北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

233件中201-220件目

  • 201. ”Characterization of Elliptic Curve Traces under FR-reduction”,,Atsuko Miyaji, Masaki Nakabayashi and Shunzo Takano,International conference on information security and cryptology - Proceedings of ICISC 2000,Lecture Notes in Computer Science, Springer-Verlag,,2015,90-108,2001
  • 202. Cryptography and Computer Security,A. Miyaji, S. Hangai, W. Wen,Review of Radio Science 2000-2002, Edited by W. Ross Stone Oxford University Press.
  • 203. An anonymous sealed-bid auction with a feature of entertainment,K. Omote, and A. Miyaji,IPSJ,42,8,2049-2056,2001
  • 204. Known Plaintext Correlation Attack Against RC5,A. Miyaji, M. Nonaka, and Y. Takii, RSA Conference 2002, Lecture Notes in Computer Science, Springer-Verlag,2271,131-148
  • 205. An Anonymous Sealed-Bid Auction with a Feature of Entertainment,Kazumasa Omote, Atsuko Miyaji,IPSJ Journal,42,8,2049-2056,2001/08
  • 206. A Practical English Auction with One-Time Registration,Kazumasa Omote, Atsuko Miyaji,ACISP2001,221-234
  • 207. Proposal of Efficient Signature Schemes based on Factoring,T. Okamoto, M. Tada and A. Miyaji,IPSJ,42,8,2123-2133,2001
  • 208. Some explicit conditions for FR-reduction,A.Miyaji and S.Takano,「代数幾何・数論及び符号・暗号」研究集会報告書,東京大学大学院数理科学研究科,74-85,2000
  • 209. 楕円曲線暗号,宮地 充子,数理科学,サイエンス社,2000-9,27-33,2000
  • 210. ”The Secure Renewal of Cryptosystems in the Open Network Architecture”,,T. Yamada, A. Miyaji and M. Soshi,,IPSJ Trans, (in Japanese).,vol. 41,,No.8(2000),2102-2109,,2000
  • 211. ”An anonymous auction protocol with a single non-trusted center using binary trees with thereference number”,,K. Omote and A. Miyaji,Information security workshop-Proceedings of ISW 2000, Lecture Notes in Computer Science,1975(2000), Springer-Verlag,,1975,108-120,2000
  • 212. Linkable E-cash Scheme with User's Anonymity,A. Koide, M. Tada, and A. Miyaji,International Symposium on Information Theory and Its Applications-Proceedings of ISITA2000,2,505-508,2000
  • 213. A multisignature scheme with message flexibility, order flexibility and order verifiability,S. Mitomi and A.Miyaji,Information security and privacy-Proceedings of ACISP 2000, Lecture Notes in Computer Science, Springer-Verlag,,1841,298-312
  • 214. Anonymous Communication with Elementary Cyclic Routes,S. Kitazawa, S. Nagano, M. Soshi and A. Miyaji,IPSJ,41,8,2148-2160,2000
  • 215. An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees,Kazumasa Omote, Atsuko Miyaji,ISW2000,108-120
  • 216. Efficient Construction of Elliptic Curves over Optimal Extension Field,Y. Futa and A. Miyaji,IPSJ Trans,41,8,2092-2101,2000
  • 217. 楕円曲線暗号,宮地 充子,離散可積分系の応用数理,京都大学数理解析研講究録,138-146,1999
  • 218. 楕円暗号の数理,小山謙二,宮地充子,内山成憲,電子通信学会論文誌A,Vol.J82-A,No.8(1999),1212-1222,1999
  • 219. 楕円曲線暗号,宮地 充子,ビット別冊「情報セキュリティ」共立出版,228-234,1999
  • 220. ”Efficient elliptic curve exponentiation using mixed coordinates”,,H. Cohen, A. Miyaji, and T. Ono,Advances in Cryptology-Proceedings of ASIACRYPT’98, Lecture Notes in Computer Science,Springer-Verlag,,1514(1998),,51-65.

≪ 前へ ]  7  8  9  10  11  12 次へ ≫ ]