北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学研究科(情報科学専攻・理論情報科学領域)

219件中141-160件目

  • 141. ``An IP Traceback Scheme with Variably Probabilistic Packet Marking",T. Terada, M. Soshi, and A. Miyaji,The 2006 International Symposium on Information Theory and its Applications (ISITA 2006),2006
  • 142. ``Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA",A. Miyaji, H. Mamiya and H. Morimoto,IEICE Trans., Fundamentals,vol. 89-A,No.8,2207-2215,2006
  • 143. Evaluation of the Security of RC6 against the x2-Attack,Atsuko Miyaji, Yuuki Takano,IEICE Transactions on Fundamentals of Electronics, Communications and Sciences,VOL.E90-A,NO.1,22-28,2007/1
  • 144. ``Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae",Hideyo Mamiya and Atuko Miyaji,IPSJ Trans.,vol. 47,No.8,2430-2439,2006
  • 145. ``On the Success Probability of $\chi^2$-attack on RC6",A. Miyaji, and Y. Takano,ACISP 2005, Lecture Notes in Computer Science,3089,Springer-Verlag,310-325,2005
  • 146. ``n-state quantum coin flipping protocol",A. Waseda, M. Soshi, and A. Miyaji,International Conference on Information Technology - ITCC2005,Vol. II,776-777,2005
  • 147. ``Java Obfuscation -- Approaches to Construct Tamper-Resistant Object-Oriented Programs",Y. Sakabe, M. Soshi, and A. Miyaji,IPSJ Trans,vol. 46,No.8,2107-2119,2005
  • 148. ``Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae",H. Mamiya, and A. Miyaji,ACNS 2005
  • 149. ``Efficient Group Signature Scheme based on Modified Nyberg-Rueppel Signature",A. Miyaji, and K. Umeda,IPSJ Trans.,vol. 46,No.8(2005),1889-1902
  • 150. ``Quantum coin flipping protocol using n-dimensional quantum states",A. Waseda, M. Soshi, and A. Miyaji,,IPSJ Trans.,vol. 46,No.8,1903-1911,2005
  • 151. A New Pushback Mechanism Resistant to DDoS Attacks,T.Terada, M.Soshi and A.Miyaji,2004International Symposium on Information Theory and its Applications-Proceedings of ISITA2004,wed1-6-4
  • 152. A Generic Construction of Intrusion-Resilient Public-Key Encryption,Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung,Topics in Cryptology - CT-RSA 2004, Lecture Notes in Computer Science, Springer-Verlag, .,2964,81-98,2004
  • 153. Success probability in X2-attacks,Takashi Matsunaka, Atsuko Miyaji, and Yuuki Takano,Applied Cryptography and Network Security - ACNS 2004,Lecture Notes in Computer Science,Springer-Verlag,3089,310-325,2004
  • 154. A Fully-Functional group signature scheme over only known-order group,Atsuko Miyaji and Kozue Umeda,Applied Cryptography and Network Security-ACNS2004,Lecture Notes in Computer Science, Spring-Verlag,3089,164-179,2004
  • 155. Pushback機構の一提案とそのモデル化に向けて,T.Terada, M.Soshi and A.Miyaji,,IPSJ Trans,,Vol.45,No.8,1948-1953,2004
  • 156. 双線型写像の公開鍵暗号への応用に関して,宮地充子,符号と暗号の代数的数理,京都大学数理解析研講究録,1420,117-127
  • 157. ``Efficient Countermeasures against RPA, DPA, and SPA",H. Mamiya, A. Miyaji and H. Hiroaki,CHES 2004, Lecture Notes in Computer Science,3156,Springer-Verlag,343-356,2004
  • 158. ``Efficient proxy-bidding system",A. Miyaji, T. Shiotsuki and Y. Tamura,IEICE Trans.,Fundamentals. No.6,vol. J87-A,835-842,2004
  • 159. ``On anonymity metrics for practical anonymous communication protocols",S. Kitazawa, M. Soshi, and A. Miyaji,,IPSJ Trans.,vol. 45,No.82004,1887-1897,2004
  • 160. 20 世紀の名著 R.L.Rivest, A. Shamir, and L.Adelman: A method for obtaining digital signatures and public-key cryptosystems,宮地 充子,情報処理学会報,44,6,650,2003

≪ 前へ ]  4  5  6  7  8  9  10  11 次へ ≫ ]