TOP Page >  Profile

情報研究棟IS Building III 8F
To Lab's Site


Full text / JAIST Repository



Atsuko Miyaji Professor
School of Information Science、Area of Security Network


Dr. Sc. degree from Osaka University (1997)

■Professional Career

<BR>IPA(2016/1-Current)<BR>Professer at Graduate School of Engineering Osaka University(2015/10-Current)<BR>CREST, Japan Science and Technology Agency(2015-Current)JAIST Information Science (1998/12-Current) 
NARA Institute of Science and Technology part-time lecturer(2010/4-2011/3) 
The Kyoto College of Graduate Studies for Informatics part-time lecturer(2010/4-2010/9) 
NARA Institute of Science and Technology part-time lecturer(2009/4-2010/3) 
The Kyoto College of Graduate Studies for Informatics part-time lecturer(2009/4-2009/9) 
NARA Institute of Science and Technology part-time lecturer(2008/4-2009/3) 
The Kyoto College of Graduate Studies for Informatics part-time lecturer(2008/4-2008/9) 
The Kyoto College of Graduate Studies for Informatics part-time lecturer(2007/4-2007/9) 
University of California, Davis (2002/4-2003/2) 
Matsushita Electric Industrial Co., LTD (1990)


Information Security, Number-theoretic Algorithms, Cryptology

■Research Keywords

Cloud Security, Big Data Privacy, Cryptanalysis, Protocol Design, Sensor NW

■Research Interests

Information security
New threats like hackers, computer crimes, tapping, forgeries, etc. have become serious problems. Information security aims at protecting electronic information against such threats. I have been studying information security, especially in cryptographic protocols such as signatures, and key agreements. My interests also include its applications like network security and copy protection.
Number-theoretic Algorithms
Number-theoretic algorithms are an important base of public key cryptography, which concerns both its efficiency and its security. I have studied arithmetic algorithms like addition chain and security about the discrete logarithm problem and the elliptic curve discrete logarithm problem.


◇Published Papers

  • ``Self-healing Schemes Suitable for Various WSNs",Atsuko Miyaji and Kazumasa Omote,The 6th International Conference on Internet and Distributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag,8223,92-105
  • ``Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock",Jiageng Chen and Atsuko Miyaji,Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, Springer-Verlag,8128,1-15
  • ``A fully-secure RFID authentication protocol from exact LPN assumption",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), IEEE,to appear,to appear,1-8

Display All

◇Lectures and Presentations

  • (Keynote Speak) ``Privacy-Preserving Big Data Analysis",Atsuko Miyaji,The 10th International Conference on Network and System Security(NSS 2016),Taipei, Taiwan,2016/9/29
  • Further Application on RFID with Privacy-Preserving,Atsuko Miyaji,The 1st International Conference on Future Data and SecurityEngineering, FDSE 2014,Ho Chi Minh City, Vietnam,2014/11/19-21
  • ``Efficient and Secure Elliptic Curve Scalar Multiplication",Atsuko Miyaji,Tianjin University,Tianjin, China

Display All

■Extramural Activities

◇Academic Society Affiliations

  • International Association for Crytologic Research(IACR),Member,1991-

◇Other Activities

  • Special Section on Discrete Mathematics and Its Applications
  • Telecommunications Technology Council(1999-2000)

■Academic Awards Received

  • Research Category, Prizes for Science and Technology, The Commendation for Science and Technology by the Minister of Education, Culture, Sports, Science and Technology,2014
  • IPSJ/ITSCJ Project Editor Award,2012
  • Engineering Sciences Society: Contribution Award,IEICE,2012

Display All