北陸先端科学技術大学院大学 [JAIST] - 研究者総覧
現在ページ トップページ 検索結果研究者紹介>全件表示

発表論文表示
表示方法:
表示順:

 

 

宮地 充子 (ミヤジ アツコ) 教授
情報科学系、セキュリティ・ネットワーク領域

220件中161-180件目

  • 161. Intrusion-Resilient Public-Key Encryption,Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung,RSA Conference 2003, Lecture Notes in Computer Science,2612(2003),Springer-Verlag,19-32,2003
  • 162. 20 世紀の名著 R.L.Rivest, A. Shamir, and L.Adelman: A method for obtaining digital signatures and public-key cryptosystems,宮地 充子,情報処理学会報,44,6,650,2003
  • 163. 解説:楕円曲線暗号の原理と国際規格について,宮地 充子,情報処理学会/情報規格調査会,情報技術標準-Newsletter-,61,16-17,2004
  • 164. Evaluation of anonymity of practical anonymous communication networks,Shigeki Kitazawa, Masakazu Soshi, and Atsuko Miyaji,The Eighth Australasian Conference on Information Security and Privacy - ACISP 2003, Lecture Notes in Computer Science,,2727,13-26,2003
  • 165. Optimized X2-Attack against RC6,Norihisa Isogai, Takashi Matsunaka, and Atsuko Miyaji,Applied Cryptography and Network Security - ACNS 2003, Lecture Notes in Computer Science, Springer-Verlag,2846,16-32,2003
  • 166. Anonymity-enhanced Pseudonym System,Yuko Tamura and Atsuko Miyaji,Applied Cryptography and Network Security - ACNS 2003, Lecture Notes in Computer Science, Springer-Verlag,2846.,33-47,2003
  • 167. Java obfuscation with a theoretical basis for building secure mobile agents,Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji,Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security (CMS'03), LNCS, Springer-Verlag,2828,89-103,2003
  • 168. ``Cryptanalysis of the reduced-round RC6 without whitening",A. Miyaji and M. Nonaka,IEICE Trans., Fundamentals.,vol.E86-A,No.1,19-30,2003
  • 169. Statistical Analysis of chi^2-Attacks,N. Isogai, A. Miyaji, and M. Nonaka,IEICE Trans.,,E86-A,5,1190-1197,2003/5
  • 170. "A Fast Signature Scheme without on-line Multiplication",T. Okamoto, M. Tada, A. Miyaji,Financial Cryptography-Proceedings of FC 2002,Lecture Notes in Computer Science,2357(2002),Springer-Verlag,152-167,2002
  • 171. "A Second-price Sealed-bid Auction with the Discriminant of the p-th Root",K. Omote and M. Miyaji,Financial Cryptography-Proceedings of FC2002, Lecture Notes in Computer Science,2357(2002),Springer-Verlag,57-71,2002
  • 172. A Second-price Sealed-bid Auction with Public Verifiability,K. Omote and A. Miyaji,IPSJ,43,8,2405-2413,2002
  • 173. Software tamper resistance based on the difficulty of interprocedural analysis,Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji,In The Third International Workshop on Information Security Applications (WISA 2002),,pp. 437-452,August 2002
  • 174. A Practical English Auction with Simple Revocation,K. OMOTE and A. MIYAJI,IEICE Trans., Fundamentals,E85-A,5,1054-1061,2002
  • 175. A Second-price Sealed-bid Auction with Public Verifiability,Kazumasa Omote, Atsuko Miyaji,IPSJ Journal,43,8,2405-2413,2002/08
  • 176. Provably secure multi-signature scheme with signers' intentions,K. Kawauchi, H. Minato, A. Miyaji, M. Tada,IPSJ Trans.,43,8,2425-2434,2002
  • 177. Improved Correlation Attack on RC5,A. Miyaji, M. Nonaka, and Y. Takii,IEICE Trans., Fundamentals.,1,E85-A,44-57
  • 178. "A multi-signature scheme with signers’ intentinos secure against active attacks",K. Kawauchi, H. Minato, A. Miyaji, and M. Tada,International Conference on Information Security and Cryptology - Proceedings of ICISC 2001, Lecture Notes in Computer Science,2288(2002),Springer-Verlag,328-340,2002
  • 179. "Cryptanalysis of the reduced-round RC6",A. Miyaji and M. Nonaka,International Conference on Information and Communications Security, ICICS 2002, Lecture Notes inComputer Science,2513(2002),Springer-Verlag,480-494,2002
  • 180. A Practical English Auction with Simple Revocation,Kazumasa Omote, Atsuko Miyaji,IEICE Transactions on Fundamentals,85-A,5,1054-1061,2002/05

≪ 前へ ]  5  6  7  8  9  10  11 次へ ≫ ]