北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学研究科(情報科学専攻・理論情報科学領域)

219件中21-40件目

  • 21. Accurate Estimation of the Full Differential Distribution for General Feistel Structures,Jiageng Chen, Atsuko Miyiaji, Chunhua Su and Je Sen Teh,The 11th China International Conference on Information Security and Cryptology, Inscrypt 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 22. M-ORAM: A Matrix ORAM with logN bandwidth cost,Steven Gordon, Atsuko Miyaji, Chunhua Su and Karin Sumongkayothin,The 16th International Workshop on Information Security Applications, WISA 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 23. A New Scheme of $(n,n)$ Blockcipher based Cryptographic Hash: Single Key Scheduling,Jiageng Chen, Rashed Mazumder, and Atsuko Miyaji,10th International Conference on Risks and Security of Internet and Systems, CRiSIS 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 24. Analysis of Path ORAM toward Practical Utilization,Steven Gordon, Atsuko Miyaji, Chunhua Su and Karin Sumongkayothin,18th International Conference on Network-Based Information Systems, NBiS, IEEE
  • 25. Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree,Atsuko Miyaji, Xiaonan Shi and Satoru Tanaka,6th International Conference on Algebraic Informatics, CAI2015, Lecture Notes in Computer Science, Springer-Verlag,9270,165-175,2015/09
  • 26. Improved Differential Characteristic SearchingMethods,Jiageng Chen, Atsuko Miyiaji, Chunhua Su and Je Sen Teh,The 11th China International Conference on Information Security and Cryptology, Inscrypt 2015, Lecture Notes in Computer Science, Springer-Verlag
  • 27. New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA,Ryoma Ito and Atsuko Miyaji,The 22nd International Workshop on Fast Software Encryption, FSE2015, Lecture Notes in Computer Science, Springer-Verlag,9054,557-578
  • 28. How TKIP induces biases of internal states of generic RC4,Ryoma Ito and Atsuko Miyaji,20th Australasian Conference on Information Security and Privacy, ACISP2015, Lecture Notes in Computer Science, Springer-Verlag,9144,329-342
  • 29. Self-healing wireless sensor networks,Atsuko Miyaji and Kazumasa Omote,Concurrency and Computation: Practice and Experience,1-22,2015/04
  • 30. Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security,Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman and Kazumasa Omote,Security and Communication Networks,8,8,1547-1560,2015/05
  • 31. ``A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256",Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji,The 17th Annual International Conference on Information and Security Cryptology, ICISC 2014, Lecture Notes in Computer Science, Springer-Verlag,8949,271-285,2015/03
  • 32. ``A new $(n, 2n)$ Double Block Length Hash Function based on Single Key Scheduling",Atsuko Miyaji and Mazumder Rashed,IEEE/The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA 2015),564-570,2015
  • 33. An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users,Keita Emura, Atsuko Miyaji and Kazumasa Omote,International Journal of Distributed Sensor Networks (IJDSN),2014,article ID: 586720,1-15,2014/06
  • 34. ``A Scalable and Secure RFID Ownership Transfer Protocol",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE,343-350
  • 35. ``A new (n,n) Blockcipher based Hash Function for Short Messages",Atsuko Miyaji, Mazumder Rashed and Tsuyoshi Sawada,9th Asia Joint Conference on Information Security (AsiaJCIS 2014), IEEE,to appear
  • 36. ``New Integrated Long-Term Glimpse of RC4",Ryoma Ito and Atsuko Miyaji,The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science, Springer-Verlag,to appear
  • 37. ``An Efficient Batch Verification System and Its Effect in a Real Time VANET Environment",Jiageng Chen, Mohammad S. I. Mamun, and Atsuko Miyaji,International Journal of Security and Communication Networks(SCN), Wiley Publication,online,March 2014,DOI: 10.1002/sec.980,2014
  • 38. ``RFID Path Authentication, Revisited",Mohammad Saiful Islam Mamun and Atsuko Miyaji,The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), IEEE,245-252
  • 39. ``Distributed Pseudo-Random Number Generation and its application to Cloud Database",Jiageng Chen, Atsuko Miyaji, and Chunhua Su,10th Information Security Practice and Experience Conference(ISPEC 2014), Lecture Notes in Computer Science, Springer-Verlag,8434,373-387
  • 40. ``Improving impossible differential cryptanalysiswith concrete investigation of key schedulingalgorithm and its application to LBlock",Jiageng Chen, Yuichi Futa, Atsuko Miyaji, and Chunhua Su,The 8th International Conference on Network and System Security (NSS 2014), Lecture Notes in Computer Science, Springer-Verlag,184-197

≪ 前へ ]  1  2  3  4  5  6  7  8  9  10 次へ ≫ ]