北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

233件中21-40件目

  • 21. Refined Construction of RC4 Key Setting in WPA,Ryoma Ito and Atsuko Miyaji,IEICE Trans., Fundamentals.,Vol. E100-A,No.1,XX-XX,2017/XX/XX
  • 22. Security and Experimental Performance Analysis of a Matrix ORAM,Steven Gordon, Atsuko Miyaji, Chunhua Su and Karin Sumongkaoythin,IEEE International Conference on Communications. (IEEE ICC'2016)
  • 23. Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space,Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, and Komwut Wipusitwarakun,International Conference on Applications and Techniques in Information Security (ATIS 2016),CCIS, 651,130-141,2016/9/27
  • 24. A Matrix based ORAM: Design, Implementation and ExperimentalAnalysis,Steven GORDON, Atsuko MIYAJI, Chunhua SU, and Karin SUMONGKAYOTHIN,IEICE TRANSACTIONS on Information and Systems,Vol.E99-D,No.8,2044-2055,2016/08/01
  • 25. Secure and Traceable Framework for Data Circulation,Kaitai Liang, Atsuko Miyaji and Chunhua Su,The 21st Australasian Conference on Information Security and Privacy (ACISP),Vol.9722(2016),Springer-Verlag,376-388,2016/6/30
  • 26. Refined RC4 key correlations of internal states in WPA,Ryoma Ito, Atsuko Miyaji,IEICE TRANS. FUNDAMENTALS.,VOL.E99-A,No.6,1132-1144,2016/6/1
  • 27. A Blockcipher based Authentication Encryption,Rashed Mazumder, Atsuko Miyaji, and Chunhua Su,International Cross Domain Conference and Workshop (CD-ARES'16),Springer, LNCS,9817,106-123,2016/08/23
  • 28. An Efficient Construction of a Compression Functionfor Cryptographic Hash,Rashed Mazumder, Atsuko Miyaji, and Chunhua Su,International Cross Domain Conference and Workshop (CD-ARES'16),LNCS,9817,124-140,2016/08/23
  • 29. A Simple Authentication Encryption Scheme,Rashed Mazumder, Atsuko Miyaji, and Chunhua Su,Proceedings: Concurrency and Computation: Practice and Experience, IEEE TrustCom'16,2016/XX/XX
  • 30. Variable message encryption through blockcipher compression function,Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su,Concurrency and Computation: Practice and Experience, Wiley Publishers,to apper,to apper,to apper
  • 31. (invited paper)Flexible and scalable implementation of elliptic-curve cryptography on FPGA,Bo-Yuan Peng, Bo-Yin Yang, Yuan-Che Hsu, Yu-Jia Chen, Di-Chia Chueh, Chen-Mou Cheng, and Atsuko Miyaji,the 13th International SoC Design Conference (ISOCC 2016),to apper,to apper,to apper,to apper
  • 32. Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags,Jiageng Chen, Atsuko Miyajiy, Hiroyuki Satoz and Chunhua Su,The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications Lecture Notes in Computer Science (IEEE TrustCom 2015),1,17-24,2015
  • 33. A New Statistical Approach for Integral Attack,Jiageng Chen, Atsuko Miyaji, Chunhua Su and Liang Zhao,The 9th International Conference on Network and System Security, NSS2015, Lecture Notes in Computer Science, Springer-Verlag,9408,345-356,2015/11
  • 34. A Scalable and Efficient Multiparty Private Set Intersection,Atsuko Miyaji and Syouhei Nishida,The 9th International Conference on Network and System Security, NSS2015, Lecture Notes in Computer Science, Springer-Verlag,9408,376-385,2015/11
  • 35. Accurate Estimation of the Full Differential Distribution for General Feistel Structures,Jiageng Chen, Atsuko Miyiaji, Chunhua Su and Je Sen Teh,The 11th China International Conference on Information Security and Cryptology, Inscrypt 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 36. M-ORAM: A Matrix ORAM with logN bandwidth cost,Steven Gordon, Atsuko Miyaji, Chunhua Su and Karin Sumongkayothin,The 16th International Workshop on Information Security Applications, WISA 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 37. A New Scheme of $(n,n)$ Blockcipher based Cryptographic Hash: Single Key Scheduling,Jiageng Chen, Rashed Mazumder, and Atsuko Miyaji,10th International Conference on Risks and Security of Internet and Systems, CRiSIS 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 38. Analysis of Path ORAM toward Practical Utilization,Steven Gordon, Atsuko Miyaji, Chunhua Su and Karin Sumongkayothin,18th International Conference on Network-Based Information Systems, NBiS, IEEE
  • 39. Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree,Atsuko Miyaji, Xiaonan Shi and Satoru Tanaka,6th International Conference on Algebraic Informatics, CAI2015, Lecture Notes in Computer Science, Springer-Verlag,9270,165-175,2015/09
  • 40. Improved Differential Characteristic SearchingMethods,Jiageng Chen, Atsuko Miyiaji, Chunhua Su and Je Sen Teh,The 11th China International Conference on Information Security and Cryptology, Inscrypt 2015, Lecture Notes in Computer Science, Springer-Verlag

≪ 前へ ]  1  2  3  4  5  6  7  8  9  10 次へ ≫ ]