北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

233件中101-120件目

  • 101. ``Non-interactive Opening for Ciphertexts Encrypted by Shared Keys",Jiageng Chen, Keita Emura, and Atsuko Miyaji,The 13th International Conference on Information and Communications Security (ICICS 2011), Lecture Notes in Computer Science, Springer-Verlag,7043,57-68,2011
  • 102. ``Unconditionally Secure Oblivious Transfer Based on Channel Delays",Kai-Yuen Cheong and Atsuko Miyaji,The 13th International Conference on Information and Communications Security (ICICS 2011), Lecture Notes in Computer Science, Springer-Verlag,7043,112-120,2011
  • 103. KIMAP: Key-InsulatedMutual Authentication Protocol for RFID,Atsuko Miyaji and Mohammad Shahriar Rahman,International Journal ofAutomated Identification Technology (IJAIT),3,2,61-74,2011/12
  • 104. ``Ideal Secret Sharing Schemes with Share Selectability",Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, and Masakazu Soshi,The 13th International Conference on Information and Communications Security (ICICS 2011), Lecture Notes in Computer Science, Springer-Verlag,7043,143-157,2011
  • 105. ``Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,The 14th Information Security Conference (ISC 2011),Lecture Notes in Computer Science,Springer-Verlag,7001,102-118,2011
  • 106. Unconditionally Secure Oblivious Transfer Based on Channel Delays,Kai-Yuen Cheong, Atsuko Miyaji,13th International Conference on Information and Communication Security,LNCS 7043,112-120
  • 107. ``New Concrete Relation between Trace, Definition Field, and Embedding Degree",Shoujirou Hirasawa and Atsuko Miyaji,IEICE Trans., Fundamentals.,E94-A,6,1368-1374,2011
  • 108. Scalar multiplication on Weierstrass elliptic curves from Co-Z arithmetic,Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain and Alexandre Venelli,Journal of Cryptographic Engineering,springer,1,2,161-176,2011/08
  • 109. ``A Timed-Release Proxy Re-Encryption Scheme",Keita Emura, Atsuko Miyaji, and Kazumasa Omote,IEICE Trans., Fundamentals.,E94-A,8,1682-1695,2011/08
  • 110. ``A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model",Jiageng Chen and Atsuko Miyaji,The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science, Springer-Verlag,6584,62-76,2011
  • 111. Hidden Credential Retrieval Without Random Oracles,Atsuko Miyaji, Mohammad Shahriar Rahman and Masakazu Soshi,The 11th International Workshop on Information SecurityApplications (WISA 2010), Lecture Notes in Computer Science, 6513, Springer-Verlag,6513,135-149,2010
  • 112. ``New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences",A. Miyaji and M. Sukegawa,IEICE Trans., Fundamentals,vol. E93-A,No.6,1066-1077,2010/6
  • 113. An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation,Keita Emura, Atsuko Miyaji, Kazumasa Omote,ProvSec 2010, Springer-Verlag,184-198
  • 114. A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication,Keita Emura, Atsuko Miyaji, Kazumasa Omote,ProvSec 2010, Springer-Verlag,200-213
  • 115. Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks,Atsuko Miyaji, Kazumasa Omote,The 11th International Workshop on Information SecurityApplications (WISA 2010), Lecture Notes in Computer Science, 6513 , Springer-Verlag,6513,135-149,2010
  • 116. A ciphertext-policy attribute-based encryption scheme with constant ciphertext length,Keita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi,IJACT,2,1,46-59,2010/01
  • 117. ``Sequential Bitwise Sanitizable Signature Schemes",Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang,IEICE Trans., Fundamentals,E94-A,No.1,392-404,2011
  • 118. ``A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance",Jiageng Chen and Atsuko Miyaji,The 6th Information Security Practice and Experience Conference(ISPEC 2010), Lecture Notes in Computer Science, Springer-Verlag,6047,30-44,2010
  • 119. ``Generalized RC4 Key Collisions and Hash Collisions",Jiageng Chen and Atsuko Miyaji,The 7th Conference on Security and Cryptography for Networks, SCN 2010, Lecture Notes in Computer Science, Springer-Verlag,6280,73-87,2010
  • 120. ``Co-Z Addition Formulae and Binary Ladders on Elliptic Curves",Raveen Ravinesh Goundar, Marc Joye and Atsuko Miyaji,The 12th Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, Springer-Verlag,6225,65-79,2010

≪ 前へ ]  2  3  4  5  6  7  8  9  10  11 次へ ≫ ]