TOP Page >  Profile

¾šŹóø¦µęÅļIS Building III””8F
To Lab's Site


Full text / JAIST Repository



Atsuko Miyaji Professor
School of Information ScienceӢSecurity and Networks Area


Dr. Sc. degree from Osaka University (1997)

¢£Professional Career

”ćBR”äIPA(2016/1-Current)”ćBR”äProfesser at Graduate School of Engineering Osaka University(2015/10-Current)”ćBR”äCREST, Japan Science and Technology Agency(2015-Current)JAIST””Information Science (1998/12-Current)””
NARA Institute of Science and Technology part-time lecturer(2010/4-2011/3)””
The Kyoto College of Graduate Studies for Informatics””part-time lecturer(2010/4-2010/9)””
NARA Institute of Science and Technology part-time lecturer(2009/4-2010/3)””
The Kyoto College of Graduate Studies for Informatics””part-time lecturer(2009/4-2009/9)””
NARA Institute of Science and Technology part-time lecturer(2008/4-2009/3)””
The Kyoto College of Graduate Studies for Informatics””part-time lecturer(2008/4-2008/9)””
The Kyoto College of Graduate Studies for Informatics””part-time lecturer(2007/4-2007/9)””
University of California, Davis (2002/4-2003/2)””
Matsushita Electric Industrial Co., LTD (1990)


Information Security, Number-theoretic Algorithms, Cryptology

¢£Research Keywords

Cloud Security, Big Data Privacy, Cryptanalysis, Protocol Design, Sensor NW

¢£Research Interests

Information security
New threats like hackers, computer crimes, tapping, forgeries, etc. have become serious problems. Information security aims at protecting electronic information against such threats. I have been studying information security, especially in cryptographic protocols such as signatures, and key agreements. My interests also include its applications like network security and copy protection.
Number-theoretic Algorithms
Number-theoretic algorithms are an important base of public key cryptography, which concerns both its efficiency and its security. I have studied arithmetic algorithms like addition chain and security about the discrete logarithm problem and the elliptic curve discrete logarithm problem.


”žPublished Papers

  • ``Self-healing Schemes Suitable for Various WSNs"”¤Atsuko Miyaji and Kazumasa Omote”¤The 6th International Conference on Internet and Distributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag”¤8223”¤92-105
  • ``Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock"”¤Jiageng Chen and Atsuko Miyaji”¤Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, Springer-Verlag”¤8128”¤1-15
  • ``A fully-secure RFID authentication protocol from exact LPN assumption"”¤Mohammad Saiful Islam Mamun and Atsuko Miyaji”¤The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), IEEE”¤to appear”¤to appear”¤1-8

Display All

”žLectures and Presentations

  • (¾·ĀŌ¹Ö±é)``Efficient Exception-Free Elliptic Curve Scalar Multiplication"”¤µÜĆĻ””½¼»Ņ”¤Central China Normal University”¤2018/4/16
  • (Keynote Speech)Elliptic Curve Cryptosystems for IoT devices”¤Atsuko Miyaji”¤The 19th International Conference on Information and Communications Security(ICICS2017)”¤Beijing, China”¤2017/12/7
  • (Keynote Speak) ``Privacy-Preserving Big Data Analysis"”¤Atsuko Miyaji”¤The 10th International Conference on Network and System Security(NSS 2016)”¤Taipei, Taiwan”¤2016/9/29

Display All

¢£Extramural Activities

”žAcademic Society Affiliations

  • International Association for Crytologic Research(IACR)”¤Member”¤1991-

”žOther Activities

  • Special Section on Discrete Mathematics and Its Applications
  • Telecommunications Technology Council(1999-2000)

¢£Academic Awards Received

  • IPSJ/ITSCJ Project Editor Award”¤2018
  • IEICE””milestone””certification”¤IEICE”¤2017
  • ATIS2016 Best Paper Award”¤International Conference on Applications and Technologies in Information Security (ATIS) 2016”¤2016

Display All