TOP Page >  Profile

¾ðÊ󸦵æÅïIS Building III¡¡8F
To Lab's Site


Full text / JAIST Repository



Atsuko Miyaji Professor
School of Information Science¡¢Security and Networks Area


Dr. Sc. degree from Osaka University (1997)

¢£Professional Career

¡ãBR¡äIPA(2016/1-Current)¡ãBR¡äProfesser at Graduate School of Engineering Osaka University(2015/10-Current)¡ãBR¡äCREST, Japan Science and Technology Agency(2015-Current)JAIST¡¡Information Science (1998/12-Current)¡¡
NARA Institute of Science and Technology part-time lecturer(2010/4-2011/3)¡¡
The Kyoto College of Graduate Studies for Informatics¡¡part-time lecturer(2010/4-2010/9)¡¡
NARA Institute of Science and Technology part-time lecturer(2009/4-2010/3)¡¡
The Kyoto College of Graduate Studies for Informatics¡¡part-time lecturer(2009/4-2009/9)¡¡
NARA Institute of Science and Technology part-time lecturer(2008/4-2009/3)¡¡
The Kyoto College of Graduate Studies for Informatics¡¡part-time lecturer(2008/4-2008/9)¡¡
The Kyoto College of Graduate Studies for Informatics¡¡part-time lecturer(2007/4-2007/9)¡¡
University of California, Davis (2002/4-2003/2)¡¡
Matsushita Electric Industrial Co., LTD (1990)


Information Security, Number-theoretic Algorithms, Cryptology

¢£Research Keywords

Cloud Security, Big Data Privacy, Cryptanalysis, Protocol Design, Sensor NW

¢£Research Interests

Information security
New threats like hackers, computer crimes, tapping, forgeries, etc. have become serious problems. Information security aims at protecting electronic information against such threats. I have been studying information security, especially in cryptographic protocols such as signatures, and key agreements. My interests also include its applications like network security and copy protection.
Number-theoretic Algorithms
Number-theoretic algorithms are an important base of public key cryptography, which concerns both its efficiency and its security. I have studied arithmetic algorithms like addition chain and security about the discrete logarithm problem and the elliptic curve discrete logarithm problem.


¡þPublished Papers

  • ``Self-healing Schemes Suitable for Various WSNs"¡¤Atsuko Miyaji and Kazumasa Omote¡¤The 6th International Conference on Internet and Distributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag¡¤8223¡¤92-105
  • ``Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock"¡¤Jiageng Chen and Atsuko Miyaji¡¤Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, Springer-Verlag¡¤8128¡¤1-15
  • ``A fully-secure RFID authentication protocol from exact LPN assumption"¡¤Mohammad Saiful Islam Mamun and Atsuko Miyaji¡¤The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), IEEE¡¤to appear¡¤to appear¡¤1-8

Display All

¡þLectures and Presentations

  • (Keynote Speak) ``Privacy-Preserving Big Data Analysis"¡¤Atsuko Miyaji¡¤The 10th International Conference on Network and System Security(NSS 2016)¡¤Taipei, Taiwan¡¤2016/9/29
  • Further Application on RFID with Privacy-Preserving¡¤Atsuko Miyaji¡¤The 1st International Conference on Future Data and SecurityEngineering, FDSE 2014¡¤Ho Chi Minh City, Vietnam¡¤2014/11/19-21
  • ``Efficient and Secure Elliptic Curve Scalar Multiplication"¡¤Atsuko Miyaji¡¤Tianjin University¡¤Tianjin, China

Display All

¢£Extramural Activities

¡þAcademic Society Affiliations

  • International Association for Crytologic Research(IACR)¡¤Member¡¤1991-

¡þOther Activities

  • Special Section on Discrete Mathematics and Its Applications
  • Telecommunications Technology Council(1999-2000)

¢£Academic Awards Received

  • ATIS2016 ºÇÍ¥½¨ÏÀʸ¾Þ¡¤International Conference on Applications and Technologies in Information Security (ATIS) 2016¡¤2016
  • IPSJ/ITSCJ Project Editor Award¡¤2016
  • Research Category, Prizes for Science and Technology, The Commendation for Science and Technology by the Minister of Education, Culture, Sports, Science and Technology¡¤2014

Display All