conference on Network-Based Information Systems (NBiS)

      Volume: - Pages: 511-516

    • NAID

      120006675661

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Generic constructions of secure-channel free searchable encryption with adaptive security2014

    • Author(s)
      Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, and Kazumasa Omote
    • Journal Title

      Wiley Security and Communication Networks

      Volume: - Issue: 8 Pages: 1547-1560

    • DOI

      10.1002/sec.1103

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001, KAKENHI-PROJECT-23650006, KAKENHI-PROJECT-24500092
  • [Journal Article] POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme2014

    • Author(s)
      Cheng-Qiang Huangy, Atsuko Miyajiy, Long-Hai Li, and Shang-Mei Xu
    • Journal Title

      2014 IEEE International Conference on Computer and Information Technology (CIT)

      Volume: - Pages: 373-387

    • NAID

      120006675656

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Scalable and Secure RFID Ownership Transfer Protocol2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE

      Volume: - Pages: 343-350

    • NAID

      120007005446

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A privacy-preserving efficient RFID authentication protocol from SLPN assumption2014

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications

      Volume: 印刷中

    • NAID

      120005661887

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Provable Secure Batch Authentication Scheme for EPCGen2 Tags2014

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 8th International Conference on Provable Security (Provsec 2014), Lecture Notes in Computer Science, Volume 8782(2014), Springer-Verlag

      Volume: 8782 Pages: 103-116

    • NAID

      120005657979

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] An r-hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users2014

    • Author(s)
      Keita Emura, Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      Journal of Applied Mathematics

      Volume: 2014

    • NAID

      120005624449

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] SKENO: Secret key encryption with non-interactive opening2014

    • Author(s)
      Jiageng Chen, Keita Emura, and Atsuko Miyaji
    • Journal Title

      Journal of Mathematical Cryptology

      Volume: - Issue: 2 Pages: 63-74

    • DOI

      10.1515/jmc-2014-0010

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001, KAKENHI-PROJECT-23650006
  • [Journal Article] An efficient batch verification system for large scale VANET2014

    • Author(s)
      Jiageng Chen, Mohammad S.I. Mamun, Atsuko Miyaji
    • Journal Title

      Intl. J. of Security and Communication Networks SCN

      Volume: Online Issue: 2 Pages: 298-310

    • DOI

      10.1002/sec.980

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001, KAKENHI-PROJECT-23650006
  • [Journal Article] Distributed Pseudo-Random Number Generation and its application to Cloud Database2014

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 10th Information Security Practice and Experience Conference(ISPEC 2014), Lecture Notes in Com- puter Science, 8434(2014), Springer-Verlag

      Volume: 8434 Pages: 373-387

    • NAID

      120005602733

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Provable Secure Batch Authentication Scheme for EPCGen2 Tags2014

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 8th International Conference on Provable Security (Provsec 2014), Lecture Notes in Computer Science, Volume 8782(2014), Springer-Verlag

      Volume: 8782 Pages: 103-116

    • NAID

      120005657979

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme2014

    • Author(s)
      Cheng-Qiang Huangy, Atsuko Miyajiy, Long-Hai Li, and Shang-Mei Xu
    • Journal Title

      2014 IEEE International Conference on Computer and Information Technology (CIT)

      Volume: - Pages: 373-387

    • NAID

      120006675656

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Secure VANET Applications with a refined Group Signature2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST)

      Volume: - Pages: 199-206

    • NAID

      120006675652

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Distributed Pseudo-Random Number Generation and its application to Cloud Database2014

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 10th Information Security Practice and Experience Conference(ISPEC 2014), Lecture Notes in Com- puter Science, 8434(2014), Springer-Verlag

      Volume: 8434 Pages: 373-387

    • NAID

      120005602733

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] ユビキタスネットワークにおけるセキュリティ技術- 積極的利用を促すセキュリティ技術-2014

    • Author(s)
      宮地充子
    • Journal Title

      電気評論

      Volume: 夏季増刊号特集 Pages: 12-15

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] A Provable Secure Batch Authentication Scheme for EPCGen2 Tags2014

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 8th International Conference on Provable Security (Provsec 2014), Lecture Notes in Computer Science, Volume 8782(2014), Springer-Verlag

      Volume: 8782 Pages: 103-116

    • NAID

      120005657979

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] A multi-purpose Group Signature for Vehicular Network Security2014

    • Author(s)
      Mohammad Saiful Islam Mamun, Atsuko Miyaji, and Hiroaki Takada
    • Journal Title

      2014 17th International Conference on Network-Based Information Systems (NBiS)

      Volume: - Pages: 511-516

    • NAID

      120006675661

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] An r-hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users2014

    • Author(s)
      Keita Emura, Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      Journal of Applied Mathematics

      Volume: 2014

    • NAID

      120005624449

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Secure VANET Applications with a refined Group Signature2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST)

      Volume: - Pages: 199-206

    • NAID

      120006675652

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] RFID Path Authentication, Revisited2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE

      Volume: - Pages: 245-252

    • NAID

      120007005447

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock2014

    • Author(s)
      Jiageng Chen, Yuichi Futa, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 8th International Conference on Network and System Security (NSS 2014), Lecture Notes in Computer Science, 8792(2014), Springer-Verlag

      Volume: 8792 Pages: 184-197

    • NAID

      120005661888

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] A new (n, n) Blockcipher based Hash Function for Short Messages2014

    • Author(s)
      Atsuko Miyaji, Mazumder Rashed and Tsuyoshi Sawada
    • Journal Title

      2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS), IEEE

      Volume: - Pages: 56-63

    • NAID

      120006675662

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Novel Strategies for Searching RC4 Key Collisions2013

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      Computers & Mathematics with Applications

      Volume: 66 Pages: 1-10

    • NAID

      120005298575

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Self-healing Schemes Suitable for Various WSNs2013

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      The 6th International Conference on Internet and Dsitributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag

      Volume: 8223 Pages: 92-105

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock2013

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops,, Lecture Notes in Computer Science,Springer-Verlag

      Volume: 8128 Pages: 1-15

    • NAID

      120005367951

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A fully-secure RFID authentication protocol from exact LPN assumption2013

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13)

      Volume: CD-ROM Pages: 102-109

    • DOI

      10.1109/trustcom.2013.17

    • NAID

      120006675368

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001, KAKENHI-PROJECT-23650006
  • [Journal Article] An efficient batch verification system for large scale VANET2013

    • Author(s)
      Jiageng Chen, Mohammad S.I. Mamun, Atsuko Miyaji
    • Journal Title

      Intl. J. of Security and Communication Networks SCN

      Volume: N.A.

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] A fully-secure RFID authentication protocol from exact LPN assumption2013

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13)

      Volume: none Pages: 102-109

    • NAID

      120006675368

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] Novel Strategies for Searching RC4 Key Collisions2013

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      Computers & Mathematics with Applications

      Volume: 66 Pages: 1-10

    • NAID

      120005298575

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Self-healing Schemes Suitable for Various WSNs2013

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      The 6th International Conference on Internet and Dsitributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag

      Volume: 8223 Pages: 92-105

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] A fully-secure RFID authentication protocol from exact LPN assumption2013

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communica- tions (IEEE TrustCom’13), IEEE

      Volume: - Pages: 102-109

    • NAID

      120006675368

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Private Multiparty Set Intersection Protocol in Rational Model2013

    • Author(s)
      Keita Emura, Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13)

      Volume: CD-ROM Pages: 431-438

    • DOI

      10.1109/trustcom.2013.54

    • NAID

      120006675373

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001, KAKENHI-PROJECT-23650006
  • [Journal Article] Private Multiparty Set Intersection Protocol in Rational Model2013

    • Author(s)
      Keita Emura, Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communica- tions (IEEE TrustCom’13), IEEE

      Volume: - Pages: 431-438

    • NAID

      120006675373

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A privacy-preserving efficient RFID authentication protocol from SLPN assumption2013

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications

      Volume: -

    • NAID

      120005661887

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock2013

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, 8128(2013), Springer-Verlag

      Volume: 8128 Pages: 1-15

    • NAID

      120005367951

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock2013

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, 8128(2013), Springer-Verlag

      Volume: 8128 Pages: 1-15

    • NAID

      120005367951

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] A privacy-preserving efficient RFID authentication protocol from SLPN assumption2013

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications

      Volume: N.A.

    • NAID

      120005661887

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] Self-healing Schemes Suitable for Various WSNs2013

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      The 6th International Conference on Internet and Dsitributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag

      Volume: 8223 Pages: 92-105

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] Dynamic Attribute-based Signcryption without Random Oracles2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: Vol. 2 Pages: 199-211

    • NAID

      120004664487

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Jacobian 座標系族の加法公式の改良2012

    • Author(s)
      Ratemo Alice Harriet Mwango, Yang Cuinan, Atsuko Miyaji
    • Journal Title

      The 2012 Symposium on Cryptography and Information Security

      Volume: SCIS2012- 1B2-2E

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Improved Left-to-Right Scalar Multiplication Algorithms2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2012 (2012-3) Pages: 141-148

    • NAID

      110009545770

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] An Optimized Signature Verification System for Vehicle Ad hoc NETwork2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 8th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM2012, IEEE

      Volume: - Pages: 1-8

    • NAID

      120006675329

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Novel Hybrid IP Traceback Scheme with Packet Counters2012

    • Author(s)
      Tomoyuki Karasawa, Masakazu Soshi and Atsuko Miyaji
    • Journal Title

      The 5th International Conference on Internet and Dsitributed Computing Systems, IDCS 2012,Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7646 Pages: 71-84

    • NAID

      120005147911

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] How to Enhance the Security on the Least Significant Bit2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      The 4th International Symposium on Cyberspace Safety and Security , CANS 2012, Springer-Verlag

      Volume: 7712 Pages: 263-279

    • NAID

      120005147913

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] Jacobian 座標系族の加法公式の改良2012

    • Author(s)
      Ratemo Alice Harriet Mwango, Yang Cuinan, Atsuko Miyaji
    • Journal Title

      The 2012 Symposium on Cryptography and Information Security

      Volume: SCIS2012- 1B2-2E

    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks2012

    • Author(s)
      Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 8th International Conference on Information Security Practice and Experience, ISPEC 2012, Lecture Notes in Computer Science

      Volume: 7232 Pages: 245-258

    • NAID

      120004247387

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] An Optimized Signature Verification System for Vehicle Ad hoc NETwork2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 8th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM2012, IEEE

      Volume: なし Pages: 1-8

    • NAID

      120006675329

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] A Secure and private RFID authentication protocol under SLPN problem2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 6th International Conference on Network and System Security , NSS 2012, Springer-Verlag

      Volume: 7645 Pages: 476-489

    • NAID

      120005147914

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] Dynamic Attribute-based Signcryption without RandomOracles2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: 2(3) Pages: 199-211

    • NAID

      120004664487

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] An Optimized Signature Verification System for Vehicle Ad hoc NETwork2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 8th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM2012, IEEE

      Volume: - Pages: 1-8

    • NAID

      120006675329

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Constant-Ciphertext-Size Dual Policy Attribute Based Encryption2012

    • Author(s)
      Atsuko Miyaji and Phuong V.X. TRAN
    • Journal Title

      The 11th International Conference on Cryptology and Network Security, CSS 2012, Springer-Verlag

      Volume: 7672 Pages: 400-413

    • NAID

      120005147912

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] How to Enhance the Security on the Least Significant Bit2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      The 4th International Symposium on Cyberspace Safety and Security , CANS 2012, Springer-Verlag

      Volume: 7712 Pages: 263-279

    • NAID

      120005147913

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Dynamic Attribute-based Signcryption without RandomOracles2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: 2(3) Pages: 199-211

    • NAID

      120004664487

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Constant-Ciphertext-Size Dual Policy Attribute Based Encryption2012

    • Author(s)
      Atsuko Miyaji and Phuong V.X. TRAN
    • Journal Title

      The 11th International Conference on Cryptology and Network Security, CSS 2012, Springer-Verlag

      Volume: 7672 Pages: 400-413

    • NAID

      120005147912

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 初期差分を用いたRC4 PRGAの解析2012

    • Author(s)
      市丸 祐, 宮地 充子
    • Journal Title

      The 2012 Symposium on Cryptography and Information Security

      Volume: SCIS2012- 2C1-3

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Novel Hybrid IP Traceback Scheme with Packet Counters2012

    • Author(s)
      Tomoyuki Karasawa, Masakazu Soshi and Atsuko Miyaji
    • Journal Title

      The 5th International Conference on Internet and Dsitributed Computing Systems, IDCS 2012,Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7646 Pages: 71-84

    • NAID

      120005147911

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 14th International Conference on Information Security and Cryptology, ICISC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7259 Pages: 186-203

    • NAID

      120004462279

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Secure and private RFID authentication protocol under SLPN problem2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 6th International Conference on Network and System Security , NSS 2012, Springer-Verlag

      Volume: 7645 Pages: 476-489

    • NAID

      120005147914

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Dynamic Attribute-based Signcryption without RandomOracles2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: 2(3) Pages: 199-211

    • NAID

      120004664487

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack2012

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E95-A(12) Pages: 2148-2159

    • NAID

      10031161346

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] How to Enhance the Security on the Least Significant Bit2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      The 4th International Symposium on Cyberspace Safety and Security , CANS 2012, Springer-Verlag

      Volume: 7712 Pages: 263-279

    • NAID

      120005147913

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs2012

    • Author(s)
      Tatsuro Iida, Keita Emura, Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      The 8th International Workshop on Heterogeneous Wireless Networks (AINA 2012 Workshops), HWISE 2012, IEEE

      Volume: - Pages: 552-557

    • NAID

      120007005471

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Secure and private RFID authentication protocol under SLPN problem2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 6th International Conference on Network and System Security , NSS 2012, Springer-Verlag

      Volume: 7645 Pages: 476-489

    • NAID

      120005147914

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks2012

    • Author(s)
      Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 8th International Conference on Information Security Practice and Experience, ISPEC 2012, Lecture Notes in Computer Science

      Volume: 7232 Pages: 245-258

    • NAID

      120004247387

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Improved Left-to-Right Scalar Multiplication Algorithms2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2012 (2012-3) Pages: 141-148

    • NAID

      110009545770

    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack2012

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E95-A(12) Pages: 2148-2159

    • NAID

      10031161346

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Privacy-preserving Set Operations in the Presence of Rational Parties2012

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 5th International Symposium on Mining and Web (AINA 2012 Workshops), MAW 2012, IEEE

      Volume: - Pages: 869-874

    • NAID

      120007005472

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Novel Hybrid IP Traceback Scheme with Packet Counters2012

    • Author(s)
      Tomoyuki Karasawa, Masakazu Soshi and Atsuko Miyaji
    • Journal Title

      The 5th International Conference on Internet and Dsitributed Computing Systems, IDCS 2012,Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7646 Pages: 71-84

    • NAID

      120005147911

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Journal Article] A Timed-Release Proxy Re-Encryption Scheme2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      IEICE Trans., Fundamentals.

      Volume: E94-A Pages: 1682-1695

    • NAID

      10030190459

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Ideal Secret Sharing Schemes with Share Selectability2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, and Masakazu Soshi
    • Journal Title

      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7043 Pages: 143-157

    • NAID

      120003752195

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] HC-128の内部状態非独立性について2011

    • Author(s)
      陳嘉耕, 柿脇一穂, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3B1-2

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] An Optimized Right-to-Left Scalar Mutiplication Algorithm Resistant Against Safe-Error Attack, SPA and DPA2011

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2011 (2011-11) Pages: 109-114

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] New Concrete Relation between Trace, Definition Field, and Embedding Degree2011

    • Author(s)
      Shoujirou Hirasawa and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals.

      Volume: E94-A Pages: 1368-1374

    • NAID

      10029802473

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] Redesigning Group Key Exchange Protocol based on Bilinear Pairing2011

    • Author(s)
      Yvo Desmedt, Atsuko Miyaji
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3F4-3

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] ARMを利用した楕円曲線暗号の効率的な実装2011

    • Author(s)
      永田智芳, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3D2-2

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Privacy-Preserving Data Mining : A Game-theoretic Approach2011

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSEC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6818 Pages: 186-200

    • NAID

      120003184342

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] ワイヤレスセンサネットワークにおけるMicaZを用いたデータアグリゲーション実装の検討2011

    • Author(s)
      伊澤和也, 面和成, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Unconditionally Secure Oblivious Transfer Based on Channel Delays2011

    • Author(s)
      Kai-Yuen Cheong and Atsuko Miyaji
    • Journal Title

      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7043 Pages: 112-120

    • NAID

      120003752198

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] カウンタを用いたIPトレースバック方式の評価2011

    • Author(s)
      唐沢智之, 双紙正和, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52 Pages: 7-7

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] An Optimized Right-to-Left Scalar Mutiplication Algorithm Resistant Against Safe-Error Attack, SPA and DPA2011

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2011 (2011-11) Pages: 109-114

    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] 実用的な耐故障性を実現する効率的なグループ鍵共有法2011

    • Author(s)
      佐藤高嗣, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3F4-4

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments2011

    • Author(s)
      Yvo Desmedt, Atsuko Miyaji
    • Journal Title

      The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science

      Volume: 6584 Pages: 236-254

    • NAID

      120003752191

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks2011

    • Author(s)
      Tatsuro Iida, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6976 Pages: 253-267

    • NAID

      120003752197

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Sequential Bitwise Sanitizable Signature Schemes2011

    • Author(s)
      G. Hanaoka, S. Hirose, A. Miyaji, K. Miyazaki, B. Santoso, P. Yang
    • Journal Title

      IEICE Trans., Fundamentals E94-A

      Pages: 392-404

    • NAID

      10027987169

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Sequential Bitwise Sanitizable Signature Schemes2011

    • Author(s)
      Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E94-A Pages: 392-404

    • NAID

      10027987169

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] How to Find Short RC4 Colliding Key Pairs2011

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science

      Volume: 7001 Pages: 32-46

    • DOI

      10.1007/978-3-642-24861-0_3

    • NAID

      120003752194

    • ISBN
      9783642248603, 9783642248610
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] HC-128の内部状態非独立性について2011

    • Author(s)
      陳嘉耕, 柿脇一穂, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3B1-2

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 耐故障性を持つグループ鍵共有法の性能評価2011

    • Author(s)
      佐藤高嗣, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 167-175

    • NAID

      110008689692

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] New Concrete Relation between Trace, Definition Field, and Embedding Degree2011

    • Author(s)
      Shoujirou Hirasawa and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals.

      Volume: E94-A Pages: 1368-1374

    • NAID

      10029802473

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7001 Pages: 102-118

    • NAID

      120003752193

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] T-Robust Group Key Exchange Protocol with O(log n) complexity2011

    • Author(s)
      Tetsuya Hatano, Atsuko Miyaji, and Takashi Sato
    • Journal Title

      The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6812 Pages: 289-207

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 差分情報を利用したRC4 PRGA内部状態復元アルゴリズムの改良2011

    • Author(s)
      柿脇一穂, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 57-64

    • NAID

      110008689674

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] 匿名IDベース暗号を用いたセキュアチャネルフリー検索可能公開鍵暗号方式の一般的構成法2011

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-4C2-6

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] メモリを考慮した事前計算点生成手法の提案2011

    • Author(s)
      笹原大揮, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 159-166

    • NAID

      110008689691

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Non-interactive Opening for Ciphertexts Encrypted by Shared Keys2011

    • Author(s)
      Jiageng Chen, Keita Emura, and Atsuko Miyaji
    • Journal Title

      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7043 Pages: 57-68

    • NAID

      120003752196

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 汚染攻撃に耐性を持つXORネットワーク符号化の比較・評価2011

    • Author(s)
      伊澤 和也, 宮地 充子, 面 和成
    • Journal Title

      Computer Security Symposium

      Volume: CSS2011-2B4-4 Pages: 498-503

    • NAID

      170000067525

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 実用的な耐故障性を実現する効率的なグループ鍵共有法2011

    • Author(s)
      佐藤高嗣, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3F4-4

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] ワイヤレスセンサネットワークにおける自己治癒機能を有する鍵共有方式の検討2011

    • Author(s)
      飯田達朗, 面和成, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52 Pages: 31-31

    • NAID

      110008583565

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] ワイヤレスセンサネットワークにおける自己治癒機能を有する鍵共有方式の検討2011

    • Author(s)
      飯田達朗, 面和成, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52

    • NAID

      110008583565

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Toward Dynamic Attribute-Based Signcryption (Poster)2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6812 Pages: 439-443

    • NAID

      120003184343

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] How to Find Short RC4 Colliding Key Pairs2011

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7001 Pages: 32-46

    • NAID

      120003752194

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 差分情報を利用したRC4 PRGA内部状態復元アルゴリズムの改良2011

    • Author(s)
      柿脇一穂, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 57-64

    • NAID

      110008689674

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Scalar Multiplication on Weierstrass Elliptic Curves from Co-Z Arithmetic2011

    • Author(s)
      Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, andAlexandre Venelli
    • Journal Title

      Journal of Cryptographic Engineering (2011),Springer-Verlag

      Volume: Vol. 1 Pages: 161-176

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Efficient Privacy Preserving Set Operations2011

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2011 (2011-11) Pages: 115-122

    • NAID

      10031099403

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] ワイヤレスセンサネットワークにおけるMicaZを用いたデータアグリゲーション実装の検討2011

    • Author(s)
      伊澤和也, 面和成, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52 Pages: 32-32

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Efficient and Low-Cost RFID Authentication Schemes2011

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman, and Masakazu Soshi
    • Journal Title

      Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)

      Volume: Vol. 2 Pages: 4-25

    • NAID

      120003367901

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments2011

    • Author(s)
      Yvo Desmedt, Atsuko Miyaji
    • Journal Title

      The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science

      Volume: 6584 Pages: 236-254

    • NAID

      120003752191

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] メモリを考慮した事前計算点生成手法の提案2011

    • Author(s)
      笹原大揮, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 159-166

    • NAID

      110008689691

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] カウンタを用いたIPトレースバック方式の評価2011

    • Author(s)
      唐沢智之, 双紙正和, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] ARMを利用した楕円曲線暗号の効率的な実装2011

    • Author(s)
      永田智芳, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3D2-2

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Redesigning Group Key Exchange Protocol based on Bilinear Pairing2011

    • Author(s)
      Yvo Desmedt, Atsuko Miyaji
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3F4-3

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Toward Dynamic Attribute-Based Signcryption2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6812(Poster) Pages: 439-443

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] New Concrete Relation between Trace, Definition Field, and Embedding Degree2011

    • Author(s)
      Shoujirou Hirasawa, Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E94-A Pages: 1368-1374

    • NAID

      10029802473

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Scalar Multiplication on Weierstrass Elliptic Curves from Co-Z Arithmetic2011

    • Author(s)
      Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, andAlexandre Venelli
    • Journal Title

      Journal of Cryptographic Engineering (2011),Springer-Verlag

      Volume: Vol.1 Pages: 161-176

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Journal Article] 耐故障性を持つグループ鍵共有法の性能評価2011

    • Author(s)
      佐藤高嗣, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 167-175

    • NAID

      110008689692

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] KIMAP: Key-Insulated Mutual Authentication Protocol for RFID2011

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Automated Identification Technology (IJAIT)

      Volume: Vol. 3(2) Pages: 61-74

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 匿名IDベース暗号を用いたセキュアチャネルフリー検索可能公開鍵暗号方式の一般的構成法2011

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-4C2-6

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] How to Find Short RC4 Colliding Key Pairs, The 14th Information Security Conference2011

    • Author(s)
      J. Chen, A. Miyaji
    • Journal Title

      Lecture Notes in Computer Science

      Volume: vol.7001 Pages: 32-46

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Scalar Multiplication on Weierstrass Elliptic Curves from Co-Z Arithmetic2011

    • Author(s)
      Raveen R.Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, Alexandre Venelli
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: Vol.1 Pages: 161-176

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Privacy-Preserving Data Mining: A Game-theoretic Approach2011

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSEC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6818 Pages: 186-200

    • NAID

      120003184342

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Sequential Bitwise Sanitizable Signature Schemes2011

    • Author(s)
      Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E94-A Pages: 392-404

    • NAID

      10027987169

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: Vol.2 Pages: 46-59

    • NAID

      120002260310

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] RPOK : A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks2010

    • Author(s)
      Hisashige Ito, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010

      Pages: 1-5

    • NAID

      120006674763

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 削除機能付き匿名検証者指定署名とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ICSS2010-47 Pages: 17-22

    • NAID

      110008152383

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6513 Pages: 135-149

    • NAID

      120003184340

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Secure Data Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1D2-4 Pages: 177-182

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Hidden credential retrieval without random oracles, The 11th International Workshop on Information Security Applications (WISA 2010)2010

    • Author(s)
      A.Miyaji, M.Rahman, M.Soshi
    • Journal Title

      Lecture Notes in Computer Science vol.6513

      Pages: 160-174

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Co-Z Addition Formulae and Binary Ladders on Elliptic Curves2010

    • Author(s)
      Raveen Ravinesh Goundar, Marc Joye, Atsuko Miyaji
    • Journal Title

      The 12th Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6225 Pages: 65-79

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 差分情報を利用したRC4 PRGA内部状態復元アルゴリズムの提案2010

    • Author(s)
      柿脇一穂, 宮地充子
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1B1-2 Pages: 31-36

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 新しい加法公式に基づく効率的な予備計算手法について2010

    • Author(s)
      笹原大揮, 宮地充子, 横川広幸
    • Journal Title

      The 2010 Symposium on Cryptography and Information Security

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Privacy-Preserving Data Mining in Presence of Covert Adversaries2010

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6440 Pages: 370-382

    • NAID

      120002737939

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] 新しい加法公式に基づく効率的なスカラー倍算について2010

    • Author(s)
      横川広幸, 宮地充子, 笹原大揮
    • Journal Title

      The 2010 Symposium on Cryptography and Information Security SCIS2010

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science

      Volume: (掲載確定)

    • NAID

      120003752190

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences2010

    • Author(s)
      Atsuko Miyaji, Masahiro Sukegawa
    • Journal Title

      IEICE Trans., Fundamentals.

      Volume: E93-A Pages: 1066-1077

    • NAID

      10026864635

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A New Class of RC4 Colliding Key Pair2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      The 2010 Symposium on Cryptography and Information Security SCIS2010

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Efficient Privacy-Preserving Data Mining in Malicious Model2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6440 Pages: 429-440

    • NAID

      120002737938

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Generalized RC4 Key Collisions and Hash Collisions2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      The 7th Conference on Security and Cryptography for Networks(SCN 2010), Lecture Notes in Computer Science

      Volume: 6280 Pages: 73-87

    • NAID

      120002753787

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Hidden Credential Retrieval Without Random Oracles2010

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi
    • Journal Title

      The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6513 Pages: 160-174

    • NAID

      120003184341

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences2010

    • Author(s)
      Atsuko Miyaji, Masahiro Sukegawa
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E93-A Pages: 1066-1077

    • NAID

      10026864635

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Co-Z Addition Formulae and Binary Ladders on Elliptic Curves2010

    • Author(s)
      Raveen Ravinesh Goundar, Marc Joye, Atsuko Miyaji
    • Journal Title

      The 12th Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6225 Pages: 65-79

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 7th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2010, Lecture Notes in Computer Science

      Volume: (掲載確定)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 6th Information Security Practice and Experience Conference, ISPEC 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6047 Pages: 30-44

    • NAID

      120002260312

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Secure Data Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1D2-4 Pages: 177-182

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Hidden Credential Retrieval Without Random Oracles2010

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi
    • Journal Title

      The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6513 Pages: 160-174

    • NAID

      120003184341

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Generalized RC4 Key Collisions and Hash Collisions, The 7th Conference on Security and Cryptography for Networks (SCN 2010)2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      Lecture Notes in Computer Science vol.6280

      Pages: 73-87

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] A New Class ofRC4 Colliding Key Pairs With Greater Hamming Distance, The 6th Information Security Practice and Experience Conference (ISPEC 2010)2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      Lecture Notes in Computer Science vol.6047

      Pages: 30-44

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 6th Information Security Practice and Experience Conference, ISPEC 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6047 Pages: 30-44

    • NAID

      120002260312

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 削除機能付き匿名検証者指定署名とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ICSS2010-47 Pages: 17-22

    • NAID

      110008152383

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      The 6th Information Security Practice and Experience Conference(ISPEC 2010), Lecture Notes in Computer Science

      Volume: 6047 Pages: 30-44

    • NAID

      120002260312

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] 差分情報を利用したRC4 PRGA内部状態復元アルゴリズムの提案2010

    • Author(s)
      柿脇一穂, 宮地充子
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1B1-2 Pages: 31-36

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] An Anonymous Designated Veririer Signature Scheme With Revocation : How to Protect a Company's Reputation2010

    • Author(s)
      Keito Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6402 Pages: 184-198

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] 新しい加法公式に基づく効率的なスカラー倍算について2010

    • Author(s)
      横川広幸, 宮地充子, 笹原大揮
    • Journal Title

      The 2010 Symposium on Cryptography and Information Security

      Volume: SCIS2010, 2D4-3

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: Vol.2 Pages: 46-59

    • NAID

      120002260310

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences, IEICE Trans.2010

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Journal Title

      Fundamentals vol.E93-A

      Pages: 1066-1077

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] 新しい加法公式に基づく効率的な予備計算手法について2010

    • Author(s)
      笹原大揮, 宮地充子, 横川広幸
    • Journal Title

      The 2010 Symposium on Cryptography and Information Security

      Volume: SCIS2010, 2D4-4

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 効率的な3倍算公式を用いたスカラー倍算手法の提案2010

    • Author(s)
      笹原大揮, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2010-CSEC-51

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 効率的な3倍算公式を用いたスカラー倍算手法の提案2010

    • Author(s)
      笹原大揮, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2010-CSEC-51 Pages: 10-10

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] マルチフェーズワイヤレスセンサネットワークにおける効率的かつセキュアな鍵共有方式2010

    • Author(s)
      飯田達朗, 宮地充子, 面和成
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1D2-3 Pages: 183-188

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Hidden credential retrieval without random oracles, The 11th International Workshop on Information Security Applications(WISA 2010)2010

    • Author(s)
      A. Miyaji, M. Rahman, M. Soshi
    • Journal Title

      Lecture Notes in Computer Science

      Volume: vol.6513 Pages: 160-174

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6402 Pages: 200-213

    • NAID

      120002710165

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 時限式プロキシ再暗号化方式とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ICSS2010-48 Pages: 23-28

    • NAID

      110008152384

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Cipher-text-Policy Attribute-Based Encryp-tion Scheme with Constant Ciphertext Length2010

    • Author(s)
      K. Emura, A. Miyaji, A. Nomura, K. Omote, M. Soshi
    • Journal Title

      IJACT 2

      Pages: 46-59

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A New Class of RC4 Colliding Key Pair2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      The 2010 Symposium on Cryptography and Information Security

      Volume: SCIS2010, 3D2-4

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6513 Pages: 135-149

    • NAID

      120003184340

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] RPoK : A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks2010

    • Author(s)
      Hisashige Ito, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010

      Pages: 1-5

    • NAID

      120006674763

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Efficient Privacy-Preserving Data Mining in Malicious Model2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6440 Pages: 429-440

    • NAID

      120002737938

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 7th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2010, Lecture Notes in Computer Science

      Volume: (掲載確定)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science

      Volume: (掲載確定)

    • NAID

      120003752190

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance, The 6th Information Security Practice and Experience Conference(ISPEC 2010)2010

    • Author(s)
      J. Chen and A. Miyaji
    • Journal Title

      Lecture Notes in Computer Science

      Volume: vol.6047 Pages: 30-44

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences2010

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E93-A Pages: 1066-1077

    • NAID

      10026864635

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Generalized RC4 Key Collisions and Hash Collisions2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 7th Conference on Security and Cryptography for Networks, SCN 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6280 Pages: 73-87

    • NAID

      120002753787

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] マルチフェーズワイヤレスセンサネットワークにおける効率的かつセキュアな鍵共有方式2010

    • Author(s)
      飯田達朗, 宮地充子, 面和成
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1D2-3 Pages: 183-188

    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences2010

    • Author(s)
      A. Miyaji and M. Sukegawa
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: vol.E93-A Pages: 1066-1077

    • NAID

      10026864635

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] 時限式プロキシ再暗号化方式とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ICSS2010-48 Pages: 23-28

    • NAID

      110008152384

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Generalized RC4 Key Collisions and Hash Collisions2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 7th Conference on Security and Cryptography for Networks, SCN 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6280 Pages: 73-87

    • NAID

      120002753787

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Hidden credential retrieval without random oracles2010

    • Author(s)
      A.Miyaji, M.Rahman, M.Sochi
    • Journal Title

      The 11th International Workshop on Information Security Applications(WISA 2010), Lecture Notes in Computer Science

      Volume: 6513 Pages: 160-174

    • NAID

      120003184341

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences2010

    • Author(s)
      A. Miyaji, M. Sukegawa,
    • Journal Title

      IEICE Trans., Fundamentals E93-A

      Pages: 1066-1077

    • NAID

      10026864635

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] An Anonymous Designated Verifier Signature Scheme with Revocation : How to Protect a Company's Reputation2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6402 Pages: 184-198

    • NAID

      120002710166

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6402 Pages: 200-213

    • NAID

      120002710165

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Privacy-Preserving Data Mining in Presence of Covert Adversaries2010

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6440 Pages: 370-382

    • NAID

      120002737939

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 埋め込み次数を事前に決定できる楕円曲線の改良2009

    • Author(s)
      平澤 庄次郎, 宮地 充子
    • Journal Title

      IEICE Japan Tech. Rep. ISEC2008-137

      Pages: 223-229

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier2009

    • Author(s)
      K. Eniura, A. Miyaji, K. Omote
    • Journal Title

      The First International Workshop on Recent Innovations and Breakthroughs in Cryptography RIBC 2009

      Pages: 769-773

    • NAID

      120006674343

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Secure RFID Authentication Protocol with Low Communication Cost2009

    • Author(s)
      A.Miyaji, M.S.Rahman, M.Soshi
    • Journal Title

      The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing IMIS 2009

      Pages: 559-564

    • NAID

      120006674344

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      S.Hirasawa, A.Miyaji
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory, ISIT 2009

      Pages: 2391-2395

    • NAID

      110007324412

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 擬似等価鍵を用いたRC4 PRGA の内部状態の状態遷移解析(1)2009

    • Author(s)
      助川昌泰, 宮地充子
    • Journal Title

      電子情報通信学会技術研究報告 108

      Pages: 231-237

    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      S. Hirasawa, A. Miyaji
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory

      Pages: 2391-2395

    • NAID

      110007324412

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] A Secure RFID Authentication Protocol with Low Communication Cost2009

    • Author(s)
      A. Miyaji, M. S. Rahman, M. Soshi
    • Journal Title

      The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing IMIS 2009

      Pages: 559-564

    • NAID

      120006674344

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] 擬似等価鍵を用いた RC4 PRGA の内部状態の状態遷移解析(2)2009

    • Author(s)
      網代充希, 宮地充子
    • Journal Title

      EICE Japan Tech.Rep. ISEC2008-137

      Pages: 239-244

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      宮地充子, 助川昌泰
    • Journal Title

      ACISP 2009, Lecture Notes in Computer Science, (2009) 5594, Springer-Verlag

      Pages: 134-152

    • NAID

      120002260315

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] A Dynamic Attribute-Based Group Sig-nature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      IPSJ Journal 50

      Pages: 1968-1983

    • NAID

      120006674342

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Secure RFID Authentication Protocol with Low Communication Cost2009

    • Author(s)
      M.S. Rahman, M. Soshi, A. Miyaji
    • Journal Title

      The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing

      Pages: 559-564

    • NAID

      120006674344

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] A Secure RFID Authentication Protocol with Low Communication Cost2009

    • Author(s)
      M. S. Rahman, M. Soshi, A. Miyaji
    • Journal Title

      The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing IMIS 2009

      Pages: 559-564

    • NAID

      120006674344

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Secure RFID Authentication Protocol with Low Communication Cost2009

    • Author(s)
      A. Miyaji, M. S. Rahman, M. Soshi
    • Journal Title

      The 3rd International Workshop on Intelligent, Mobile and Internet Services in Ubiquitous Computing

      Pages: 559-564

    • NAID

      120006674344

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      S.Hirasawa, A.Miyaji
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory, ISIT 2009

      Pages: 2391-2395

    • NAID

      110007324412

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      Proceedings of 4th International Workshop on Security, IWSEC 2009-Short Papers-, Co-organized byIEICE and IPSJ

      Pages: 49-63

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Journal Title

      Lecture Notes in Computer Science, ACISP 2009 5594

      Pages: 134-152

    • NAID

      120002260315

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] マルチフェーズワイヤレスセンサネットワークにおける効率的な鍵事前配布方式2009

    • Author(s)
      伊藤久繁, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ISEC2009-66 Pages: 101-106

    • NAID

      110007504898

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 木構造を用いた鍵管理プロトコルについて2009

    • Author(s)
      宮地充子, 吉田勝彦
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2009-CSEC-45

    • NAID

      10026676728

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      IPSJ Journal Vol.50

      Pages: 1968-1983

    • NAID

      120006674342

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Journal Title

      ACISP 2009, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 5594 Pages: 134-152

    • NAID

      120002260315

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 擬似等価鍵を用いた RC4 PRGA の内部状態の状態遷移解析(1)2009

    • Author(s)
      助川昌泰, 宮地充子
    • Journal Title

      EICE Japan Tech.Rep. ISEC2008-137

      Pages: 231-237

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      K.Emura, A.Miyaji, A.Nomura, K.Omote, M.Soshi
    • Journal Title

      The 5th Information Security Practice and Experience Conference, ISPEC 2009, Lecture Notes in Computer Science, Springer-Verlag 5451

      Pages: 13-23

    • NAID

      120002260310

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      The First International Workshop on Recent Innovations and Breakthroughs in Cryptography RIBC 2009

      Pages: 769-773

    • NAID

      120006674343

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      Proceedings of 4th International Workshop on Security, IWSEC 2009 -Short Papers-, Co-organized by IEICE and IPSJ

      Pages: 49-63

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      平澤庄次郎, 宮地充子
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory ISIT2009

      Pages: 2391-2395

    • NAID

      110007324412

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 擬似等価鍵を用いたRC4 PRGAの内部状態の状態遷移解析(2)2009

    • Author(s)
      網代充希, 宮地充子
    • Journal Title

      電子情報通信学会技術研究報告 108

      Pages: 239-244

    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Journal Title

      ACISP 2009, Lecture Notes in Computer Science, Springer-Verlag 5594

      Pages: 134-152

    • NAID

      120002260315

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      M. Miyaji, K. Emura, A. Nomura, K. Omote, M. Soshi
    • Journal Title

      ISPEC 2009, Lecture Notes in Computer Science 5451, Springer-Verlag

      Pages: 13-23

    • NAID

      120002260310

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Selectable k-Times Relaxed Anonymous Authentication Scheme2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      The 10th International Workshop on Information Security Applications, WISA 2009, Lecture Notes in Computer Science, Springer-Verlag 5932

      Pages: 281-295

    • NAID

      120002260313

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      IPSJ Journal

      Volume: Vol.50 Pages: 1968-1983

    • NAID

      120006674342

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] Authenticating RFID Tags using Insulated Keys2009

    • Author(s)
      M.S.Rahman, A.Miyaji
    • Journal Title

      IEICE Japan Tech.Rep. ICSS2009-59

      Pages: 31-36

    • NAID

      110007520922

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      The Forth International Conference on Avail ability, Reliability and Security

      Pages: 487-492

    • NAID

      120006674342

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A. Miyaji, M. Sukegawa
    • Journal Title

      ACISP 2009, Lecture Notes in Computer Science, (2009) (to appear)

    • NAID

      120002260315

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      Proceedings of 4th International Workshop on Security, IWSEC 2009-Short Papers-, Co-organized by IEICE and IPSJ

      Pages: 49-63

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] 木構造を用いた鍵管理プロトコルについて2009

    • Author(s)
      宮地充子, 吉田勝彦
    • Journal Title

      IPSJ SIG Tech.Rep. 2009-CSEC-45

    • NAID

      10026676728

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Authenticating RFID Tags using Insulated Keys2009

    • Author(s)
      M.S.Rahman, A.Miyaji
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ICSS2009-59 Pages: 31-36

    • NAID

      110007520922

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      K.Emura, A.Miyaji, A.Nomura, K.Omote, M.Soshi
    • Journal Title

      The 5th Information Security Practice and Experience Conference, ISPEC 2009, Lecture Notes in Computer Science, Springer-Verlag 5451

      Pages: 13-23

    • NAID

      120002260310

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Pairing-based Group Key Exchange with an Edge-based Tree2009

    • Author(s)
      A.Miyaji, Y.Desmedt
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ISEC2009-11 Pages: 69-76

    • NAID

      110007161986

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 擬似等価鍵を用いたRC4 PRGAの内部状態の状態遷移解析(2)2009

    • Author(s)
      網代 充希, 宮地 充子
    • Journal Title

      EICE Japan Tech. Rep. ISEC2008-137

      Pages: 239-244

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] 効率的な耐故障性をもつ鍵共有方式2009

    • Author(s)
      波多野哲也, 宮地充子
    • Journal Title

      Computer Security Symposium CSS2009-B8-3

      Pages: 817-822

    • NAID

      170000065973

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      宮地充子, 横川広幸
    • Journal Title

      ACISP 2009, Lecture Notes in Computer Science, Springer-Verlag 5594

      Pages: 134-152

    • NAID

      120002260315

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Selectable k-Times Relaxed Anonymous Authentication Scheme2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      The 10th International Workshop on Information Security Applications, WISA 2009, Lecture Notes in Computer Science, Springer-Verlag 5932

      Pages: 281-295

    • NAID

      120002260313

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Pairing-based Group Key Exchange with an Edge-based Tree2009

    • Author(s)
      A.Miyaji, Y.Desmedt
    • Journal Title

      IEICE Japan Tech.Rep. ISEC2009-11

      Pages: 69-76

    • NAID

      110007161986

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] 効率的な耐故障性をもつ鍵共有方式2009

    • Author(s)
      波多野哲也, 宮地充子
    • Journal Title

      Computer Security Symposium

      Volume: CSS2009-B8-3 Pages: 817-822

    • NAID

      170000065973

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      K.Emura, M.Miyaji, A.Nomura, K.Omote, M.Soshi
    • Journal Title

      ISPEC 2009, Lecture Notes in Computer Science 5451, Springer-Verlag

      Pages: 13-23

    • NAID

      120002260310

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      K. Emura, A. Miyaji, A. Nomura, K. Omote, M. Soshi
    • Journal Title

      Lecture Notes in Computer Science 5451

      Pages: 13-23

    • NAID

      120002260310

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 差分を持つ内部状態を用いたRC4 PRGAの内部状態の解読2009

    • Author(s)
      網代充希, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ISEC2009-65 Pages: 95-100

    • NAID

      110007504897

    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences, ACISP 20092009

    • Author(s)
      A. Miyaji and M. Sukegawa
    • Journal Title

      Lecture Notes in Computer Science

      Volume: vol.5594 Pages: 134-152

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute statistics2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      The Forth International Conference on Availability, Reliability and Security (AReS 2009)

      Pages: 487-492

    • NAID

      120006674342

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Selectable k-Times Relaxed Anonymous Authentication Scheme2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      The 10th International Workshop on Information Security Applications, WISA 2009, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 5932 Pages: 281-295

    • NAID

      120002260313

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 埋め込み次数を事前に決定できる楕円曲線の改良2009

    • Author(s)
      平澤庄次郎, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep. ISEC2008-137

      Pages: 223-229

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      K. Emura, M. Miyaji, A. Nomura, K. Omote, M. Soshi
    • Journal Title

      ISPEC 2009, Lecture Notes in Computer Science 5451, Springer-Verlag

      Pages: 13-23

    • NAID

      120002260310

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] NAFと complementary recoding を用いた楕円曲線のスカラー倍算について2009

    • Author(s)
      横川広幸, 宮地充子
    • Journal Title

      The 2009 Symposium on Cryptography and Information Security SCIS2009

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      K.Emura, A.Miyaji, A.Nomura, K.Omote, M.Soshi
    • Journal Title

      The 5th Information Security Practice and Experience Conference, ISPEC 2009, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 5451 Pages: 13-23

    • NAID

      120002260310

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Journal Article] 差分を持つ内部状態を用いたRC4 PRGAの内部状態の解読2009

    • Author(s)
      網代充希, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep. ISEC2009-65

      Pages: 95-100

    • NAID

      110007504897

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      The Forth International Conference on Availability, Reliability and Security AReS 2009

      Pages: 487-492

    • NAID

      120006674342

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      S. Hirasawa, M. Miyaji
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory (to appear)

    • NAID

      110007324412

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      S.Hirasawa, A.Miyaji
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory, ISIT 2009

      Pages: 2391-2395

    • NAID

      110007324412

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] マルチフェーズワイヤレスセンサネットワークにおける効率的な鍵事前配布方式2009

    • Author(s)
      伊藤久繁, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep. ISEC2009-66

      Pages: 101-106

    • NAID

      110007504898

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      The Forth International Conference on Availability, Reliability and Security AReS 2009

      Pages: 487-492

    • NAID

      120006674342

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier2009

    • Author(s)
      K. Emura, A. Miyaji, K. Omote
    • Journal Title

      The First International Workshop on Recent Innovations and Breakthroughs in Cryptography

      Pages: 769-773

    • NAID

      120006674343

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A. Miyaji, M. Sukegawa
    • Journal Title

      ACISP 2009, Lecture Notes in Computer Science 5594

      Pages: 134-152

    • NAID

      120002260315

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 擬似等価鍵を用いたRC4 PRGAの内部状態の状態遷移解析(1)2009

    • Author(s)
      助川 昌泰, 宮地 充子
    • Journal Title

      EICE Japan Tech. Rep. ISEC2008-137

      Pages: 231-237

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] NAFとcomplementary recodingを用いた楕円曲線のスカラー倍算について2009

    • Author(s)
      宮地 充子, 横川 広幸
    • Journal Title

      he 2009 Symposium on Cryptography and Information Security SCIS2009

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      The First International Workshop on Recent Innovations and Breakthroughs in Cryptography RIBC 2009

      Pages: 769-773

    • NAID

      120006674343

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      M. Miyaji, S. Hirasawa
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory (to appear)

      Pages: 277-282

    • NAID

      110007324412

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      IPSJ Journal Vol.50

      Pages: 1968-1983

    • NAID

      120006674342

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] 埋め込み次数を事前に決定できる楕円曲線2008

    • Author(s)
      平澤庄次郎, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep ISEC2008-82

      Pages: 63-66

    • NAID

      110007324412

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA2008

    • Author(s)
      宮地充子
    • Journal Title

      IEICE Trans., Fundamentals vol.E91-A, No.10

      Pages: 2833-2842

    • NAID

      10026852444

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 差分を用いたRC4PRAGAにおける内部状態の状態遷移解析2008

    • Author(s)
      助川昌泰, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep. ISEC2008-83

      Pages: 67-72

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 強存在的偽造不可能な署名スキームの一般的構成法2008

    • Author(s)
      菅野康治, 宮地充子
    • Journal Title

      Computer Security Symposium CSS2007-4B-1

      Pages: 289-293

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Simple Certificateless Signature with Smart Cards2008

    • Author(s)
      A. Miyaji, K. Omote, K. Kato
    • Journal Title

      International Workshop on Security in Ubiquitous Computing Systems

    • NAID

      120006674349

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 属性ベースグループ署名と匿名統計調査への応用2008

    • Author(s)
      江村恵太, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep. ISEC2008-10

      Pages: 61-68

    • NAID

      110006827354

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Simple Certificateless Signature with Smart Cards2008

    • Author(s)
      K. Kato, A. Miyaji, K. Omote
    • Journal Title

      International Workshop on Security in Ubiquitous Computing Systems SECUBIQ'08

    • NAID

      120006674349

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] カウンタを用いたIPトレースバック方式の検討2008

    • Author(s)
      唐沢智之, 双紙正和, 宮地充子
    • Journal Title

      Computer Security Symposium CSS2007-6C-1

      Pages: 453-458

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair2008

    • Author(s)
      A.Miyaji, M.Soshi, T.Takagi, A.Waseda
    • Journal Title

      The 2008 International Symposium on Information Theory and its Applications Proceedings of ISITA 2008

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Revisited(Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point2008

    • Author(s)
      A.Miyaji, K.Mizosoe
    • Journal Title

      IPSJ Trans. vol.49, No.9

      Pages: 2975-2988

    • NAID

      130002073193

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] RC4の擬似乱数生成部における新しい脆弱性(1)2008

    • Author(s)
      今屋 雄太, 助川 昌泰, 宮地 充子
    • Journal Title

      The 2008 Symposium on Cryptography and Information Security SCIS2008

    • NAID

      110006885282

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Security and Access Control for Vehicular Communications Networking and Communications2008

    • Author(s)
      A. Miyaji, S. Zrelli, Y. Shinoda, T. Ernst
    • Journal Title

      IEEE International Conference on Wireless and Mobile Computing

      Pages: 561-566

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 量子紛失通信に関する検討2008

    • Author(s)
      早稲田篤志, 高木孝幸, 双紙正和, 宮地充子
    • Journal Title

      IEICE Japan Tech. Rep ISEC2007-10(2007-05)

      Pages: 65-68

    • NAID

      110006292271

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] 異なるグループ間における量子秘密分散法の検討2008

    • Author(s)
      早稲田 篤志, 高木 孝幸, 双紙 正和, 宮地 充子
    • Journal Title

      The 2008 Symposium on Cryptography and Information Security SCIS2008

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Sign Change Faultsに対して耐性を持つ新しいスカラー倍算2008

    • Author(s)
      亀井利明, 宮地充子
    • Journal Title

      Society of Information Theory and its Applic ations SITA2007

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Revisited (Hyper)-Elliptic Curve Scalar Mul-tiplication with a Fixed Point2008

    • Author(s)
      A. Miyaji, K. Mizosoe
    • Journal Title

      IPSJ Journal 49, 9

      Pages: 2975-2988

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] 埋め込み次数を事前に決定できる楕円曲線2008

    • Author(s)
      平澤 庄次郎, 宮地 充子
    • Journal Title

      IEICE Japan Tech. Rep ISEC2008-82

      Pages: 63-66

    • NAID

      110007324412

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Simple Certificateless Signature with Smart Cards2008

    • Author(s)
      K.Kato, A.Miyaji, K.Omote
    • Journal Title

      International Workshop on Security in Ubiquitous Computing Systems SECUBIQ'08

    • NAID

      120006674349

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Efficient ID-Based Signature without Random Oracle2008

    • Author(s)
      J. Chen, A. Miyaji
    • Journal Title

      IEICE Japan Tech. Rep ISEC2007-8(2007-05)

      Pages: 53-56

    • NAID

      110006292269

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Security and Access Control for Vehicular Communications Networking and Communications2008

    • Author(s)
      T.Ernst, A.Miyaji, Y.Shinoda, S.Zrelli
    • Journal Title

      IEEE International Conference on Wireless and Mobile Computing WIMOB '08

      Pages: 561-566

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point2008

    • Author(s)
      A. Miyaji, K. Mizosoe
    • Journal Title

      IPSJ Trans vol. 49, No. 9

      Pages: 2975-2988

    • NAID

      130002073193

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] RC4の擬似乱数生成部における新しい脆弱性(1)2008

    • Author(s)
      今屋雄太, 助川昌泰, 宮地充子
    • Journal Title

      The 2008 Symposium on Cryptography and Information Security SCIS2008

    • NAID

      110006885282

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair2008

    • Author(s)
      A. Miyaji, A. Waseda, T. Takagi, M. Soshi
    • Journal Title

      The 2008 International Symposium on Information Theory and its Applications

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 差分を用いたRC4PRAGAにおける内部状態の状態遷移解析2008

    • Author(s)
      助川昌泰, 宮地充子
    • Journal Title

      電子情報通信学会技術研究報告 108

      Pages: 67-72

    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point2008

    • Author(s)
      A. Miyaji, K. Mizosoe
    • Journal Title

      IPSJ Trans vol. 49, No. 9

      Pages: 2975-2988

    • NAID

      130002073193

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] An RFID Authentication Protocol Suitable for Batch-mode Authentication2008

    • Author(s)
      A. Miyaji, K. Omote, M. S. Rahman, M. Soshi
    • Journal Title

      Computer Security Symposium CSS2008-C3-2

      Pages: 277-282

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair2008

    • Author(s)
      A. Miyaji, A. Waseda, T. Takagi, M. Soshi
    • Journal Title

      The 2008 International Symposium on Information Theory and its Applications Proceedings of ISITA 2008(CD-ROM)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA2008

    • Author(s)
      A. Miyaji
    • Journal Title

      IEICE Trans., Fun-damentals E91-A, 10

      Pages: 2833-2842

    • NAID

      10026852444

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair2008

    • Author(s)
      A. Miyaji, M. Soshi, T. Takagi, A. Waseda
    • Journal Title

      The 2008 International Symposium on Information Theory and its Applications Proceedings of ISITA2008

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point2008

    • Author(s)
      A. Miyaji, K. Mizosoe
    • Journal Title

      IPSJ Trans vol.49,No.9

      Pages: 2975-2988

    • NAID

      130002073193

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] An RFID Authentication Protocol Suitable for Batch-mode Authentication2008

    • Author(s)
      M. S. Rahman, M. Soshi, K. Omote, A. Miyaji
    • Journal Title

      Computer Security Symposium CSS2008-C3-2

      Pages: 277-282

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] RC4の擬似乱数生成部における新しい脆弱性(1)2008

    • Author(s)
      今屋雄太, 助川昌泰, 宮地充子
    • Journal Title

      IEICE Japan Tech. Rep ISEC2007-159(2008-02)

      Pages: 89-94

    • NAID

      110006885282

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA2008

    • Author(s)
      A. Miyaji
    • Journal Title

      IEICE Trans., Fundamentals. vol. E91-A, No. 10

      Pages: 2833-2842

    • NAID

      10026852444

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] CCA匿名性と短い署名長を持つグループ署名方式2008

    • Author(s)
      江村恵太, 宮地充子
    • Journal Title

      The 2008 Symposium on Cryptography and Information Security SCIS2008

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA2008

    • Author(s)
      A. Miyaji
    • Journal Title

      IEICE Trans., Fundamentals. E91-A

      Pages: 2833-2842

    • NAID

      10026852444

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] 属性ベースグループ署名と匿名統計調査への応用2008

    • Author(s)
      江村 恵太, 宮地 充子
    • Journal Title

      IEICE Japan Tech. Rep. ISEC2008-10

      Pages: 61-68

    • NAID

      110006827354

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Simple Certificateless Signature with Start Cards2008

    • Author(s)
      A. Miyaji, K. Omote, K. Kato
    • Journal Title

      International Workshop on Security in Ubiauitous Computing Systems (SECUBIQ'08)

      Pages: 431-436

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point2008

    • Author(s)
      A. Miyaji, K. Mizosoe
    • Journal Title

      IPSJ Trans. 49

      Pages: 2975-2988

    • NAID

      130002073193

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Journal Article] RC4の擬似乱数生成部における新しい脆弱性(2)2008

    • Author(s)
      助川昌泰, 今屋雄太, 宮地充子
    • Journal Title

      IEIC Japan Tech. Rep ISEC2007-160(2008-02)

      Pages: 95-100

    • NAID

      110006885283

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Security and Access Control for Vehicular Communications Networking and Communications2008

    • Author(s)
      T. Ernst, A. Miyaji, Y. Shinoda, S. Zrelli
    • Journal Title

      IEEE International Conference on Wireless and Mobile Computing WIMOB'08

      Pages: 561-566

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] An RFID Authentication Protocol Suitable for Batch-mode Authentication2008

    • Author(s)
      M.S.Rahman, M.Soshi, K.Omote, A.Miyaji
    • Journal Title

      Computer Security Symposium CSS2008-C3-2

      Pages: 277-282

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] CCA匿名性と短い署名長を持つグループ署名方式2008

    • Author(s)
      江村 恵太, 宮地 充子
    • Journal Title

      The 2008 Symposium on Cryptography and Information Security SCIC2008

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 異なるグループ間における量子秘密分散法の検討2008

    • Author(s)
      早稲田篤志, 高木孝幸, 双紙正和, 宮地充子
    • Journal Title

      The 2008 Symposium on Cryptography and Information Security SCIS2008

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA2008

    • Author(s)
      A. Miyaji
    • Journal Title

      IEICE Trans., Fundamentals. V01. E91-A, No. 10

      Pages: 2833-2842

    • NAID

      10026852444

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Journal Article] 差分を用いたRC4PRAGAにおける内部状態の状態遷移解析2008

    • Author(s)
      助川 昌泰, 宮地 充子
    • Journal Title

      IEICE Japan Tech. Rep. ISEC2008-83

      Pages: 67-72

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] サンプリング確率を変動させたIPトレースバック方式の考察2008

    • Author(s)
      唐沢智之, 双紙正和, 宮地充子
    • Journal Title

      IPSJ SIG Tech. Rep 2008-CSEC-40

      Pages: 67-72

    • NAID

      110006687211

    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Generalized Scalar Multiplication Secure against SPA, DPA, and RPA2008

    • Author(s)
      A. Miyaji
    • Journal Title

      IEICE Trans., Fundamentals vol.E91-A,No.10

      Pages: 2833-2842

    • NAID

      10026852444

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 効率的な削除機能を持つグループ署名2007

    • Author(s)
      野村 奈央, 宮地 充子, 江村 恵太
    • Journal Title

      IEICE Japan Tech. Rep., IT2006-115, ISEC2006-170, WBS2006-112

      Pages: 179-184

    • NAID

      110004788476

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Generalized MMIM-algorithm Secure against SPA,DPA,and RPA2007

    • Author(s)
      A.Miyaji
    • Journal Title

      ICISC 2007, Lecture Notes in Computer Science, Springer-Verlag 4817(2007)

      Pages: 282-296

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Mobile Agent Security with Efficient Oblivious Transfer In International Conference on Security and Cryptography2007

    • Author(s)
      W. Hasegawa, M. Soshi, A. Miyaji
    • Journal Title

      SECRYPT

      Pages: 299-304

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Mobile Agent Security with Efficient Oblivious Transfer In International Conference on Security and Cryptography2007

    • Author(s)
      W. Hasegawa, M. Soshi, A. Miyaji
    • Journal Title

      SECRYPT 2007, July 2007

      Pages: 299-304

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Proposal and evaluation of improved packet marking schemes resistant against DoS attacks.2007

    • Author(s)
      Hideki Takemoto, Masakazu Soshi, Atsuko Miyaji.
    • Journal Title

      IPSJ SIG Technical Reports 2007-CSEC-36

      Pages: 103-110

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] Dos攻撃に対する偽造耐性をもつ改良パケットマーキング法の提案と評価2007

    • Author(s)
      竹本秀樹, 双紙正和, 宮地充子
    • Journal Title

      情報処理学会研究報告, 2007-CSEC-36

      Pages: 103-110

    • NAID

      110006249237

    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] Mobie Agent Security with Efficient Obhvious Transer In International Conference on Security and Cryptography2007

    • Author(s)
      W.Hasegawa, M.Soshi, A.Miyaji
    • Journal Title

      SECRYPT 2007, July 2007

      Pages: 299-304

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 量子複数秘密分散に関する考察2007

    • Author(s)
      早稲田 篤志, 双紙 正和, 宮地 充子
    • Journal Title

      情報処理学会論文誌 Vol.48, No.7

      Pages: 2447-2464

    • NAID

      110006345331

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Sign Change Faultsに対して耐性を持つ新しいスカラー倍算2007

    • Author(s)
      亀井 利明, 宮地 充子
    • Journal Title

      Society of Information Theory and its Applic ations SITA2007

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Share selectable secret sharing scheme on inefficiency concentrated for particular user.2007

    • Author(s)
      Keita Emura, Akito Nomura, Masakazu Soshi, Atsuko Miyaji.
    • Journal Title

      Technical Report of IEICE, ISEC 2007-55

      Pages: 173-178

    • NAID

      110006248136

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] モバイルエージェントセキュリティにおける効率的な通信方法2007

    • Author(s)
      長谷川 亙, 双紙 正和, 宮地 充子
    • Journal Title

      The 2007 Symposium on Cryptography and Information Security (SCIS2007)

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 量子複数秘密分散に関する考察2007

    • Author(s)
      早稲田篤志, 双紙正和, 宮地充子
    • Journal Title

      情報処理学会論文誌 第48巻7号

      Pages: 2447-2464

    • NAID

      110006345331

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption2007

    • Author(s)
      A. Miyaji
    • Journal Title

      IPSJ Trans vol.48,No.9

      Pages: 2999-3013

    • NAID

      130000022233

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 量子紛失通信に関する検討2007

    • Author(s)
      早稲田 篤志, 高木 孝幸, 双紙 正和, 宮地 充子
    • Journal Title

      IEICE Japan Tech.Rep ISEC2007-10(2007-05)

      Pages: 65-68

    • NAID

      110006292271

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 強存在的偽造不可能な署名スキームの一般的構成法2007

    • Author(s)
      菅野 康治, 宮地 充子
    • Journal Title

      Computer Security Symposium CSS2007-4B-1

      Pages: 289-293

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Evaluation of the security of RC6 against the x^2-attack2007

    • Author(s)
      A. Miyaji, Y. Takano
    • Journal Title

      IEICE Trans., Fundamentals vol.E90-A,No.1

      Pages: 22-28

    • NAID

      110007519070

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Mobile Agent Security with Efficient Oblivious Transfer In International Conference on Security and Cryptography2007

    • Author(s)
      Wataru Hasegawa, Masakazu Soshi, and Atsuko Miyaji
    • Journal Title

      SECRYPT 2007, July 2007

      Pages: 299-304

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] The security of RC6 against asymmetric chi-square test attack2007

    • Author(s)
      T. Hinoue, A. Miyaji, T. Wada
    • Journal Title

      IPSJ Trans vol. 48, No. 9

      Pages: 2966-2975

    • NAID

      130000058247

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] The security of RC6 against asymmetric chi-square test attack2007

    • Author(s)
      T. Hinoue, A. Miyaji, T. Wada
    • Journal Title

      IPSJ Trans vol.48,No.9

      Pages: 2966-2975

    • NAID

      130000058247

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] カウンタを用いたIPトレースバック方式の検討2007

    • Author(s)
      唐沢 智之, 双紙 正和, 宮地 充子
    • Journal Title

      Computer Security Symposium CSS2007-6C-1

      Pages: 453-458

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Efficient communication on mobile agent security.2007

    • Author(s)
      Wataru Hasegawa, Masakazu Soshi, Atsuko Miyaji.
    • Journal Title

      In Symposium on Cryptography and Information Security (SCIS2007) 4F1-5

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] DoS攻撃に対する偽造耐性をもつ改良パケットマーキング法の提案と評価2007

    • Author(s)
      竹本 秀樹 双紙 正和, 宮地 充子
    • Journal Title

      IPSJ SIG Tech. Rep., 2007-DPS-130, 2007-CSEC-36, 2-C-18

      Pages: 103-110

    • NAID

      110006249237

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Generalized EBRIP2007

    • Author(s)
      Atsuko Miyaji
    • Journal Title

      JEICE Japan Tech. Rep ISEC2007-122(2007-12)

      Pages: 67-78

    • NAID

      110006549389

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encrryption2007

    • Author(s)
      A. Miyaji
    • Journal Title

      IPSJ Trans vol. 48 No. 9

      Pages: 2999-3013

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] 3つの基底を用いた効率的な楕円ベキ倍算2007

    • Author(s)
      溝添健次, 宮地充子, 亀井利明
    • Journal Title

      IEICE Japan Tech. Rep., IT2006-75, ISEC2006-130 WBS2006-72

      Pages: 81-86

    • NAID

      110006248097

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] DoS攻撃に対する偽造耐性をもつ改良パケットマーキング法の提案と評価2007

    • Author(s)
      竹本秀樹, 双紙正和, 宮地充子
    • Journal Title

      情報処理学会研究報告, 2007-CSEC-36

      Pages: 103-110

    • NAID

      110006249237

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] マルチパーティ間における量子メモリを必要としない量子秘密分散法の検討2007

    • Author(s)
      高木孝幸, 早稲田篤志, 双紙正和, 宮地充子
    • Journal Title

      IEICE Japan Tech. Rep., IT2006-ll6, ISEC2006-171, WBS2006-113

      Pages: 185-190

    • NAID

      110006248138

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] モバイルエージェントセキュリティにおける効率的な通信手法2007

    • Author(s)
      長谷川亙, 双紙正和, 宮地充子
    • Journal Title

      暗号と情報セキュリティシンポジウム SCIS2007

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] 双線型写像応用に適した楕円曲線の最新の技術及び標準化動向2007

    • Author(s)
      宮地 充子
    • Journal Title

      (招待講演)RSA Conference 2007

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 量子紛失通信に関する検討2007

    • Author(s)
      早稲田篤志, 高木孝幸, 双紙正和, 宮地充子
    • Journal Title

      IEICE Japan Tech. Rep., ISEC2007-10

      Pages: 65-68

    • NAID

      110006292271

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 量子複数秘密分散に関する考察2007

    • Author(s)
      早稲田 篤志, 双紙 正和, 宮地 充子
    • Journal Title

      情報処理学会論文誌 第48巻7号

      Pages: 2447-2464

    • NAID

      110006345331

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 特定ユーザに非効率性を集中させた分散情報が選択可能な秘密分散法2007

    • Author(s)
      江村恵太, 野村明人, 双紙正和, 宮地充子
    • Journal Title

      電子情報通信学会技術報告 ISEC 2007-16

    • NAID

      110006248136

    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] Generalized EBRIP2007

    • Author(s)
      Atsuko Miyaji
    • Journal Title

      EICE Japan Tech.Rep ISEC2007-122(2007-12)

      Pages: 67-78

    • NAID

      110006549389

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] RC4のdigraphの統計的解析2007

    • Author(s)
      今屋 雄太, 宮地 充子, 和田 宗臣, 菅野 康治
    • Journal Title

      The 2007 Symposium on Cryptography and Information Security (SCIS2007)

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Generalized MMM-algorithm Secure against SPA, DPA, and RPA2007

    • Author(s)
      A. Miyaji
    • Journal Title

      ICISC 2007, Lecture Notes in Computer Science, Springer-Verlag 4817(2007)

      Pages: 282-296

    • NAID

      120000861355

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Journal Article] Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption2007

    • Author(s)
      A.Miyaji
    • Journal Title

      IPSJ Trans vol.48No.9

      Pages: 2999-3013

    • NAID

      130000022233

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Efficient ID-Based Signature without Random Oracle2007

    • Author(s)
      J. Chen, A. MiyaJi.
    • Journal Title

      IEICE Japan Tech. Rep., ISEC2007-8

      Pages: 53-56

    • NAID

      110006292269

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Generalized MMM-algorithm Secure against SPA, DPA, and RPA2007

    • Author(s)
      A. Miyaji
    • Journal Title

      Lecture Notes in Computer Science 4817

      Pages: 282-296

    • NAID

      120000861355

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Efficient ID-Based Signature without Random Oracle2007

    • Author(s)
      Chen, A.Miyaji
    • Journal Title

      IEICE JapanTech.Rep ISEC2007-8(2007-05)

      Pages: 53-56

    • NAID

      110006292269

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 特定ユーザに非効率性を集中させた分散情報が選択可能な秘密分散法2007

    • Author(s)
      江村 恵太, 野村 明人, 双紙 正和, 宮地 充子
    • Journal Title

      IEICE Japan Tech. Rep., IT2006-114, ISEC2006-169, WBS2006-111

      Pages: 173-178

    • NAID

      110006248136

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] The security of RC6 against asymmetric chi-square test attack2007

    • Author(s)
      T.Hinoue, A.Miyaji, and T.Wada
    • Journal Title

      IPSJ Trans vol.48No.9

      Pages: 2966-2975

    • NAID

      130000058247

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 特定ユーザに非効率性を集中させた分散情報が選択可能な秘密分散法2007

    • Author(s)
      江村恵太, 野村明人, 双紙正和, 宮地充子
    • Journal Title

      電子情報通信学会技術報告 ISEC 2007-55

      Pages: 173-178

    • NAID

      110006248136

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] Evaluation of the security of RC6 against the x2-attack2006

    • Author(s)
      A. Miyaji and Y. Takano
    • Journal Title

      IEICE Trans., Fundamentals vol.E90-A, No.1

      Pages: 22-28

    • NAID

      110007519070

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 効率的な削除機能を持つグループ署名2006

    • Author(s)
      服部 太郎, 双紙 正和, 宮地 充子
    • Journal Title

      IPSJ SIG Technical Reports 2006 CSEC 32

      Pages: 239-244

    • NAID

      110004788476

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 非対称カイ二乗検定攻撃の解読可能段数の再評価2006

    • Author(s)
      和田 崇臣, 宮地 充子, 樋上 智彦
    • Journal Title

      IEICE Japan Tech. Rep., ISEC2006-29

      Pages: 149-154

    • NAID

      110004809643

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] ID-Based Encryption with a hierarchical structure Without random oracle model2006

    • Author(s)
      A, Miyaji
    • Journal Title

      IEICE Japan Tech. Rep., ISEC2006-3

      Pages: 15-22

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] RC6のX二乗攻撃の効率化へのアプローチについて2006

    • Author(s)
      樋上智彦, 宮地充子
    • Journal Title

      Symposium on Cryptography and Information Security, SCIS2006

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] An IP Traceback Scheme with Variably Probabilistic Packet Marking2006

    • Author(s)
      T. Terada, M. Soshi, and A. Miyaji
    • Journal Title

      The 2006 International Symposium on Information Theory and its Applications, Proceedings of ISITA 2006

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Dos攻撃に対するフィルタリング方式の検討2006

    • Author(s)
      竹本秀樹, 双紙正和, 宮地充子
    • Journal Title

      Computer Security Symposium 2006 (CSS 2006)

      Pages: 149-154

    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae2006

    • Author(s)
      H. Mamiya, A. Miyaji
    • Journal Title

      IPSJ Trans vol.47,No.8

      Pages: 2430-2439

    • NAID

      130000058366

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 固定点の(超)楕円スカラー演算の改良2006

    • Author(s)
      溝添 健次, 宮地 充子
    • Journal Title

      Computer Security Symposium, CSS2006-2B-4

      Pages: 113-118

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] ID-Based encryption scheme with a hierarchical structure and its application2006

    • Author(s)
      A.Miyaji
    • Journal Title

      Symposium on Cryptography and Information Security, SCIS2006

    • NAID

      110004737650

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] An IP Traceback Scheme with Variably Probabilistic Packet Marking2006

    • Author(s)
      T. Terada, M. Soshi, A. Miyaji
    • Journal Title

      The 2006 International Symposium on Information Theory and its Applications

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 階層的IDベース署名の構築にむけて2006

    • Author(s)
      寺家谷純, 宮地充子
    • Journal Title

      IEICE Technical Report ISEC2005 152-189

      Pages: 109-112

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 双線形写像に基づく暗号に適した(超)楕円曲線の構成2006

    • Author(s)
      A.Miyaji
    • Journal Title

      「代数幾何・数論及び符号・暗号」研究集会報告書(東京大学大学院数理科学研究科)

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] ID-Based encryption scheme with a hierarchical structure and its application2006

    • Author(s)
      A.Miyaji
    • Journal Title

      Symposium on Cryptography and Information Security, SCIS2006

    • NAID

      110004737650

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] 効率的なDPAとSPAに強力な予備演算テーブルを用いたスカラー倍算アルゴリズム2006

    • Author(s)
      清宮健, 宮地充子
    • Journal Title

      IEICE Technical Report ISEC2005 152-189

      Pages: 123-128

    • NAID

      110004678122

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] DoS攻撃に対するフィルタリング方式の検討2006

    • Author(s)
      竹本 秀樹, 双紙 正和, 宮地 充子
    • Journal Title

      Computer Security Symposium, CSS2006-3A-3

      Pages: 149-154

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] DoS攻撃に対するフィルタリング方式の検討2006

    • Author(s)
      竹本秀樹, 双紙正和, 宮地充子
    • Journal Title

      Computer Security Symposium 2006 (CSS 2006)

      Pages: 149-154

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] An IP traceback scheme with variably probabilistic packet marking2006

    • Author(s)
      Takeaki Terada, Masakazu Soshi, Atsuko Miyaji
    • Journal Title

      International Symposium on Information Theory and Applications (ISITA 2006)

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] 双線形写像に基づく暗号に適した(超)楕円曲線の構造2006

    • Author(s)
      宮地充子
    • Journal Title

      東京大学院大学数理科学研究科「代数幾何・数論及び符号・暗号」研究会報告書

      Pages: 42-58

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 動的解析に対し耐タンパ性を持つ難読化手法の提案2006

    • Author(s)
      服部, 双紙, 宮地
    • Journal Title

      情報処理学会研究報告 2006-CSEC-32

      Pages: 239-244

    • NAID

      110004788487

    • Data Source
      KAKENHI-PROJECT-16650011
  • [Journal Article] 双線形写像に基づく暗号に適した(超)楕円曲線の構造2006

    • Author(s)
      宮地 充子
    • Journal Title

      「代数幾何・数論及び符号・暗号」研究会報告書 東京大学院大学数理学研究科

      Pages: 42-58

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 双線形写像暗号に適した楕円曲線の構成2006

    • Author(s)
      宮地 充子
    • Journal Title

      日本応用数理学会 2006年度年会, 講演予稿集

      Pages: 104-107

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA2006

    • Author(s)
      A. Miyaji, H. Mamiya, H. Morimoto
    • Journal Title

      IEICE Trans., Fundamentals vol.89-A,No.8

      Pages: 2207-2215

    • NAID

      110007537926

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA2006

    • Author(s)
      A. Miyaji, H. Mamiya, H. Morimoto
    • Journal Title

      IEICE Trans., Fundamentals vol.89-A, No.8

      Pages: 2207-2215

    • NAID

      110007537926

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] コンピューター社会の情報セキュリティ技術-暗号はこうして作られる-2006

    • Author(s)
      宮地 充子
    • Journal Title

      (招待講演)福井ライフ・アカデミー現代的課題講座2

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 階層的IDベース署名の構築にむけて2006

    • Author(s)
      寺家谷純, 宮地充子
    • Journal Title

      IEICE Technical Report ISEC2005 152-189

      Pages: 109-112

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] RC6のX二乗攻撃の効率化へのアプローチについて2006

    • Author(s)
      樋上智彦, 宮地充子
    • Journal Title

      Symposium on Cryptography and Information Security, SCIS2006

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 数論応用と楕円曲線暗号の構築について2006

    • Author(s)
      宮地 充子
    • Journal Title

      電子情報通信学会, 信学技報IT2006-11

      Pages: 1-6

    • NAID

      110005717394

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 効率的なDPAとSPAに強力な予備演算テーブルを用いたスカラー倍算アルゴリズム2006

    • Author(s)
      清宮健, 宮地充子
    • Journal Title

      IEICE Technical Report ISEC2005 152-189

      Pages: 123-128

    • NAID

      110004678122

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 効率的な削除機能を持つグループ署名2006

    • Author(s)
      田中, 宮地
    • Journal Title

      情報処理学会研究報告 2006-CSEC-32

      Pages: 171-176

    • NAID

      110004788476

    • Data Source
      KAKENHI-PROJECT-16650011
  • [Journal Article] 効率的な削除機能を持つグループ署名2006

    • Author(s)
      服部 太郎, 双紙 正和, 宮地 充子
    • Journal Title

      IPSJ SIG Technical Reports 2006 CSEC 32

      Pages: 239-244

    • NAID

      110004788476

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] 情報セキュリティの標準化動向について-ISO/IEC JTCI/SC27/WG2 2006年5月マドリッド会議報告-2006

    • Author(s)
      宮地 充子, 近澤 武, 竜田 敏男, 大塚 玲, 安田 幹, 森 健吾, 才所 敏明
    • Journal Title

      IEICE Japan Tech. Rep., ISEC2006-46

      Pages: 43-52

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Consideration for a filtering method against DoS attacks.2006

    • Author(s)
      Hideki Takemoto, Masakazu Soshi, Atsuko Miyaji.
    • Journal Title

      In Computer Security Symposium 2006 (CSS 2006)

      Pages: 149-154

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] 双線形写像に基づく暗号に適した(超)楕円曲線の構成2006

    • Author(s)
      A.Miyaji
    • Journal Title

      「代数幾何・数論及び符号・暗号」研究集会報告書,東京大学大学院数理科学研究科

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae2006

    • Author(s)
      H. Mamiya and A. Miyaji
    • Journal Title

      IPSJ Trans vol.47, No.8

      Pages: 2430-2439

    • NAID

      130000058366

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Efficient Group Signature Scheme based on a Modified Nyberg-Rueppel Signature2005

    • Author(s)
      A.Miyaji, K.Umeda
    • Journal Title

      IPSJ Journal Vol.46,No.8

      Pages: 1889-1902

    • NAID

      130000022386

    • Data Source
      KAKENHI-PROJECT-16650011
  • [Journal Article] ユビキタス社会と情報セキュリティ2005

    • Author(s)
      宮地充子
    • Journal Title

      (招待講演)サイバネティック・フレキシブル・オートメーション(CFA)研究分科会第20回研究例会

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae2005

    • Author(s)
      H. Mamiya, A. Miyaji
    • Journal Title

      ACNS

      Pages: 776-777

    • NAID

      130000058366

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Java Obfuscation - Approaches to Construct Tamper-Resistant Object-Oriented Programs2005

    • Author(s)
      Y.Sakabe, M.Soshi, A.Miyaji
    • Journal Title

      IPSJ Trans vol.46,No.8

      Pages: 2107-2119

    • NAID

      130000058399

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] モバイルエージェント・セキュリティに関する一考察2005

    • Author(s)
      森 正行, 双紙 正和, 宮地 充子
    • Journal Title

      情報処理学会研究報告 CSEC 2005-CSEC-28

      Pages: 123-128

    • NAID

      110002695468

    • Data Source
      KAKENHI-PROJECT-16650011
  • [Journal Article] 変動マーキング確率を用いるIPトレースバックの効果2005

    • Author(s)
      寺田, 双紙, 宮地
    • Journal Title

      情報処理学会コンピュータセキュリティシンポジウム CSS2005

      Pages: 253-258

    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] Efficient Group Signature Scheme based on a Modified Nyberg-Rueppel signature2005

    • Author(s)
      A.Miyaji, K.Umeda
    • Journal Title

      IPSJ Trans vol.46,No.8

      Pages: 1889-1902

    • NAID

      130000022386

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] MSPを使った量子複数秘密分散に関する考察2005

    • Author(s)
      早稲田篤志, 双紙正和, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep, ISEC2005 119

      Pages: 53-60

    • NAID

      110003488475

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] Address-bit DPAに強力なBRIPアルゴリズムの改良2005

    • Author(s)
      宮地充子, 清宮健
    • Journal Title

      IEICE Japan Tech.Rep., ISEC2005 118

      Pages: 47-52

    • NAID

      110003488474

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] Efficient Group Signature Scheme based on a Modified Nyberg-Rueppel signature2005

    • Author(s)
      A.Miyaji, K.Umeda
    • Journal Title

      IPSJ Trans vol.46,No.8

      Pages: 1889-1902

    • NAID

      130000022386

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] On the Success Probability of A2-attack on RC62005

    • Author(s)
      A.Miyaji, Y.Takano
    • Journal Title

      ACISP 2005, Lecture Notes in Computer Science (Springer-Verlag) 3089

      Pages: 310-325

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Efficient Group Signature Scheme based on a Modified Nyberg-Rueppel Signature2005

    • Author(s)
      A. Miyaji, K. Umeda
    • Journal Title

      IPSJ Trans. Vol.46,No.8

      Pages: 1889-1902

    • NAID

      130000022386

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] ユビキタス社会と情報セキュリティ2005

    • Author(s)
      宮地充子
    • Journal Title

      (招待講演)サイバネティック・フレキシブル・オートメーション(CFA)研究分科会第20回研究例会

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 情報セキュリティの標準化動向について-ISO/IEC JTC1/SC27/WG2 2005年月ウィーン会議報告-2005

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大塚玲, 安田幹
    • Journal Title

      (解説)電子情報通信学会, 信学技報ISEC

      Pages: 154-164

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] IDベースブロードキャスト暗号2005

    • Author(s)
      金沢史明, 宮地充子
    • Journal Title

      Symposium on Cryptography and Information Security

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] Java obfuscation - approaches to construct tamper-resistant object-oriented programs.2005

    • Author(s)
      Y.Sakabe, M.Soshi, A.Miyaji.
    • Journal Title

      IPSJ Journal Vol.46,No.8

      Pages: 2107-2119

    • NAID

      130000058399

    • Data Source
      KAKENHI-PROJECT-16650011
  • [Journal Article] Quantum coin flipping protocol using n-dimensional quantum states2005

    • Author(s)
      A.Waseda, M.Soshi, A.Miyaji
    • Journal Title

      IPSJ Trans (in Japanese) vol.46,No.8

      Pages: 1903-1911

    • NAID

      110002769780

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae2005

    • Author(s)
      H.Mamiya, A.Miyaji
    • Journal Title

      ACNS 2005

    • NAID

      130000058366

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] n-state quantum coin flipping protocol2005

    • Author(s)
      A.Waseda, M.Soshi, A.Miyaji
    • Journal Title

      International Conference on Information Technology-ITCC2005 Vol.II

      Pages: 776-777

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] n-state quantum coin flipping protocol2005

    • Author(s)
      A. Waseda, M. Soshi, A. Miyaji
    • Journal Title

      International Conference on Information Technology-ITCC2005 VolumeII

      Pages: 776-777

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] On the Success Probability of A2-attack on RC62005

    • Author(s)
      A.Miyaji, Y.Takano
    • Journal Title

      ACISP 2005, Lecture Notes in Computer Science 3089 Springer-Verlag

      Pages: 310-325

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] Quantum coin flipping protocol using n-dimensional quantum states2005

    • Author(s)
      A.Waseda, M.Soshi, A.Miyaji
    • Journal Title

      IPSJ Trans (in Japanese) vol.46,No.8

      Pages: 1903-1911

    • NAID

      110002769780

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] On the Success Probability of chi^2-attack on RC62005

    • Author(s)
      A. Miyaji, Y. Takano
    • Journal Title

      Lecture Notes in Computer Science 3089

      Pages: 310-325

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 双線型写像の公開鍵暗号への応用に関して2005

    • Author(s)
      宮地充子
    • Journal Title

      符号と暗号の代数的数理, 京都大学数理解析研講究録 1420

      Pages: 117-127

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Address-bit DPAに強力なBRIPアルゴリズムの改良2005

    • Author(s)
      宮地充子, 清宮健
    • Journal Title

      IEICE Japan Tech.Rep., ISEC2005 118

      Pages: 47-52

    • NAID

      110003488474

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 双線型写像の公開鍵暗号への応用に関して2005

    • Author(s)
      宮地充子
    • Journal Title

      符号と暗号の代数的数理,京都大学数理解析研講究録 1420

      Pages: 117-127

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] 双線型写像の公開鍵暗号への応用に関して2005

    • Author(s)
      宮地 充子
    • Journal Title

      符号と暗号の代数的数理,京都大学数理解析研講究録

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] Java Obfuscation - Approaches to Construct Tamper-Resistant Object-Oriented Programs2005

    • Author(s)
      Y.Sakabe, M.Soshi, A.Miyaji
    • Journal Title

      IPSJ Trans vol.46,No.8

      Pages: 2107-2119

    • NAID

      130000058399

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] Effects of IP traceback schemes with variable marking probability.2005

    • Author(s)
      Takeaki Terada, Masakazu Soshi, Atsuko Miyaji
    • Journal Title

      In Computer Security Symposium 2005 (CSS 2005)

      Pages: 253-258

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] n-state quantum coin flipping protocol2005

    • Author(s)
      A.Waseda, M.Soshi, A.Miyaji
    • Journal Title

      International Conference on Information Technology-ITCC2005 Vol.II

      Pages: 776-777

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] 変動マーキング確率を用いるIPトレースバックの効果2005

    • Author(s)
      寺田剛陽, 双紙正和, 宮地充子
    • Journal Title

      情報処理学会コンピュータセキュリティシンポジウムCSS 2005

      Pages: 253-258

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Journal Article] MSPを使った量子複数秘密分散に関する考察2005

    • Author(s)
      早稲田篤志, 双紙正和, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep, ISEC2005 119

      Pages: 53-60

    • NAID

      110003488475

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae2005

    • Author(s)
      H.Mamiya, A.Miyaji
    • Journal Title

      ACNS 2005

    • NAID

      130000058366

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] On public-key Broadcast Encryption2005

    • Author(s)
      A.Miyaji
    • Journal Title

      CSEC2005 29

      Pages: 31-38

    • NAID

      110002695519

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] 情報セキュリティの標準化動向について-ISO/IEC JTC1/SC27/WG2 2005年 月ウィーン会議報告-2005

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大塚玲, 安田幹
    • Journal Title

      電子情報通信学会,信学技報ISEC(解説)

      Pages: 154-164

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] Privacy Rights in the Digital Age Technological, -How to Protect Privacy Right by the technology of Information Security2005

    • Author(s)
      Atsuko Miyaji
    • Journal Title

      International Forum on Privacy Rights in the Digital Age, Korean National Commission for UNESCO September

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] Privacy Rights in the Digital Age Technological, -How to Protect Privacy Right by the technology of Information Security2005

    • Author(s)
      Atsuko Miyaji
    • Journal Title

      International Forum on Privacy Rights in the Digital Age, Korean National Commission for UNESCO September

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] On public-key Broadcast Encryption2005

    • Author(s)
      A.Miyaji
    • Journal Title

      CSEC2005 29

      Pages: 31-38

    • NAID

      110002695519

    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Java Obfuscation-Approaches to Construct Tamper-Resistant Object-Oriented Programs2005

    • Author(s)
      A. Miyaji, Y. Sakabe, M. Soshi
    • Journal Title

      IPSJ Trans vol.46,No.8

      Pages: 2107-2119

    • NAID

      130000058399

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Journal Article] Efficient Countermeasures against RPA, DPA, and SPA2004

    • Author(s)
      H.Mamiya, A.Miyaji, H.Morimoto
    • Journal Title

      CHES 2004 LNCS 3156

      Pages: 343-356

    • NAID

      120000861357

    • Data Source
      KAKENHI-PROJECT-16016242
  • [Journal Article] An IP traceback scheme with variably probabilistic packet marking.

    • Author(s)
      Takeaki Terada, Masakazu Soshi, Atsuko Miyaji.
    • Journal Title

      In International Symposium on Information Theory and Applications (ISITA 2006)

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-17500035
  • [Patent] 特許2004

    • Inventor(s)
      宮地 充子
    • Industrial Property Rights Holder
      宮地 充子
    • Industrial Property Number
      2004-265079
    • Filing Date
      2004-09-13
    • Data Source
      KAKENHI-PROJECT-16016242
  • [Presentation] Lattice-Based Accumulator with Efficient Updatining2022

    • Author(s)
      Yuta Maeno, Hideaki Miyaji, and Atsuko Miyaji
    • Organizer
      AsiaJCIS
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] 短いメッセージに適した閾値署名の提案2022

    • Author(s)
      猪本卓也, 宮地充子
    • Organizer
      電子情報通信学会 情報セキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] 効率的な更新機能を持つ格子ベース accumulatorの提案2022

    • Author(s)
      前野優太, 宮地秀至, 宮地充子
    • Organizer
      電子情報通信学会 情報通信システムセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] IoT機器の脆弱性低減に向けて-ディジタル社会のリスク軽減とセキュリティリスキング-2022

    • Author(s)
      宮地充子
    • Organizer
      日本電気計測器工業会
    • Invited
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] Scalable M+1st-Price Auction with Infinite Bidding Price2022

    • Author(s)
      Po-Chu Hsu, Atsuko Miyaji
    • Organizer
      SciSec
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] Rust言語を用いたNATの実装と検証2022

    • Author(s)
      細谷昂平, 高野祐輝, 宮地充子
    • Organizer
      情報処理学会 コンピュータセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] スケーラブルな局所差分プライバシの拡張 について2022

    • Author(s)
      山月達太, 宮地充子, 三本知明
    • Organizer
      電子情報通信学会 情報通信システムセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] ストリーム暗号ChaCha における多重ビット差分の解析2022

    • Author(s)
      和泉 海, 宮地充子
    • Organizer
      電子情報通信学会 情報セキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] Efficient Modular Inversion Resisting Side Channel Attack2022

    • Author(s)
      Yaoan Jin, 宮地充子
    • Organizer
      2022暗号と情報セキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] Forward-Secureなカメレオンハッ シュ関数2022

    • Author(s)
      松原功樹, Tian Yangguang, 宮地充子
    • Organizer
      情報処理学会 コンピュータセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] Rust言語によるフィルタ機能を付加したソフトウェアブリッジの実装と検証2022

    • Author(s)
      細谷昴平, 高野祐輝, 宮地充子
    • Organizer
      2022暗号と情報セキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] Differential Cryptanalysis of Salsa20 Based on Comprehensive Analysis of PNBs2022

    • Author(s)
      Nasratullah Ghafoori, Atsuko Miyaji
    • Organizer
      ISPEC
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] PNB-Focused Differential Cryptanalyjij of Cha Cha Stream Cipher2022

    • Author(s)
      Shotaro Miyashita, Ryoma Ito, Atuko Miyaji
    • Organizer
      ACISP
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] 有限体上のトレース写像を用いたSearch Ring-LWE問題への攻撃の再考2022

    • Author(s)
      高橋朋伽, 奥村伸也, 宮地充子
    • Organizer
      電子情報通信学会 情報セキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] 円分体の部分体上におけるRing-LWE問題に 対する安全性解析2022

    • Author(s)
      上杉慧至, 奥村伸也, 宮地充子
    • Organizer
      電子情報通信学会 情報セキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] An Isogeny-based Dealer-Less Threshold Signature Scheme2022

    • Author(s)
      王昱森, 宮地充子
    • Organizer
      情報処理学会 コンピュータセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] メッセージ長を拡張する耐量子コミット メント方式2022

    • Author(s)
      宮地秀至, 王イントウ, 宮地充子
    • Organizer
      2022暗号と情報セキュリティシンポジウム
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] プライ バシ保護とデータ利活用の可能性検証2022

    • Author(s)
      長尾佳高, 高橋朋伽, 大久保佑弥, 山月達太, 三本知明, 宮地充子
    • Organizer
      情報処理学会 コンピュータセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] AArch64の呼び出し規約に則ったアンワイン ド情報検査システムの開発2022

    • Author(s)
      川口哲弘, 高野祐輝, 宮地充子
    • Organizer
      電子情報通信学会 情報通信システムセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] Online/Offline Accountable-Subgroup Multi-signature2022

    • Author(s)
      山下慎太郎,Tian Yangguang,宮地充子
    • Organizer
      電子情報通信学会 情報通信システムセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] Privacy-Preserving Data Analysis without Trusted Third Party2022

    • Author(s)
      Atsuko Miyaji, Tomoka Takahashi, Ping-Lun Wang, Tatsuhiro Yamatsuki, Tomoaki Mimoto
    • Organizer
      TrustCom
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] Privacy-Preserving Social Media with a Disclosure2022

    • Author(s)
      Hideaki Miyaji, Po-Chu Hsu, Atsuko Miyaji
    • Organizer
      ANDARW
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] Short-Iteration Constant-Time GCD and Modular Inversion2022

    • Author(s)
      Yaoan Jin and Atsuko Miyaji
    • Organizer
      CARDIS
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] 効率的な閾値署名の提案2021

    • Author(s)
      猪本卓也, 宮地充子
    • Organizer
      コンピュータセキュリティシンポジウム2021
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] 有限体上のトレース写像を用いたSearch Ring-LWE問題への攻撃について2021

    • Author(s)
      髙橋朋伽,奥村伸也,宮地充子
    • Organizer
      電子情報通信学会 第45回量子情報技術研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] セッション型を用いたプロセス間の安全な 通信プロトコルの設計と実装2021

    • Author(s)
      劉 小竜, 高野祐輝,宮地充子
    • Organizer
      電子情報通信学会 情報通信システムセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] サイドチャネル攻撃に安全な同種写像暗号 CSIDH2021

    • Author(s)
      新井颯斗, 小寺健太, 宮地充子
    • Organizer
      電子情報通信学会 情報通信システムセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] 素数位数の双線形群を用いたリング 署名方式の提案2021

    • Author(s)
      上原真悟,Tian Yangguang,宮地充子
    • Organizer
      電子情報通信学会 情報通信システムセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] An initial evaluation between C language and PRSafe for developing eBPF programs2021

    • Author(s)
      Mahadevan Sai Veerya,Takano Yuuki,Miyaji Atsuko
    • Organizer
      電子情報通信学会 情報通信システムセキュリティ研究会
    • Data Source
      KAKENHI-PROJECT-23K21669
  • [Presentation] ストリーム暗号RC4における反復性のある新しい鍵相関2018

    • Author(s)
      伊藤 竜馬, 宮地 充子
    • Organizer
      The 35th Symposium on Cryptography and Information Security, SCIS2018 (2018-1), 2B3-1
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] パッチを導入したワームの動的感染モデル2018

    • Author(s)
      杉谷 勇気, ボネ フランソワ, 宮地 充子
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-54 (2018-03), 19-24
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] ユニバーサルサンプラを用いた階層型IDベース暗号方式の評価2018

    • Author(s)
      大塚 俊輔, 河内 亮周, 宮地 充子
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-63 (2018-03), 73-78
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] ランダムなネットワークモデルにおけるウイルスの拡散と抑制モデルに関する研究2018

    • Author(s)
      西野 大一, ボネ フランソワ, 宮地 充子
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-61 (2018-03), 61-66
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes2018

    • Author(s)
      Tung Chou, Yohei Maezawa and Atsuko Miyaji
    • Organizer
      Information Security and Cryptology(ICISC 2018)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] QC-MDPC符号に対するGuo-Johansson-Stankovski攻撃の解析2018

    • Author(s)
      前澤 陽平, 周 丹彡, 宮地 充子
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-57 (2018-03), 37-42
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] 準同型暗号に用いるRing-LWEの安全性について2018

    • Author(s)
      寺田 翔太, 仲野 秀人, 奥村 伸也, 宮地 充子
    • Organizer
      The 35th Symposium on Cryptography and Information Security, SCIS2018 (2018-1), 4B2-4
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] Efficient and quasi-Accurate Private Multiset Unions2018

    • Author(s)
      Atsuko Miyaji and Katsunari Shishido
    • Organizer
      The 2nd IEEE International Workshop on Big Data and IoT Security in Smart Computing (SMARTCOMP 2018 BITS WORKSHOP)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] 多機関データ集合演算の応用手法2018

    • Author(s)
      林 基, 宮地 充子, 宍戸 克成
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-56 (2018-03), 31-36
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] New Iterated RC4 Key Correlations2018

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Organizer
      The 23rd Australasian Conference on Information Security and Privacy(ACISP 2018)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] 集合法を用いた多変数多項式の解法の高速化について2018

    • Author(s)
      西口 朋哉, 鄭 振牟, 宮地 充子,
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-55(2018-03), 25-30
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] ストリーム暗号Salsa20/ChaCha20のdiffusionの再設計による安全性評価2018

    • Author(s)
      松岡 勇介, 宮地 充子
    • Organizer
      IEICE Japan Tech. Rep., ICSS2017-62 (2018-03), 67-72
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen22017

    • Author(s)
      Hiroshi Nomaguchi, Atsuko Miyaji and Chunhua Su
    • Organizer
      The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] A simple construction of encryption for a tiny domain message2017

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji, and Chunhua Su
    • Organizer
      The 51th Annual Conference on Information Sciences and Systems (CISS2017), IEEE, 1-6
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus2017

    • Author(s)
      Chen-Mou Cheng, Kenta Kodera, and Atsuko Miyaji
    • Organizer
      The 20th Annual International Conference on Information Security and Cryptology (ICISC 2017), Lecture Notes in Computer Science, volume 10779(2017), Springer-Verlag, 245-263.
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] 共通鍵暗号方式におけるLinear Obfuscationを用いた効果的な難読化手法2017

    • Author(s)
      ステュワート ギャビンレン,布田 裕一,宮地 充子
    • Organizer
      IEICE Japan Tech. Rep. ISEC2017 (2017-03)
    • Place of Presentation
      東海大学(東京都港区)
    • Year and Date
      2017-03-10
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] Robust ORAM: Enhancing Availability, Confidentiality and Integrity2017

    • Author(s)
      Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, and Ayumu Kubota
    • Organizer
      The 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC2017), IEEE, 1-6
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] (p, N)-identifiability: Anonymity under Practical Adversaries2017

    • Author(s)
      Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka and Atsuko Miyaji
    • Organizer
      The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'17)}, IEEE, 996-1003
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] (p, N)-identifiability: Anonymity under Practical Adversaries2017

    • Author(s)
      Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka and Atsuko Miyaji
    • Organizer
      The 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen22017

    • Author(s)
      Hiroshi Nomaguchi, Atsuko Miyaji and Chunhua Su
    • Organizer
      The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'17)}, IEEE, 721-728
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] A Blockcipher based Authentication Encryption2016

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji and Chunhua Su
    • Organizer
      International Cross-Domain Conference on Availability, Reliability and Security in Information Systems(CD-ARES 2016)
    • Place of Presentation
      ザルツブルク(オーストリア)
    • Year and Date
      2016-08-31
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] An Efficient Construction of a Compression Function for Cryptographic Hash2016

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji, and Chunhua Su
    • Organizer
      International Cross-Domain Conference on Availability, Reliability and Security in Information Systems (CD-ARES 2016)
    • Place of Presentation
      ザルツブルク(オーストリア)
    • Year and Date
      2016-08-31
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] Improved Differential Characteristic Searching Methods2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su and Je Sen Teh
    • Organizer
      The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015)
    • Place of Presentation
      New York, USA
    • Year and Date
      2015-11-03
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] Improved Differential Characteristic Searching Methods2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su and Je Sen Teh
    • Organizer
      The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015)
    • Place of Presentation
      ニューヨーク(アメリカ)
    • Year and Date
      2015-11-05
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] A New Statistical Approach for Integral Attack2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su and Liang Zhao
    • Organizer
      The 9th International Conference on Network and System Security (NSS 2015)
    • Place of Presentation
      ニューヨーク(アメリカ)
    • Year and Date
      2015-11-04
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] Symbolic Execution に対する難読化の評価2015

    • Author(s)
      ステュワート ギャヴィン, 宮地 充子, 布田 裕一
    • Organizer
      コンピュータセキュリティシンポジウム
    • Place of Presentation
      長崎ブリックホール(長崎県長崎市)
    • Year and Date
      2015-10-22
    • Data Source
      KAKENHI-PROJECT-15K00183
  • [Presentation] A New Scheme of (n; n) Blockcipher based Cryptographic Hash: Single Key Scheduling2015

    • Author(s)
      Jiageng Chen, Rashed Mazumder, and Atsuko Miyaji
    • Organizer
      10th International Conference on Risks and Security of Internet and Systems (CRiSIS 2015)
    • Place of Presentation
      Callirhoe at the Heliotrope Hotel, Greek
    • Year and Date
      2015-07-20
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00189
  • [Presentation] RC4 のLong-Term Glimpse における新しいNegative Biases2014

    • Author(s)
      伊藤竜馬, 宮地充子
    • Organizer
      ISEC2014, 電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機械振興会館(東京都港区)
    • Year and Date
      2014-05-09
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] RC4 のLong-Term Glimpse における新しいNegative Biases2014

    • Author(s)
      伊藤竜馬, 宮地充子
    • Organizer
      ISEC2014
    • Place of Presentation
      機械振興会館(東京都港区)
    • Year and Date
      2014-05-09
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 医療情報と暗号化・匿名化2013

    • Author(s)
      宮地充子
    • Organizer
      MELT up 講演会
    • Place of Presentation
      中央大学後楽園キャンパス
    • Invited
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 医療情報と暗号化・匿名化2013

    • Author(s)
      宮地充子
    • Organizer
      MELT up 講演会
    • Place of Presentation
      中央大学後楽園キャンパス
    • Invited
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 社会保障・税の番号制度の実務的課題 -プライバシー保護の技術的側面2013

    • Author(s)
      宮地充子
    • Organizer
      第61回情報処理学会 電子化知的財産・社会基盤研究会
    • Place of Presentation
      金沢工業大学 扇が丘キャンパス
    • Invited
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 社会保障・税の番号制度の実務的課題 -プライバシー保護の技術的側面2013

    • Author(s)
      宮地充子
    • Organizer
      第61回情報処理学会 電子化知的財産・社会基盤研究会
    • Place of Presentation
      金沢工業大学 扇が丘キャンパス
    • Invited
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Efficient and Secure Elliptic Curve Scalar Multiplication2012

    • Author(s)
      宮地 充子
    • Organizer
      天津大学(招待講演)
    • Place of Presentation
      天津大学(天津市,中国)
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 初期差分を用いたRC4 PRGAの解析2012

    • Author(s)
      市丸祐, 宮地充子
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急
    • Year and Date
      2012-01-31
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] Recent topics on Elliptic Curve Cryptosystem: Research and International Standardization2012

    • Author(s)
      宮地 充子
    • Organizer
      ダッカ大学(招待講演)
    • Place of Presentation
      ダッカ大学(ダッカ,バングラデシュ)
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 初期差分を用いたRC4PRGAの解析2012

    • Author(s)
      市丸祐,宮地充子
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急
    • Year and Date
      2012-01-31
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] HC-128の内部状態非独立性について2011

    • Author(s)
      陳嘉耕, 柿脇一穂, 宮地充子
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県)
    • Year and Date
      2011-01-27
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] Rede-signing Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments2011

    • Author(s)
      Y. Desmedt, A.Miyaji
    • Organizer
      Inscrypt 2010, LNCS, 6584, 236-254
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] Various techniques on Efficient and Secure Elliptic Curve Scalar Multiplication2011

    • Author(s)
      宮地 充子
    • Organizer
      ICISC(招待講演)
    • Place of Presentation
      KOFST(ソウル,韓国)
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] カウンタを用いたIPトレースバック方式の評価2011

    • Author(s)
      唐沢智之, 双紙正和, 宮地充子
    • Organizer
      IPSJ SIG Tech.Rep. 2011-CSEC
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] RPoK : A Strongly Resilient Poly-nomial-based Random Key Pre-distribution Scheme for Multi-phase Wireless Sensor Networks2010

    • Author(s)
      H. Ito, A.Miyaji, K. Omote
    • Organizer
      IEEE GLOBECOM 2010, 1-5
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance2010

    • Author(s)
      J. Chen, A.Miyaji
    • Organizer
      ISPEC 2010, LNCS, Springer-Verlag, 6047, 30-44
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] Privacy-Preserving Data Mining in Presence of Covert Adversaries2010

    • Author(s)
      A.Miyaji, M. Shahriar Rahman
    • Organizer
      ADMA 2010, LNCS, Springer-Verlag, 6440, 370-382
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] (パネルディスカッション)「セキュリティとディペンダビリティ」2010

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会創立50周年記念(第72回)全国大会
    • Place of Presentation
      東京大学本郷キャンパス
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] 安全・安心かつ便利な情報社会を実現する情報セキュリティー技術2010

    • Author(s)
      宮地充子
    • Organizer
      第4回関西安全・安心を支える科学技術推進会議シンポジウム
    • Place of Presentation
      大阪科学技術センター(招待講演)
    • Year and Date
      2010-06-16
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Efficient and Optimally Secure In-Network Ag-gregation in Wireless Sensor Net-works2010

    • Author(s)
      A.Miyaji, K. Omote
    • Organizer
      WISA 2010, LNCS, Springer-Verlag, 6513, 135-149
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] Hidden Credential Retrieval Without Random Oracles2010

    • Author(s)
      A.Miyaji, M. Shahriar Rahman, M. Soshi
    • Organizer
      WISA 2010, LNCS, Springer-Verlag, 6513, 160-174
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] 安全・安心かつ便利な情報社会を実現する情報セキュリティー技術2010

    • Author(s)
      宮地充子
    • Organizer
      第4回関西安全・安心を支える科学技術推進会議シンポジウム
    • Place of Presentation
      大阪科学技術センター(招待講演)
    • Year and Date
      2010-06-16
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model2010

    • Author(s)
      J. Chen, A.Miyaji
    • Organizer
      Inscrypt 2010, LNCS
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] A Timed-Release Proxy Re-Encryption Scheme and its Application to Fair-ly-Opened Multicast Communication2010

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      ProvSec 2010, LNCS, Springer-Verlag, 6402, 200-213
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System2010

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      EuroPKI 2010, LNCS,
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] Generalized RC4 Key Collisions and Hash Colli-sions2010

    • Author(s)
      J. Chen, A.Miyaji
    • Organizer
      SCN 2010, LNCS, Sprin-ger-Verlag, 6280, 73-87
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] 情報セキュリティの標準化動向について~ISO/IEC JTC1/SC27/WG2 2010年4月マラッカ会議報告~2010

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊建司, 渡辺創
    • Organizer
      情報セキュリティ研究会(ISEC)
    • Place of Presentation
      弘前大学(解説)
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] (解説)"情報セキュリティの標準化動向について~ISO/IEC JTC1/SC27/WG2 2010年4月マラッカ会議報告~"2010

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊建司, 渡辺創
    • Organizer
      情報セキュリティ研究会(ISEC)
    • Place of Presentation
      弘前大学
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] (パネルディスカッション)「セキュリティとディペンダビリティ」2010

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会創立50周年記念(第72回)全国大会
    • Place of Presentation
      東京大学 本郷キャンパス
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] セキュリティとディペンダビリティ2010

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会創立50周年記念(第72回)全国大会
    • Place of Presentation
      東京大学 本郷キャンパス
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] An Anonymous Designated Verifier Sig-nature Scheme with Revocation : How to Protect a Company's Reputation2010

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      ProvSec 2010, LNCS, Springer-Verlag, 6402, 184-198
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] Co-Z Addition Formulae and Binary Ladders on Elliptic Curves2010

    • Author(s)
      R. Goundar, M. Joye, A.Miyaji
    • Organizer
      CHES 2010, LNCS, Springer-Verlag, 6225, 65-79
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] 差分情報を利用したRC4PRGA内部状態復元アルゴリズムの提案2010

    • Author(s)
      柿脇一穂,宮地充子
    • Organizer
      コンピュータセキュリティシンポジウム2010
    • Place of Presentation
      岡山コンベンションセンター
    • Year and Date
      2010-10-19
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] Efficient Priva-cy-Preserving Data Mining in Mali-cious Model2010

    • Author(s)
      K. Emura, A.Miyaji, M. Shahriar Rahman
    • Organizer
      ADMA 2010, LNCS, Springer-Verlag, 6440, 429-440
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] 差分情報を利用したRC4 PRGA内部状態復元アルゴリズムの提案2010

    • Author(s)
      柿脇一穂, 宮地充子
    • Organizer
      コンピュータセキュリティシンポジウム2010
    • Place of Presentation
      岡山コンベンションセンター
    • Year and Date
      2010-10-19
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Reci-pient Anonymity2009

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      IWSEC 2009, 49-63
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] ユビキタス社会の情報セキュリティについて-安全・安心な情報基盤を保証する情報セキュリティ-2009

    • Author(s)
      宮地充子
    • Organizer
      石川県企業産業交流研究会OB会
    • Place of Presentation
      石川県工業試験場
    • Year and Date
      2009-06-10
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] Elliptic curves with a pre-determined embed-ding degree2009

    • Author(s)
      S. Hirasawa, A.Miyaji
    • Organizer
      ISIT 2009, 2391-2395
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] 埋め込み次数を事前に決定できる楕円曲線の改良2009

    • Author(s)
      平澤庄次郎, 宮地充子
    • Organizer
      IEICE Japan Tech. Rep
    • Place of Presentation
      公立はこだて未来大学
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] A Selectable k-Times Relaxed Anonymous Authentication Scheme2009

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      WISA 2009, LNCS, Springer-Verlag, 5932, 281-295
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] (招待講演)「ユビキタス社会の情報セキュリティについて-安全・安心な情報基盤を保証する情報セキュリティ-」2009

    • Author(s)
      宮地充子
    • Organizer
      石川県企業産業交流研究会OB会
    • Place of Presentation
      石川県工業試験場
    • Year and Date
      2009-06-10
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] A Cipher-text-Policy Attribute-Based Encryp-tion Scheme with Constant Ciphertext Length2009

    • Author(s)
      K. Emura, A.Miyaji, A. Nomura, K. Omote, M. Soshi
    • Organizer
      ISPEC 2009, LNCS, Springer-Verlag, 5451,13-23
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] 情報セキュリティの標準化動向について~ISO/IEC JTC1/SC27/WG2 2009年5月北京会議報告~2009

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊建司
    • Organizer
      IEICE Japan Tech.Rep
    • Place of Presentation
      機械振興会館(東京)
    • Year and Date
      2009-09-25
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] A Cipher-text-Policy Attribute-Based Encryp-tion Scheme with Constant Ciphertext Length2009

    • Author(s)
      A.Miyaji, K. Emura, A. Nomura, K. Omote, M. Soshi
    • Organizer
      ISPEC 2009, LNCS, 5451, Springer-Verlag, 13-23
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] 情報セキュリティの標準化動向について ~ISO/IEC JTC1/SC27/WG2 2009年5月北京会議報告~2009

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊建司
    • Organizer
      IEICE Japan Tech.Rep
    • Place of Presentation
      機械振興会館
    • Year and Date
      2009-09-25
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      AReS, 487-492
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] New Correlations of RC4 PRGA Using Non-zero-Bit Differences2009

    • Author(s)
      A.Miyaji, M. Sukegawa
    • Organizer
      ACISP 2009, LNCS, Springer-Verlag, 5594, 134-152
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Organizer
      The 14th Australasian Conference on Information Security and Privacy(ACISP2009)
    • Place of Presentation
      Brisbane, Australia
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] 「ユビキタス社会の情報セキュリティについて-安全・安心な情報基盤を保証する情報セキュリティ-2009

    • Author(s)
      宮地充子
    • Organizer
      石川県企業産業交流研究会OB会
    • Place of Presentation
      石川県工業試験場
    • Year and Date
      2009-06-10
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Organizer
      The 14th Australasian Conference on Information Security and Privacy (ACISP2009)
    • Place of Presentation
      Brisbane, Australia
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] ユビキタス社会の情報セキュリティについて-安全・安心な情報基盤を保証する情報セキュリティ-2009

    • Author(s)
      宮地充子
    • Organizer
      石川県企業産業交流研究会OB会
    • Place of Presentation
      石川県工業試験場(招待講演)
    • Year and Date
      2009-06-10
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] A Certificate Revocable Anonymous Au-thentication Scheme with Designated Verifier2009

    • Author(s)
      K. Emura, A.Miyaji, K. Omote
    • Organizer
      RIBC 769-773
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] 情報セキュリティの標準化動向について ~ISO/IEC JTC1/SC27/WG2 2009年5月北京会議報告~2009

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊建司
    • Organizer
      IEICE Japan Tech.Rep
    • Place of Presentation
      機械振興会館
    • Year and Date
      2009-09-25
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] ISOにおける暗号標準化動向2008

    • Author(s)
      宮地充子
    • Organizer
      第5回ISSスクエア水平ワークショップ
    • Place of Presentation
      情報セキュリティ大学院大学
    • Year and Date
      2008-12-19
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] Security and Access Control for Vehicular Communications Networking and Communications2008

    • Author(s)
      A.Miyaji, S. Zrelli, Y. Shinoda, T. Ernst
    • Organizer
      WIMOB'08, 561-566
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] (暗号講座第12回)ISO等の国際標準化動向2008

    • Author(s)
      宮地充子
    • Organizer
      (招待講演)中央大学研究開発機構「情報セキュリティ・情報保証人材育成拠点」
    • Place of Presentation
      中央大学
    • Year and Date
      2008-02-29
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] 情報セキュリティに関する国際標準化2008

    • Author(s)
      宮地充子
    • Organizer
      東京大学大学院情報理工学系研究科
    • Place of Presentation
      東京大学大学院
    • Year and Date
      2008-11-04
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] (解説)“情報セキュリティの標準化動向について〜ISO/IEC JTCl/SC27/WG2 2008年4月京都会議報告〜"2008

    • Author(s)
      大熊建司, 竜田敏男, 近澤 武, 宮地充子, 渡辺 創
    • Organizer
      IEICE Japan Tech. Rep.
    • Place of Presentation
      公立はこだて未来大学
    • Year and Date
      2008-07-19
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] 埋め込み次数を事前に決定できる楕円曲線2008

    • Author(s)
      平澤庄次郎, 宮地充子
    • Organizer
      IEICE Japan Tech. Rep.
    • Place of Presentation
      名古屋能楽堂
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] (暗号講座第12回)ISO等の国際標準化動向2008

    • Author(s)
      宮地 充子
    • Organizer
      (招待講演)中央大学研究開発機構「清報セキュリティ・情報保証人材育成拠点」
    • Place of Presentation
      中央大学
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] Elliptic Curve Cryptosystem for the Privacy Protection : Theory and International Standardization2008

    • Author(s)
      Atsuko Miyaji
    • Organizer
      UK-JAPAN Symposium on "Privacy and Security in the Information Society"
    • Place of Presentation
      東京
    • Year and Date
      2008-11-11
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] (解説)"情報セキュリティの標準化動向について ~ISO/IEC JTC1/SC27/WG2 2008年4月京都会議報告~"2008

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 渡辺創, 大熊建司
    • Organizer
      IEICE Japan Tech.Rep.
    • Place of Presentation
      公立はこだて未来大学
    • Year and Date
      2008-07-19
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] Elliptic Curve Cryptosystem for the Privacy Protection: Theory and International Standardization2008

    • Author(s)
      Atsuko Miyaji
    • Organizer
      UK-JAPAN Symposium on "Privacy and Security in the Information Society"
    • Place of Presentation
      東京大学大学院
    • Year and Date
      2008-11-04
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] An RFID authentication protocol suitable for batch-mode authentication2008

    • Author(s)
      R. Mohammad, M. Soshi, K. Omote, A. Miyaji
    • Organizer
      Computer Security Symposium 2008 (CSS 2008)
    • Place of Presentation
      沖縄コンベンションセンター
    • Year and Date
      2008-10-09
    • Data Source
      KAKENHI-PROJECT-20300003
  • [Presentation] The recent tendency of research and standardization of elliptic curve cryptosystems2008

    • Author(s)
      Atsuko Miyaji
    • Organizer
      The 4th Franco-Japanese Computer Security Workshop
    • Place of Presentation
      慶應義塾大学
    • Year and Date
      2008-12-06
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] (第4回ダイバーシティ・サポート・オフィス(DSO)セミナー研究)あなたはロールモデルをイメージできますか?(part 2)2008

    • Author(s)
      宮地充子
    • Organizer
      (招待講演)産業技術総合研究所「女性研究者グローバルェンカレッジング」事業
    • Place of Presentation
      産業技術総合研究所
    • Year and Date
      2008-02-19
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] ISOにおける暗号標準化動向2008

    • Author(s)
      宮地充子
    • Organizer
      第5回ISSスクエア水平ワークショップ
    • Place of Presentation
      情報セキュリティ大学院大学
    • Year and Date
      2008-12-19
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] (第4回ダイバーシティ・サポート・オフィス(DSO)セミナー研究).あなたはロールモデルをイメージできますか(part2)2008

    • Author(s)
      宮地 充子
    • Organizer
      (招待講演)産業技術総合研究所「女性研究者グローバルエンカレッジング」事業
    • Place of Presentation
      産業技術総合研究所
    • Year and Date
      2008-02-19
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] Simple Certificateless Signature with Smart Cards2008

    • Author(s)
      A.Miyaji, K. Omote, K. Kato
    • Organizer
      SECU-BIQ'08
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair2008

    • Author(s)
      A.Miyaji, A. Waseda, T. Takagi, M. Soshi
    • Organizer
      Proceedings of ISITA 2008
    • Data Source
      KAKENHI-PROJECT-20500075
  • [Presentation] 情報セキュリティに関する国際標準化2008

    • Author(s)
      宮地充子
    • Organizer
      (招待講演)東京大学大学院情報理工学系研究科
    • Place of Presentation
      東京大学大学院
    • Year and Date
      2008-11-04
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] Elliptic Curve Cryptosystem for the Privacy Protection : Theory and International Standardization2008

    • Author(s)
      宮地充子
    • Organizer
      UK-JAPAN Symposium on Privacy and Security in the Information Society
    • Place of Presentation
      東京
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] Elliptic Curve Cryptosystem for the Privacy Protection : Theory and International Standardization2008

    • Author(s)
      Atsuko Miyaji
    • Organizer
      UK-JAPAN Symposium on "Privacy and Security in the Information Society"
    • Place of Presentation
      東京
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] 情報セキュリティの標準化動向について-ISOIIECJTCl1SC271WG22007年5月モスクワ会議報告-2007

    • Author(s)
      宮地 充子, 竜田 敏男, 近澤 武, 渡辺 創, 大熊 建司
    • Organizer
      電子情報通信学会, 信学技報ISEC2007-39(2007-07), 159-170
    • Place of Presentation
      はこだて未来大学
    • Year and Date
      2007-07-19
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] Application of Number Theory to Cryptology2007

    • Author(s)
      A. Miyaji
    • Organizer
      DMHF 2007: COE Conference on the Development of Dynamic Mathematics with High Functionality (2007), 3-6.
    • Place of Presentation
      九州大学
    • Year and Date
      2007-10-01
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] ペアリング利用に適した楕円曲線の研究及び標準化動向2007

    • Author(s)
      宮地 充子
    • Organizer
      電子情報通信学会, ソサイエティ大会2007, AT2-2
    • Place of Presentation
      鳥取大学
    • Year and Date
      2007-09-13
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] 3つの基底を用いた効率的な楕円ベキ倍算2007

    • Author(s)
      溝添健次, 宮地充子, 亀井利明
    • Organizer
      IEICE Japan Tech. Rep
    • Place of Presentation
      九州産業大学
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] 双線型写像応用に適した楕円曲線の最新の技術及び標準化動向2007

    • Author(s)
      宮地充子
    • Organizer
      RSA Conference 2007
    • Place of Presentation
      ザプリンスパークタワー東京
    • Year and Date
      2007-04-25
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] ペアリング利用に適した楕円曲線の研究及び標準化動向2007

    • Author(s)
      宮地充子
    • Organizer
      電子情報通信学会, ソサイェティ大会2007, AT2-2
    • Place of Presentation
      鳥取大学
    • Year and Date
      2007-09-13
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] 楕円曲線を用いた暗号の最近の研究動向2007

    • Author(s)
      宮地充子
    • Organizer
      奈良女子大学「魅力ある大学院教育」イニシアティブ, 女性先端科学セミナー
    • Place of Presentation
      奈良女子大学
    • Year and Date
      2007-10-29
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] ペアリング利用に適した楕円曲線の研究及び標準化動向2007

    • Author(s)
      宮地充子
    • Organizer
      電子情報通信学会, ソサイエティ大会2007
    • Place of Presentation
      鳥取大学
    • Year and Date
      2007-02-13
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] Generalized EBRIP2007

    • Author(s)
      Atsuko Miyaji
    • Organizer
      IEICE Japan Tech. Rep.
    • Place of Presentation
      東京(機会振興会館)
    • Year and Date
      2007-12-19
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] 情報セキュリティの標準化動向について-ISO/IEC JTC1/SC27/WG2 2007年5月モスクワ会議報告-2007

    • Author(s)
      宮地充子, 竜田敏男, 近澤武, 渡辺創, 大熊建司
    • Organizer
      電子情報通信学会, 信学技報ISEC2007-39(2007-07), 159-170
    • Place of Presentation
      はこだて未来大学
    • Year and Date
      2007-07-19
    • Data Source
      KAKENHI-PROJECT-19650002
  • [Presentation] 双線型写像応用に適した楕円曲線の最新の技術及び標準化動向2007

    • Author(s)
      宮地充子
    • Organizer
      RSA Conference
    • Place of Presentation
      東京
    • Year and Date
      2007-04-25
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] 「楕円曲線を用いた暗号の最近の研究動向」2007

    • Author(s)
      宮地 充子
    • Organizer
      奈良女子大学「魅力ある大学院教育」イニシアティブ, 女性先端科学セミナー
    • Place of Presentation
      奈良女子大学
    • Year and Date
      2007-10-29
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] 「双線型写像応用に適した楕円曲線の最新の技術及び標準化動向」2007

    • Author(s)
      宮地 充子
    • Organizer
      RSA Conference 2007
    • Place of Presentation
      ザプリンスパークタワー東京
    • Year and Date
      2007-04-25
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] 楕円曲線を用いた暗号の最近の研究動向2007

    • Author(s)
      宮地充子
    • Organizer
      奈良女子大学「魅力ある大学院教育」イニシアティブ, 女性先端科学セミナー
    • Place of Presentation
      奈良女子大学
    • Year and Date
      2007-10-29
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] 双線形写像暗号に適した楕円曲線の構成2006

    • Author(s)
      宮地充子
    • Organizer
      日本応用数理学会2006年度年会, 講演予稿集
    • Place of Presentation
      筑波大学
    • Year and Date
      2006-02-09
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] 数論応用と楕円曲線暗号の構築について2006

    • Author(s)
      宮地充子
    • Organizer
      電子情報通信学会信学技報
    • Place of Presentation
      函館
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] 双線形写像暗号に適した楕円曲線の構成2006

    • Author(s)
      宮地充子
    • Organizer
      日本応用数理学会2006年度年会講演予稿集
    • Place of Presentation
      筑波大学
    • Year and Date
      2006-02-16
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] Address-bit DPAに強力なBRIPアルゴリズムの改良2005

    • Author(s)
      宮地充子, 清宮健
    • Organizer
      IEICE Japan Tech. Rep
    • Place of Presentation
      東京(機会振興会館)
    • Year and Date
      2005-12-16
    • Data Source
      KAKENHI-PROJECT-17300002
  • [Presentation] Greedy algorithmを改良したDBNS利用による効率的な楕円曲線暗号のスカラー倍算

    • Author(s)
      河面祥男,宮地充子
    • Organizer
      ISEC2012
    • Place of Presentation
      静岡市産学交流センター
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Double-Triple の公式を用いた新しいスカラー倍算

    • Author(s)
      高橋良太, 宮地充子
    • Organizer
      The 32nd Symposium on Cryptography and Information Security, SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 初期差分を用いたRC4 PRGAの内部状態解析

    • Author(s)
      市丸 祐, 宮地 充子
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      ウィスティン都ホテル京都
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 仮想環境化における擬似乱数生成器-Whirlwind-の安全性に関する考察

    • Author(s)
      佐藤洋之, 宮地充子, 蘇春華
    • Organizer
      Computer Security Symposium,CSS2014
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Double-Triple の公式を用いた新しいスカラー倍算

    • Author(s)
      高橋良太, 宮地充子
    • Organizer
      The 32nd Symposium on Cryptography and Information Security, SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] How to Construct PRNGs for distributed Cloud Databases

    • Author(s)
      Jiageng Chen,Atsuko Miyaji,and Chunhua Su
    • Organizer
      CSEC2014, 第62回CSEC研究会
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 安全・安心社会を実現するセキュリティ基盤

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会第13 回情報科学技術フォーラム
    • Place of Presentation
      筑波大学(茨木県つくば市)
    • Year and Date
      2014-09-03 – 2014-09-04
    • Invited
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Presentation] SSL/TLS における証明書検証機能改善に関する研究

    • Author(s)
      亀川慧, 宮地充子, 布田裕一
    • Organizer
      ISEC2014, 電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      兵庫県立大学(兵庫県神戸市)
    • Year and Date
      2014-11-21 – 2014-11-22
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] RFID における擬似乱数生成器の安全性に関する考察

    • Author(s)
      佐藤洋行, 宮地充子, 蘇春華
    • Organizer
      ICSS2014
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Recent topics on Elliptic Curve Cryptosystem: Research and International Standardization

    • Author(s)
      宮地 充子
    • Organizer
      ダッカ大学
    • Place of Presentation
      ダッカ大学(ダッカ,バングラデシュ)
    • Invited
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Secure Dynamic Hourglass Protocol for Untrusted Server

    • Author(s)
      Ratemo Alice Harriet Mwango, 宮地 充子
    • Organizer
      ISEC2013
    • Place of Presentation
      機械振興会館(東京)
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Further Application on RFID with Privacy-Preserving

    • Author(s)
      Atsuko Miyaji
    • Organizer
      The 1st International Conference on Future Data and Security Engineering, FDSE 2014
    • Place of Presentation
      Ho Chi Minh City, Vietnam
    • Year and Date
      2014-11-19 – 2014-11-21
    • Invited
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] (n,n)ブロック暗号を用いた倍ブロック長ハッシュ関数の提案

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] サイドチャネル攻撃耐性を持つスカラー倍算アルゴリズム

    • Author(s)
      木藤圭亮, 宮地充子, 高橋良太
    • Organizer
      ICSS2014
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 情報セキュリティの標準化動向について- ISO/IEC JTC1/SC27/WG2 2014 年4月香港会議報告-

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊健司, 渡辺創, 松尾真一郎
    • Organizer
      第27回電子情報通信学会研究会
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Invited
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Further Application on RFID with Privacy-Preserving

    • Author(s)
      Atsuko Miyaji
    • Organizer
      The 1st International Conference on Future Data and Security Engineering, FDSE 2014.
    • Place of Presentation
      Ho Chi Minh City, Vietnam
    • Year and Date
      2014-11-19 – 2014-11-21
    • Invited
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] A new explicit relation between trace, definition field, and embedding degree

    • Author(s)
      Atsuko Miyaji and Xiaonan Shi
    • Organizer
      ISEC2012
    • Place of Presentation
      静岡市産学交流センター
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Multi-Party Private Set Intersection Protocolの改良

    • Author(s)
      三本 知明, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Improved Elliptic Curve Scalar Multiplication Using Triple Formula

    • Author(s)
      Atsuko Miyaji and Cuinan Yang
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Efficient and Secure Elliptic Curve Scalar Multiplication

    • Author(s)
      宮地 充子
    • Organizer
      天津大学
    • Place of Presentation
      天津大学(天津市,中国)
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 仮想環境化における擬似乱数生成器-Whirlwind-の安全性に関する考察

    • Author(s)
      佐藤洋之, 宮地充子, 蘇春華
    • Organizer
      Computer Security Symposium,CSS2014
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 効率的な倍ブロック長ハッシュ関数に関する一考察

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 効率的な倍ブロック長ハッシュ関数に関する一考察

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 効率的な倍ブロック長ハッシュ関数に関する一考察

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Presentation] Improved Elliptic Curve Scalar Multiplication Using Triple Formula

    • Author(s)
      Atsuko Miyaji and Cuinan Yang
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] サイドチャネル攻撃耐性を持つスカラー倍算アルゴリズム

    • Author(s)
      木藤圭亮, 宮地充子, 高橋良太
    • Organizer
      ICSS2014, 第29回情報通信システムセキュリティ研究会
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] (n,n)ブロック暗号を用いた倍ブロック長ハッシュ関数の提案

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Presentation] A mobile RFID authentication protocol from exact LPN problem

    • Author(s)
      Mohammad Saiful Islam Mamun, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] ブラウザにおけるSSL/TLS の証明書検証の改善

    • Author(s)
      亀川慧, 宮地充子, 布田裕一,
    • Organizer
      ICSS2014, 第29回情報通信システムセキュリティ研究会
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 情報セキュリティの標準化動向について-ISO/IEC JTC1/SC27/WG2 2013年4月ニース会議報告-

    • Author(s)
      宮地 充子, 近澤 武, 竜田 敏男, 渡辺 創, 松尾 真一郎, 大熊 健司
    • Organizer
      電子情報通信学会,信学技報 ISEC2013
    • Place of Presentation
      札幌コンベンションセンター
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 情報のグローバル化とプライバシー

    • Author(s)
      宮地 充子
    • Organizer
      情報処理学会 第75回 全国大会
    • Place of Presentation
      東北大学 川内キャンパス
    • Invited
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] An Optimized ID based Group Signature Veri?cation System and its impact in VANET

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 効率的な多機関のPrivate Set Intersection

    • Author(s)
      西田昌平, 宮地充子
    • Organizer
      Computer Security Symposium,CSS2014
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 安全・安心社会を実現するセキュリティ基盤

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会第13 回情報科学技術フォーラム
    • Place of Presentation
      筑波大学(茨木県つくば市)
    • Year and Date
      2014-09-03 – 2014-09-05
    • Invited
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Cryptographic Approach to Enhance the Security against Recent Threats

    • Author(s)
      Atsuko Miyaji
    • Organizer
      NSC-JST Workshop on ``Information and Communication Technology"
    • Place of Presentation
      JST Tokyo
    • Invited
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Presentation] RFID における擬似乱数生成器の安全性に関する考察

    • Author(s)
      佐藤洋行, 宮地充子, 蘇春華
    • Organizer
      ICSS2014, 第29回情報通信システムセキュリティ研究会
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] ブラウザにおけるSSL/TLS の証明書検証の改善

    • Author(s)
      亀川慧, 宮地充子, 布田裕一
    • Organizer
      ICSS2014
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 効率的な多機関のPrivate Set Intersection

    • Author(s)
      西田昌平, 宮地充子
    • Organizer
      Computer Security Symposium,CSS2014
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256

    • Author(s)
      陳嘉耕, 廣瀬勝一, 桑門秀典, 宮地充子
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      札幌コンベンションセンター
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Various techniques on Efficient and Secure Elliptic Curve Scalar Multiplication

    • Author(s)
      宮地 充子
    • Organizer
      ICISC
    • Place of Presentation
      KOFST(ソウル,韓国)
    • Invited
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] (n,n)ブロック暗号を用いた倍ブロック長ハッシュ関数の提案

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] SSL/TLS における証明書検証機能改善に関する研究

    • Author(s)
      亀川慧, 宮地充子, 布田裕一
    • Organizer
      ISEC2014
    • Place of Presentation
      兵庫県立大学(兵庫県神戸市)
    • Year and Date
      2014-11-21 – 2014-11-22
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 情報セキュリティの標準化動向について- ISO/IEC JTC1/SC27/WG2 2014 年4月香港会議報告-

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊健司, 渡辺創, 松尾真一郎
    • Organizer
      電子情報通信学会
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Invited
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] ネットワークコーディングに適したMACの一考察

    • Author(s)
      浅野 貴哉, 宮地 充子,面 和成
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      ウィスティン都ホテル京都
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Greedy algorithmを改良したDBNS利用による効率的な楕円曲線暗号のスカラー倍算

    • Author(s)
      河面祥男,宮地充子
    • Organizer
      ISEC2012
    • Place of Presentation
      静岡市産学交流センター
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256

    • Author(s)
      陳嘉耕, 廣瀬勝一, 桑門秀典, 宮地充子
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      札幌コンベンションセンター
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] ネットワークコーディングに適したMACの一考察

    • Author(s)
      浅野 貴哉, 宮地 充子,面 和成
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      ウィスティン都ホテル京都
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Perfect Conjugate-Addition Sequence を用いた新たな事前計算テーブル計算手法について

    • Author(s)
      高橋良太, 宮地充子
    • Organizer
      ISEC2014
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Improved Elliptic Curve Scalar Multiplication Using Triple Formula

    • Author(s)
      Atsuko Miyaji and Cuinan Yang
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Presentation] 情報のグローバル化とプライバシー

    • Author(s)
      宮地 充子
    • Organizer
      情報処理学会 第75回 全国大会
    • Place of Presentation
      東北大学 川内キャンパス
    • Invited
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Cryptographic Approach to Enhance the Security against Recent Threats

    • Author(s)
      Atsuko Miyaji
    • Organizer
      NSC-JST Workshop on ``Information and Communication Technology"
    • Place of Presentation
      JST Tokyo
    • Invited
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] WPA におけるRC4 の内部状態に関する新しい線形相関

    • Author(s)
      伊藤竜馬, 宮地充子
    • Organizer
      The 32nd Symposium on Cryptography and Information Security, SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 初期差分を用いたRC4 PRGAの内部状態解析

    • Author(s)
      市丸 祐, 宮地 充子
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      ウィスティン都ホテル京都
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Further Application on RFID with Privacy-Preserving

    • Author(s)
      Atsuko Miyaji
    • Organizer
      The 1st International Conference on Future Data and Security Engineering, FDSE 2014
    • Place of Presentation
      Ho Chi Minh City, Vietnam
    • Year and Date
      2014-11-19 – 2014-11-21
    • Invited
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Presentation] 情報セキュリティの標準化動向について-ISO/IEC JTC1/SC27/WG2 2013年4月ニース会議報告-

    • Author(s)
      宮地 充子, 近澤 武, 竜田 敏男, 渡辺 創, 松尾 真一郎, 大熊 健司
    • Organizer
      電子情報通信学会,信学技報 ISEC2013
    • Place of Presentation
      札幌コンベンションセンター
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 楕円曲線のトレースと埋め込み次数の関係について

    • Author(s)
      宮地充子, 田中覚
    • Organizer
      ICSS2014, 第29回情報通信システムセキュリティ研究会
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Improve the Preimage Security of Double Block Length Hash Function

    • Author(s)
      MAZUMDER RASHED, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Perfect Conjugate-Addition Sequence を用いた新たな事前計算テーブル計算手法について

    • Author(s)
      高橋良太, 宮地充子
    • Organizer
      ISEC2014, 電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] Multi-Party Private Set Intersection Protocolの改良

    • Author(s)
      三本 知明, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] How to Construct PRNGs for distributed Cloud Databases

    • Author(s)
      Jiageng Chen,Atsuko Miyaji,and Chunhua Su
    • Organizer
      CSEC2014
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 情報セキュリティの標準化動向について- ISO/IEC JTC1/SC27/WG2 2014 年4月香港会議報告 -

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊健司, 渡辺創, 松尾真一郎
    • Organizer
      第27回電子情報通信学会
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Invited
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Presentation] Improve the Preimage Security of Double Block Length Hash Function

    • Author(s)
      MAZUMDER RASHED, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 楕円曲線のトレースと埋め込み次数の関係について

    • Author(s)
      宮地充子, 田中覚
    • Organizer
      ICSS2014
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] WPA におけるRC4 の内部状態に関する新しい線形相関

    • Author(s)
      伊藤竜馬, 宮地充子
    • Organizer
      The 32nd Symposium on Cryptography and Information Security, SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] A new explicit relation between trace, definition field, and embedding degree

    • Author(s)
      Atsuko Miyaji and Xiaonan Shi
    • Organizer
      ISEC2012
    • Place of Presentation
      静岡市産学交流センター
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] Cryptographic Approach to Enhance the Security against Recent Threats

    • Author(s)
      Atsuko Miyaji
    • Organizer
      NSC-JST Workshop on ``Information and Communication Technology"
    • Place of Presentation
      JST Tokyo
    • Invited
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 安全・安心社会を実現するセキュリティ基盤

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会第13 回情報科学技術フォーラム
    • Place of Presentation
      筑波大学(茨木県つくば市)
    • Year and Date
      2014-09-03 – 2014-09-05
    • Invited
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 効率的なMulti-Party Private Set Intersection Protocol

    • Author(s)
      三本 知明, 宮地 充子
    • Organizer
      ISEC2013
    • Place of Presentation
      東北大学
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] 効率的なMulti-Party Private Set Intersection Protocol

    • Author(s)
      三本 知明, 宮地 充子
    • Organizer
      ISEC2013
    • Place of Presentation
      東北大学
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] 情報のグローバル化とプライバシー

    • Author(s)
      宮地 充子
    • Organizer
      情報処理学会 第75回 全国大会
    • Place of Presentation
      東北大学 川内キャンパス
    • Invited
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Presentation] Secure Dynamic Hourglass Protocol for Untrusted Server

    • Author(s)
      Ratemo Alice Harriet Mwango, 宮地 充子
    • Organizer
      ISEC2013
    • Place of Presentation
      機械振興会館(東京)
    • Data Source
      KAKENHI-PROJECT-21240001
  • [Presentation] An Optimized ID based Group Signature Verification System and its impact in VANET

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Data Source
      KAKENHI-PROJECT-24500092
  • [Presentation] An Optimized ID based Group Signature Veri?cation System and its impact in VANET

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Data Source
      KAKENHI-PROJECT-23650006
  • [Presentation] A mobile RFID authentication protocol from exact LPN problem

    • Author(s)
      Mohammad Saiful Islam Mamun, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Data Source
      KAKENHI-PROJECT-21240001
  • 1.  SOSHI Masakazu (00293142)
    # of Collaborated Projects: 9 results
    # of Collaborated Products: 86 results
  • 2.  HIROSE Shoichi (20228836)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 3 results
  • 3.  OKAZAKI Hiroyuki (50432167)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 0 results
  • 4.  TANABE Hidehiko (80236661)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 5.  FUTA Yuichi (50706223)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 2 results
  • 6.  CHEN Jiageng (90640748)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 3 results
  • 7.  田中 清史 (20333445)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 1 results
  • 8.  SU Chunhua
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 6 results
  • 9.  河内 亮周
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results

URL: 

Are you sure that you want to link your ORCID iD to your KAKEN Researcher profile?
* This action can be performed only by the researcher himself/herself who is listed on the KAKEN Researcher’s page. Are you sure that this KAKEN Researcher’s page is your page?

この研究者とORCID iDの連携を行いますか?
※ この処理は、研究者本人だけが実行できます。

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi