2009 |
34 | EE | Keita Emura,
Atsuko Miyaji,
Akito Nomura,
Kazumasa Omote,
Masakazu Soshi:
A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length.
ISPEC 2009: 13-23 |
2008 |
33 | | Liqun Chen,
Willy Susilo,
Huaxiong Wang,
Duncan S. Wong,
Ed Dawson,
Xuejia Lai,
Masahiro Mambo,
Atsuko Miyaji,
Yi Mu,
David Pointcheval,
Bart Preneel,
Nigel P. Smart:
Cryptography in Computer System Security.
J. UCS 14(3): 314-317 (2008) |
2007 |
32 | | Atsuko Miyaji,
Hiroaki Kikuchi,
Kai Rannenberg:
Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings
Springer 2007 |
31 | EE | Atsuko Miyaji:
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA.
ICISC 2007: 282-296 |
30 | EE | Atsuko Miyaji,
Yuuki Takano:
Evaluation of the Security of RC6 against the Chi2-Attack.
IEICE Transactions 90-A(1): 22-28 (2007) |
2006 |
29 | EE | Hideyo Mamiya,
Atsuko Miyaji,
Hiroaki Morimoto:
Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA.
IEICE Transactions 89-A(8): 2207-2215 (2006) |
2005 |
28 | EE | Atsuko Miyaji,
Yuuki Takano:
On the Success Probability of chi2-attack on RC6.
ACISP 2005: 61-74 |
27 | EE | Atsushi Waseda,
Masakazu Soshi,
Atsuko Miyaji:
n-State Quantum Coin Flipping Protocol.
ITCC (2) 2005: 776-777 |
2004 |
26 | EE | Atsuko Miyaji,
Kozue Umeda:
A Fully-Functional Group Signature Scheme over Only Known-Order Group.
ACNS 2004: 164-179 |
25 | EE | Takashi Matsunaka,
Atsuko Miyaji,
Yuuki Takano:
Success Probability in Chi2-Attacks.
ACNS 2004: 310-325 |
24 | EE | Hideyo Mamiya,
Atsuko Miyaji,
Hiroaki Morimoto:
Efficient Countermeasures against RPA, DPA, and SPA.
CHES 2004: 343-356 |
23 | EE | Yevgeniy Dodis,
Matthew K. Franklin,
Jonathan Katz,
Atsuko Miyaji,
Moti Yung:
A Generic Construction for Intrusion-Resilient Public-Key Encryption.
CT-RSA 2004: 81-98 |
2003 |
22 | EE | Shigeki Kitazawa,
Masakazu Soshi,
Atsuko Miyaji:
Evaluation of Anonymity of Practical Anonymous Communication Networks.
ACISP 2003: 13-26 |
21 | EE | Norihisa Isogai,
Takashi Matsunaka,
Atsuko Miyaji:
Optimized Chi2-Attack against RC6.
ACNS 2003: 16-32 |
20 | EE | Yuko Tamura,
Atsuko Miyaji:
Anonymity-Enhanced Pseudonym System.
ACNS 2003: 33-47 |
19 | EE | Yevgeniy Dodis,
Matthew K. Franklin,
Jonathan Katz,
Atsuko Miyaji,
Moti Yung:
Intrusion-Resilient Public-Key Encryption.
CT-RSA 2003: 19-32 |
18 | EE | Yusuke Sakabe,
Masakazu Soshi,
Atsuko Miyaji:
Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents.
Communications and Multimedia Security 2003: 89-103 |
2002 |
17 | EE | Atsuko Miyaji,
Masao Nonaka,
Yoshinori Takii:
Known Plaintext Correlation Attack against RC5.
CT-RSA 2002: 131-148 |
16 | EE | Takeshi Okamoto,
Mitsuru Tada,
Atsuko Miyaji:
An Improved Fast Signature Scheme without Online Multiplication.
Financial Cryptography 2002: 152-167 |
15 | EE | Kazumasa Omote,
Atsuko Miyaji:
A Second-price Sealed-bid Auction with the Discriminant of the p0-th Root.
Financial Cryptography 2002: 57-71 |
14 | EE | Atsuko Miyaji,
Masao Nonaka:
Cryptanalysis of the Reduced-Round RC6.
ICICS 2002: 480-494 |
2001 |
13 | EE | Kazumasa Omote,
Atsuko Miyaji:
A Practical English Auction with One-Time Registration.
ACISP 2001: 221-234 |
12 | EE | Ayako Maeda,
Atsuko Miyaji,
Mitsuru Tada:
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme.
ACISP 2001: 403-416 |
11 | EE | Kei Kawauchi,
Hiroshi Minato,
Atsuko Miyaji,
Mitsuru Tada:
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks.
ICISC 2001: 328-340 |
10 | EE | Takeshi Okamoto,
Mitsuru Tada,
Atsuko Miyaji:
Efficient "on the Fly" Signature Schemes Based on Integer Factoring.
INDOCRYPT 2001: 275-286 |
9 | EE | Shigeki Kitazawa,
Masakazu Soshi,
Atsuko Miyaji:
An Agent-Based Model of Anonymous Communication Protocols.
WETICE 2001: 177-182 |
2000 |
8 | | Shirow Mitomi,
Atsuko Miyaji:
A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability.
ACISP 2000: 298-312 |
7 | EE | Atsuko Miyaji,
Masaki Nakabayashi,
Shunzo Takano:
Characterization of Elliptic Curve Traces under FR-Reduction.
ICISC 2000: 90-108 |
6 | EE | Kazumasa Omote,
Atsuko Miyaji:
An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees.
ISW 2000: 108-120 |
1998 |
5 | EE | Henri Cohen,
Atsuko Miyaji,
Takatoshi Ono:
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates.
ASIACRYPT 1998: 51-65 |
1997 |
4 | | Atsuko Miyaji,
Takatoshi Ono,
Henri Cohen:
Efficient elliptic curve exponentiation.
ICICS 1997: 282-291 |
1996 |
3 | | Atsuko Miyaji:
A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves.
ASIACRYPT 1996: 1-14 |
1992 |
2 | | Atsuko Miyaji:
Elliptic Curves over Fp Suitable for Cryptosystems.
AUSCRYPT 1992: 479-491 |
1991 |
1 | | Atsuko Miyaji:
On Ordinary Elliptic Curve Cryptosystems.
ASIACRYPT 1991: 460-469 |