北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

234件中181-200件目

  • 181. 20 世紀の名著 R.L.Rivest, A. Shamir, and L.Adelman: A method for obtaining digital signatures and public-key cryptosystems,宮地 充子,情報処理学会報,44,6,650,2003
  • 182. Intrusion-Resilient Public-Key Encryption,Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung,RSA Conference 2003, Lecture Notes in Computer Science,2612(2003),Springer-Verlag,19-32,2003
  • 183. Statistical Analysis of chi^2-Attacks,N. Isogai, A. Miyaji, and M. Nonaka,IEICE Trans.,,E86-A,5,1190-1197,2003/5
  • 184. A Practical English Auction with Simple Revocation,Kazumasa Omote, Atsuko Miyaji,IEICE Transactions on Fundamentals,85-A,5,1054-1061,2002/05
  • 185. Provably secure multi-signature scheme with signers' intentions,K. Kawauchi, H. Minato, A. Miyaji, M. Tada,IPSJ Trans.,43,8,2425-2434,2002
  • 186. A Second-price Sealed-bid Auction with Public Verifiability,K. Omote and A. Miyaji,IPSJ,43,8,2405-2413,2002
  • 187. "A Second-price Sealed-bid Auction with the Discriminant of the p-th Root",K. Omote and M. Miyaji,Financial Cryptography-Proceedings of FC2002, Lecture Notes in Computer Science,2357(2002),Springer-Verlag,57-71,2002
  • 188. A Second-price Sealed-bid Auction with Public Verifiability,Kazumasa Omote, Atsuko Miyaji,IPSJ Journal,43,8,2405-2413,2002/08
  • 189. "A Fast Signature Scheme without on-line Multiplication",T. Okamoto, M. Tada, A. Miyaji,Financial Cryptography-Proceedings of FC 2002,Lecture Notes in Computer Science,2357(2002),Springer-Verlag,152-167,2002
  • 190. "Cryptanalysis of the reduced-round RC6",A. Miyaji and M. Nonaka,International Conference on Information and Communications Security, ICICS 2002, Lecture Notes inComputer Science,2513(2002),Springer-Verlag,480-494,2002
  • 191. "A multi-signature scheme with signers’ intentinos secure against active attacks",K. Kawauchi, H. Minato, A. Miyaji, and M. Tada,International Conference on Information Security and Cryptology - Proceedings of ICISC 2001, Lecture Notes in Computer Science,2288(2002),Springer-Verlag,328-340,2002
  • 192. Software obfuscation on a theoretical basis and its implementation,T. Ogiso, Y. Sakabe, M. Soshi, and A. Miyaji,IEICE Trans., Fundamentals,E86-A,1,176-186,2003
  • 193. A Practical English Auction with Simple Revocation,K. OMOTE and A. MIYAJI,IEICE Trans., Fundamentals,E85-A,5,1054-1061,2002
  • 194. Software tamper resistance based on the difficulty of interprocedural analysis,Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji,In The Third International Workshop on Information Security Applications (WISA 2002),,pp. 437-452,August 2002
  • 195. Improved Correlation Attack on RC5,A. Miyaji, M. Nonaka, and Y. Takii,IEICE Trans., Fundamentals.,1,E85-A,44-57
  • 196. A Practical English Auction with One-Time Registration,Kazumasa Omote, Atsuko Miyaji,ACISP2001,221-234
  • 197. Cryptography and Computer Security,A. Miyaji, S. Hangai, W. Wen,Review of Radio Science 2000-2002, Edited by W. Ross Stone Oxford University Press.
  • 198. An Agent-Based Model of Anonymous Communication Protocols,S. Kitazawa, A. Miyaji, and M. Soshi,Proceedings of the 10th IEEE Internationall Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE 2001),177-182.,2001
  • 199. ”Characterization of Elliptic Curve Traces under FR-reduction”,,Atsuko Miyaji, Masaki Nakabayashi and Shunzo Takano,International conference on information security and cryptology - Proceedings of ICISC 2000,Lecture Notes in Computer Science, Springer-Verlag,,2015,90-108,2001
  • 200. An anonymous sealed-bid auction with a feature of entertainment,K. Omote, and A. Miyaji,IPSJ,42,8,2049-2056,2001

≪ 前へ ]  6  7  8  9  10  11  12 次へ ≫ ]