dblp.uni-trier.dewww.uni-trier.de

Atsuko Miyaji

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
34EEKeita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi: A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. ISPEC 2009: 13-23
2008
33 Liqun Chen, Willy Susilo, Huaxiong Wang, Duncan S. Wong, Ed Dawson, Xuejia Lai, Masahiro Mambo, Atsuko Miyaji, Yi Mu, David Pointcheval, Bart Preneel, Nigel P. Smart: Cryptography in Computer System Security. J. UCS 14(3): 314-317 (2008)
2007
32 Atsuko Miyaji, Hiroaki Kikuchi, Kai Rannenberg: Advances in Information and Computer Security, Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007, Proceedings Springer 2007
31EEAtsuko Miyaji: Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. ICISC 2007: 282-296
30EEAtsuko Miyaji, Yuuki Takano: Evaluation of the Security of RC6 against the Chi2-Attack. IEICE Transactions 90-A(1): 22-28 (2007)
2006
29EEHideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto: Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA. IEICE Transactions 89-A(8): 2207-2215 (2006)
2005
28EEAtsuko Miyaji, Yuuki Takano: On the Success Probability of chi2-attack on RC6. ACISP 2005: 61-74
27EEAtsushi Waseda, Masakazu Soshi, Atsuko Miyaji: n-State Quantum Coin Flipping Protocol. ITCC (2) 2005: 776-777
2004
26EEAtsuko Miyaji, Kozue Umeda: A Fully-Functional Group Signature Scheme over Only Known-Order Group. ACNS 2004: 164-179
25EETakashi Matsunaka, Atsuko Miyaji, Yuuki Takano: Success Probability in Chi2-Attacks. ACNS 2004: 310-325
24EEHideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto: Efficient Countermeasures against RPA, DPA, and SPA. CHES 2004: 343-356
23EEYevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: A Generic Construction for Intrusion-Resilient Public-Key Encryption. CT-RSA 2004: 81-98
2003
22EEShigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji: Evaluation of Anonymity of Practical Anonymous Communication Networks. ACISP 2003: 13-26
21EENorihisa Isogai, Takashi Matsunaka, Atsuko Miyaji: Optimized Chi2-Attack against RC6. ACNS 2003: 16-32
20EEYuko Tamura, Atsuko Miyaji: Anonymity-Enhanced Pseudonym System. ACNS 2003: 33-47
19EEYevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung: Intrusion-Resilient Public-Key Encryption. CT-RSA 2003: 19-32
18EEYusuke Sakabe, Masakazu Soshi, Atsuko Miyaji: Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. Communications and Multimedia Security 2003: 89-103
2002
17EEAtsuko Miyaji, Masao Nonaka, Yoshinori Takii: Known Plaintext Correlation Attack against RC5. CT-RSA 2002: 131-148
16EETakeshi Okamoto, Mitsuru Tada, Atsuko Miyaji: An Improved Fast Signature Scheme without Online Multiplication. Financial Cryptography 2002: 152-167
15EEKazumasa Omote, Atsuko Miyaji: A Second-price Sealed-bid Auction with the Discriminant of the p0-th Root. Financial Cryptography 2002: 57-71
14EEAtsuko Miyaji, Masao Nonaka: Cryptanalysis of the Reduced-Round RC6. ICICS 2002: 480-494
2001
13EEKazumasa Omote, Atsuko Miyaji: A Practical English Auction with One-Time Registration. ACISP 2001: 221-234
12EEAyako Maeda, Atsuko Miyaji, Mitsuru Tada: Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. ACISP 2001: 403-416
11EEKei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada: A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. ICISC 2001: 328-340
10EETakeshi Okamoto, Mitsuru Tada, Atsuko Miyaji: Efficient "on the Fly" Signature Schemes Based on Integer Factoring. INDOCRYPT 2001: 275-286
9EEShigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji: An Agent-Based Model of Anonymous Communication Protocols. WETICE 2001: 177-182
2000
8 Shirow Mitomi, Atsuko Miyaji: A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. ACISP 2000: 298-312
7EEAtsuko Miyaji, Masaki Nakabayashi, Shunzo Takano: Characterization of Elliptic Curve Traces under FR-Reduction. ICISC 2000: 90-108
6EEKazumasa Omote, Atsuko Miyaji: An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. ISW 2000: 108-120
1998
5EEHenri Cohen, Atsuko Miyaji, Takatoshi Ono: Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. ASIACRYPT 1998: 51-65
1997
4 Atsuko Miyaji, Takatoshi Ono, Henri Cohen: Efficient elliptic curve exponentiation. ICICS 1997: 282-291
1996
3 Atsuko Miyaji: A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. ASIACRYPT 1996: 1-14
1992
2 Atsuko Miyaji: Elliptic Curves over Fp Suitable for Cryptosystems. AUSCRYPT 1992: 479-491
1991
1 Atsuko Miyaji: On Ordinary Elliptic Curve Cryptosystems. ASIACRYPT 1991: 460-469

Coauthor Index

1Liqun Chen [33]
2Henri Cohen [4] [5]
3Ed Dawson [33]
4Yevgeniy Dodis [19] [23]
5Keita Emura [34]
6Matthew K. Franklin [19] [23]
7Norihisa Isogai [21]
8Jonathan Katz [19] [23]
9Kei Kawauchi [11]
10Hiroaki Kikuchi [32]
11Shigeki Kitazawa [9] [22]
12Xuejia Lai [33]
13Ayako Maeda [12]
14Masahiro Mambo [33]
15Hideyo Mamiya [24] [29]
16Takashi Matsunaka [21] [25]
17Hiroshi Minato [11]
18Shirow Mitomi [8]
19Hiroaki Morimoto [24] [29]
20Yi Mu [33]
21Masaki Nakabayashi [7]
22Akito Nomura [34]
23Masao Nonaka [14] [17]
24Takeshi Okamoto [10] [16]
25Kazumasa Omote [6] [13] [15] [34]
26Takatoshi Ono [4] [5]
27David Pointcheval [33]
28Bart Preneel [33]
29Kai Rannenberg [32]
30Yusuke Sakabe [18]
31Nigel P. Smart [33]
32Masakazu Soshi [9] [18] [22] [27] [34]
33Willy Susilo [33]
34Mitsuru Tada [10] [11] [12] [16]
35Shunzo Takano [7]
36Yuuki Takano [25] [28] [30]
37Yoshinori Takii [17]
38Yuko Tamura [20]
39Kozue Umeda [26]
40Huaxiong Wang [33]
41Atsushi Waseda [27]
42Duncan S. Wong [33]
43Moti Yung (Mordechai M. Yung) [19] [23]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)