2009 | ||
---|---|---|
34 | EE | Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi: A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. ISPEC 2009: 13-23 |
2008 | ||
33 | Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008) | |
2007 | ||
32 | Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings Springer 2007 | |
31 | EE | Atsuko Miyaji: Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. ICISC 2007: 282-296 |
30 | EE | Atsuko Miyaji, Yuuki Takano: Evaluation of the Security of RC6 against the Chi2-Attack. IEICE Transactions 90-A(1): 22-28 (2007) |
2006 | ||
29 | EE | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto: Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA. IEICE Transactions 89-A(8): 2207-2215 (2006) |
2005 | ||
28 | EE | Atsuko Miyaji, Yuuki Takano: On the Success Probability of chi2-attack on RC6. ACISP 2005: 61-74 |
27 | EE | Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji: n-State Quantum Coin Flipping Protocol. ITCC (2) 2005: 776-777 |
2004 | ||
26 | EE | Atsuko Miyaji, Kozue Umeda: A Fully-Functional Group Signature Scheme over Only Known-Order Group. ACNS 2004: 164-179 |
25 | EE | Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano: Success Probability in Chi2-Attacks. ACNS 2004: 310-325 |
24 | EE | Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto: Efficient Countermeasures against RPA, DPA, and SPA. CHES 2004: 343-356 |
23 | EE | Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: A Generic Construction for Intrusion-Resilient Public-Key Encryption. CT-RSA 2004: 81-98 |
2003 | ||
22 | EE | Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji: Evaluation of Anonymity of Practical Anonymous Communication Networks. ACISP 2003: 13-26 |
21 | EE | Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji: Optimized Chi2-Attack against RC6. ACNS 2003: 16-32 |
20 | EE | Yuko Tamura, Atsuko Miyaji: Anonymity-Enhanced Pseudonym System. ACNS 2003: 33-47 |
19 | EE | Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: Intrusion-Resilient Public-Key Encryption. CT-RSA 2003: 19-32 |
18 | EE | Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji: Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. Communications and Multimedia Security 2003: 89-103 |
2002 | ||
17 | EE | Atsuko Miyaji, Masao Nonaka, Yoshinori Takii: Known Plaintext Correlation Attack against RC5. CT-RSA 2002: 131-148 |
16 | EE | Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji: An Improved Fast Signature Scheme without Online Multiplication. Financial Cryptography 2002: 152-167 |
15 | EE | Kazumasa Omote, Atsuko Miyaji: A Second-price Sealed-bid Auction with the Discriminant of the p0-th Root. Financial Cryptography 2002: 57-71 |
14 | EE | Atsuko Miyaji, Masao Nonaka: Cryptanalysis of the Reduced-Round RC6. ICICS 2002: 480-494 |
2001 | ||
13 | EE | Kazumasa Omote, Atsuko Miyaji: A Practical English Auction with One-Time Registration. ACISP 2001: 221-234 |
12 | EE | Ayako Maeda, Atsuko Miyaji, Mitsuru Tada: Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. ACISP 2001: 403-416 |
11 | EE | Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada: A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. ICISC 2001: 328-340 |
10 | EE | Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji: Efficient "on the Fly" Signature Schemes Based on Integer Factoring. INDOCRYPT 2001: 275-286 |
9 | EE | Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji: An Agent-Based Model of Anonymous Communication Protocols. WETICE 2001: 177-182 |
2000 | ||
8 | Shirow Mitomi, Atsuko Miyaji: A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. ACISP 2000: 298-312 | |
7 | EE | Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano: Characterization of Elliptic Curve Traces under FR-Reduction. ICISC 2000: 90-108 |
6 | EE | Kazumasa Omote, Atsuko Miyaji: An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. ISW 2000: 108-120 |
1998 | ||
5 | EE | Henri Cohen, Atsuko Miyaji, Takatoshi Ono: Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. ASIACRYPT 1998: 51-65 |
1997 | ||
4 | Atsuko Miyaji, Takatoshi Ono, Henri Cohen: Efficient elliptic curve exponentiation. ICICS 1997: 282-291 | |
1996 | ||
3 | Atsuko Miyaji: A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. ASIACRYPT 1996: 1-14 | |
1992 | ||
2 | Atsuko Miyaji: Elliptic Curves over Fp Suitable for Cryptosystems. AUSCRYPT 1992: 479-491 | |
1991 | ||
1 | Atsuko Miyaji: On Ordinary Elliptic Curve Cryptosystems. ASIACRYPT 1991: 460-469 |