北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

234件中201-220件目

  • 201. Known Plaintext Correlation Attack Against RC5,A. Miyaji, M. Nonaka, and Y. Takii, RSA Conference 2002, Lecture Notes in Computer Science, Springer-Verlag,2271,131-148
  • 202. ”Efficient and unconditionally secure verifiable threshold changeable scheme”,Ayako Maeda, Atsuko Miyaji and Mitsuru Tada,Information security and privacy-Proceedings of ACISP 2001, Lecture Notes in Computer Science,2119,Springer-Verlag,403-416,2001
  • 203. New explicit conditions of elliptic curve traces for FR-reductions,Atsuko Miyaji, Masaki Nakabayashi and Shunzo Takano,IEICE,E84-A,5,vo1234-1243,2001
  • 204. An Anonymous Sealed-Bid Auction with a Feature of Entertainment,Kazumasa Omote, Atsuko Miyaji,IPSJ Journal,42,8,2049-2056,2001/08
  • 205. A practical English auction with one-time registration,A. Miyaji and K. Omote,Information security and privacy-Proceedings of ACISP 2001,Lecture Notes in Computer Science, Springer-Verlag,2119,221-234,2001
  • 206. Proposal of Efficient Signature Schemes based on Factoring,T. Okamoto, M. Tada and A. Miyaji,IPSJ,42,8,2123-2133,2001
  • 207. A general model of multisignature schemes with message flexibility, order flexibility, and order verifiability,S.Mitomi and A.Miyaji,Fundamentals. Fundamentals. IEICE,E84-A,,10,2488-2499
  • 208. "Efficient "on the fly" signature schemes based on integer factoring,A. Miyaji, T.Okamoto and M.Tada,Indocrypt 2001, Lecture Notes in Computer Science, Springer-Verlag,,2247,275-286
  • 209. Some explicit conditions for FR-reduction,A.Miyaji and S.Takano,「代数幾何・数論及び符号・暗号」研究集会報告書,東京大学大学院数理科学研究科,74-85,2000
  • 210. 楕円曲線暗号,宮地 充子,数理科学,サイエンス社,2000-9,27-33,2000
  • 211. ”The Secure Renewal of Cryptosystems in the Open Network Architecture”,,T. Yamada, A. Miyaji and M. Soshi,,IPSJ Trans, (in Japanese).,vol. 41,,No.8(2000),2102-2109,,2000
  • 212. ”An anonymous auction protocol with a single non-trusted center using binary trees with thereference number”,,K. Omote and A. Miyaji,Information security workshop-Proceedings of ISW 2000, Lecture Notes in Computer Science,1975(2000), Springer-Verlag,,1975,108-120,2000
  • 213. Linkable E-cash Scheme with User's Anonymity,A. Koide, M. Tada, and A. Miyaji,International Symposium on Information Theory and Its Applications-Proceedings of ISITA2000,2,505-508,2000
  • 214. A multisignature scheme with message flexibility, order flexibility and order verifiability,S. Mitomi and A.Miyaji,Information security and privacy-Proceedings of ACISP 2000, Lecture Notes in Computer Science, Springer-Verlag,,1841,298-312
  • 215. Anonymous Communication with Elementary Cyclic Routes,S. Kitazawa, S. Nagano, M. Soshi and A. Miyaji,IPSJ,41,8,2148-2160,2000
  • 216. An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees,Kazumasa Omote, Atsuko Miyaji,ISW2000,108-120
  • 217. Efficient Construction of Elliptic Curves over Optimal Extension Field,Y. Futa and A. Miyaji,IPSJ Trans,41,8,2092-2101,2000
  • 218. 楕円曲線暗号,宮地 充子,離散可積分系の応用数理,京都大学数理解析研講究録,138-146,1999
  • 219. 楕円暗号の数理,小山謙二,宮地充子,内山成憲,電子通信学会論文誌A,Vol.J82-A,No.8(1999),1212-1222,1999
  • 220. 楕円曲線暗号,宮地 充子,ビット別冊「情報セキュリティ」共立出版,228-234,1999

≪ 前へ ]  7  8  9  10  11  12 次へ ≫ ]