# Atsuko Miyaji

According to our database

Collaborative distances:

^{1}, Atsuko Miyaji authored at least 162 papers between 1991 and 2019.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2019

Secure and Compact Elliptic Curve Cryptosystems.

Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018

OTP-IoT: An ownership transfer protocol for the Internet of Things.

J. Inf. Sec. Appl., 2018

SupAUTH: A new approach to supply chain authentication for the IoT.

Computational Intelligence, 2018

Efficient and Quasi-accurate Multiparty Private Set Union.

Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018

The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.

Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields.

Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Revisited Diffusion Analysis of Salsa and ChaCha.

Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes.

Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Development of a Secure Cross-Institutional Data Collection System Based on Distributed Standardized EMR Storage.

Proceedings of the Decision Support Systems and Education, 2018

New Iterated RC4 Key Correlations.

Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017

Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.

IEEE Trans. Information Forensics and Security, 2017

Privacy-Preserving Integration of Medical Data - A Practical Multiparty Private Set Intersection.

J. Medical Systems, 2017

Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data.

Int. J. Found. Comput. Sci., 2017

Refined Construction of RC4 Key Setting in WPA.

IEICE Transactions, 2017

Cloud computing security and privacy: Standards and regulations.

Computer Standards & Interfaces, 2017

A simple authentication encryption scheme.

Concurrency and Computation: Practice and Experience, 2017

Variable message encryption through blockcipher compression function.

Concurrency and Computation: Practice and Experience, 2017

Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2.

Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

(p, N)-identifiability: Anonymity under Practical Adversaries.

Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Robust ORAM: Enhancing Availability, Confidentiality and Integrity.

Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus.

Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

A simple construction of encryption for a tiny domain message.

Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016

A New Scheme of Blockcipher Hash.

IEICE Transactions, 2016

Refined RC4 Key Correlations of Internal States in WPA.

IEICE Transactions, 2016

Refined Glimpse Correlations of RC4.

IEICE Transactions, 2016

A Matrix Based ORAM: Design, Implementation and Experimental Analysis.

IEICE Transactions, 2016

A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256.

IEICE Transactions, 2016

Security and experimental performance analysis of a matrix ORAM.

Proceedings of the 2016 IEEE International Conference on Communications, 2016

Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space.

Proceedings of the Applications and Techniques in Information Security, 2016

Secure and Traceable Framework for Data Circulation.

Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

An Efficient Construction of a Compression Function for Cryptographic Hash.

Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

A Blockcipher Based Authentication Encryption.

Proceedings of the Availability, Reliability, and Security in Information Systems, 2016

2015

Generic constructions of secure-channel free searchable encryption with adaptive security.

Security and Communication Networks, 2015

An efficient batch verification system and its effect in a real time VANET environment.

Security and Communication Networks, 2015

SKENO: Secret key encryption with non-interactive opening.

J. Mathematical Cryptology, 2015

A privacy-preserving efficient RFID authentication protocol from SLPN assumption.

IJCSE, 2015

Self-healing wireless sensor networks.

Concurrency and Computation: Practice and Experience, 2015

M-ORAM: A Matrix ORAM with Log N Bandwidth Cost.

Proceedings of the Information Security Applications - 16th International Workshop, 2015

Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags.

Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Scalable Multiparty Private Set Intersection.

Proceedings of the Network and System Security - 9th International Conference, 2015

A New Statistical Approach for Integral Attack.

Proceedings of the Network and System Security - 9th International Conference, 2015

Analysis of Path ORAM toward Practical Utilization.

Proceedings of the 18th International Conference on Network-Based Information Systems, 2015

New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA.

Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

Improved Differential Characteristic Searching Methods.

Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015

A Single Key Scheduling Based Compression Function.

Proceedings of the Risks and Security of Internet and Systems, 2015

Accurate Estimation of the Full Differential Distribution for General Feistel Structures.

Proceedings of the Information Security and Cryptology - 11th International Conference, 2015

Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree.

Proceedings of the Algebraic Informatics - 6th International Conference, 2015

A New (n, 2n) Double Block Length Hash Function Based on Single Key Scheduling.

Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

How TKIP Induces Biases of Internal States of Generic RC4.

Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014

An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users.

J. Applied Mathematics, 2014

Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm.

IACR Cryptology ePrint Archive, 2014

New Integrated Long-Term Glimpse of RC4.

Proceedings of the Information Security Applications - 15th International Workshop, 2014

Secure VANET applications with a refined group signature.

Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014

A Provable Secure Batch Authentication Scheme for EPCGen2 Tags.

Proceedings of the Provable Security - 8th International Conference, 2014

Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.

Proceedings of the Network and System Security - 8th International Conference, 2014

A Multi-purpose Group Signature for Vehicular Network Security.

Proceedings of the 17th International Conference on Network-Based Information Systems, 2014

Distributed Pseudo-Random Number Generation and Its Application to Cloud Database.

Proceedings of the Information Security Practice and Experience, 2014

A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.

Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

A New (n, n) Blockcipher Hash Function: Apposite for Short Messages.

Proceedings of the Ninth Asia Joint Conference on Information Security, 2014

A Scalable and Secure RFID Ownership Transfer Protocol.

Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

RFID Path Authentication, Revisited.

Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

POND: A Novel Protocol for Network Coding Based on Hybrid Cryptographic Scheme.

Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013

Group Signature with relaxed-privacy and revocability for VANET.

IACR Cryptology ePrint Archive, 2013

Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security.

IACR Cryptology ePrint Archive, 2013

Novel strategies for searching RC4 key collisions.

Computers & Mathematics with Applications, 2013

A Fully-Secure RFID Authentication Protocol from Exact LPN Assumption.

Proceedings of the 12th IEEE International Conference on Trust, 2013

Private Multiparty Set Intersection Protocol in Rational Model.

Proceedings of the 12th IEEE International Conference on Trust, 2013

Self-healing Schemes Suitable for Various WSNs.

Proceedings of the Internet and Distributed Computing Systems, 2013

How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs.

Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock.

Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012

Private Two-Party Set Intersection Protocol in Rational Model.

J. Internet Serv. Inf. Secur., 2012

Privacy-preserving Two-party Rational Set Intersection Protocol.

Informatica (Slovenia), 2012

Dynamic attribute-based signcryption without random oracles.

IJACT, 2012

Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack.

IEICE Transactions, 2012

KIMAP: Key-Insulated Mutual Authentication Protocol for RFID

CoRR, 2012

Efficient and Low-Cost RFID Authentication Schemes

CoRR, 2012

APRAP: Another Privacy Preserving RFID Authentication Protocol

CoRR, 2012

An Optimized Signature Verification System for Vehicle Ad hoc NETwork

CoRR, 2012

A Secure and Private RFID Authentication Protocol under SLPN Problem.

Proceedings of the Network and System Security - 6th International Conference, 2012

Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks.

Proceedings of the Information Security Practice and Experience, 2012

A Novel Hybrid IP Traceback Scheme with Packet Counters.

Proceedings of the Internet and Distributed Computing Systems, 2012

Constant-Ciphertext-Size Dual Policy Attribute Based Encryption.

Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012

How to Enhance the Security on the Least Significant Bit.

Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Privacy-Preserving Set Operations in the Presence of Rational Parties.

Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs.

Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011

Efficient and Low-Cost RFID Authentication Schemes.

JoWUA, 2011

Scalar multiplication on Weierstraß elliptic curves from Co-

*Z*arithmetic.
J. Cryptographic Engineering, 2011

Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes.

IEICE Transactions, 2011

New Concrete Relation between Trace, Definition Field, and Embedding Degree.

IEICE Transactions, 2011

Sequential Bitwise Sanitizable Signature Schemes.

IEICE Transactions, 2011

A Timed-Release Proxy Re-Encryption Scheme.

IEICE Transactions, 2011

Generalized Analysis on Key Collisions of Stream Cipher RC4.

IEICE Transactions, 2011

POLISH: Proactive Co-operative LInk Self-Healing for Wireless Sensor Networks.

Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011

Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption.

Proceedings of the Information Security, 14th International Conference, 2011

How to Find Short RC4 Colliding Key Pairs.

Proceedings of the Information Security, 14th International Conference, 2011

A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.

Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Ideal Secret Sharing Schemes with Share Selectability.

Proceedings of the Information and Communications Security - 13th International Conference, 2011

Unconditionally Secure Oblivious Transfer Based on Channel Delays.

Proceedings of the Information and Communications Security - 13th International Conference, 2011

Non-interactive Opening for Ciphertexts Encrypted by Shared Keys.

Proceedings of the Information and Communications Security - 13th International Conference, 2011

Privacy-Preserving Data Mining: A Game-Theoretic Approach.

Proceedings of the Data and Applications Security and Privacy XXV, 2011

Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

Toward Dynamic Attribute-Based Signcryption (Poster).

Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010

A ciphertext-policy attribute-based encryption scheme with constant ciphertext length.

IJACT, 2010

New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences.

IEICE Transactions, 2010

Co-Z Addition Formulae and Binary Ladders on Elliptic Curves.

IACR Cryptology ePrint Archive, 2010

Hidden Credential Retrieval without Random Oracles.

Proceedings of the Information Security Applications - 11th International Workshop, 2010

Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks.

Proceedings of the Information Security Applications - 11th International Workshop, 2010

Generalized RC4 Key Collisions and Hash Collisions.

Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.

Proceedings of the Provable Security - 4th International Conference, 2010

An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.

Proceedings of the Provable Security - 4th International Conference, 2010

A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance.

Proceedings of the Information Security, 2010

RPoK: A Strongly Resilient Polynomial-Based Random Key Pre-Distribution Scheme for Multiphase Wireless Sensor Networks.

Proceedings of the Global Communications Conference, 2010

An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System.

Proceedings of the Public Key Infrastructures, Services and Applications, 2010

Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments.

Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model.

Proceedings of the Information Security and Cryptology - 6th International Conference, 2010

Co-

*Z*Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

Privacy-Preserving Data Mining in Presence of Covert Adversaries.

Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

Efficient Privacy-Preserving Data Mining in Malicious Model.

Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009

A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics.

JIP, 2009

A Selectable

*k*-Times Relaxed Anonymous Authentication Scheme.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length.

Proceedings of the Information Security Practice and Experience, 2009

Elliptic curves with a pre-determined embedding degree.

Proceedings of the IEEE International Symposium on Information Theory, 2009

A Secure RFID Authentication Protocol with Low Communication Cost.

Proceedings of the 2009 International Conference on Complex, 2009

New Correlations of RC4 PRGA Using Nonzero-Bit Differences.

Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier.

Proceedings of the The Forth International Conference on Availability, 2009

A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics.

Proceedings of the The Forth International Conference on Availability, 2009

2008

Cryptography in Computer System Security.

J. UCS, 2008

Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point.

JIP, 2008

Generalized Scalar Multiplication Secure against SPA, DPA, and RPA.

IEICE Transactions, 2008

Simple Certificateless Signature with Smart Cards.

Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

2007

Evaluation of the Security of RC6 against the Chi

^{2}-Attack.
IEICE Transactions, 2007

Mobile Agent Security with Efficient Oblivious Transfer.

Proceedings of the SECRYPT 2007, 2007

Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA.

Proceedings of the Information Security and Cryptology, 2007

2006

Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA.

IEICE Transactions, 2006

2005

n-State Quantum Coin Flipping Protocol.

Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

On the Success Probability of chi

^{2}-attack on RC6.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004

A Generic Construction for Intrusion-Resilient Public-Key Encryption.

Proceedings of the Topics in Cryptology, 2004

Efficient Countermeasures against RPA, DPA, and SPA.

Proceedings of the Cryptographic Hardware and Embedded Systems, 2004

A Fully-Functional Group Signature Scheme over Only Known-Order Group.

Proceedings of the Applied Cryptography and Network Security, 2004

Success Probability in Chi

^{2}-Attacks.
Proceedings of the Applied Cryptography and Network Security, 2004

2003

Intrusion-Resilient Public-Key Encryption.

Proceedings of the Topics in Cryptology, 2003

Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents.

Proceedings of the Communications and Multimedia Security, 2003

Anonymity-Enhanced Pseudonym System.

Proceedings of the Applied Cryptography and Network Security, 2003

Optimized Chi

^{2}-Attack against RC6.
Proceedings of the Applied Cryptography and Network Security, 2003

Evaluation of Anonymity of Practical Anonymous Communication Networks.

Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002

Cryptanalysis of the Reduced-Round RC6.

Proceedings of the Information and Communications Security, 4th International Conference, 2002

A Second-price Sealed-bid Auction with the Discriminant of the p

_{0}-th Root.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

An Improved Fast Signature Scheme without Online Multiplication.

Proceedings of the Financial Cryptography, 6th International Conference, 2002

Known Plaintext Correlation Attack against RC5.

Proceedings of the Topics in Cryptology, 2002

2001

An Agent-Based Model of Anonymous Communication Protocols.

Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001

Efficient "on the Fly" Signature Schemes Based on Integer Factoring.

Proceedings of the Progress in Cryptology, 2001

A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks.

Proceedings of the Information Security and Cryptology, 2001

A Practical English Auction with One-Time Registration.

Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme.

Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000

An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees.

Proceedings of the Information Security, Third International Workshop, 2000

Characterization of Elliptic Curve Traces under FR-Reduction.

Proceedings of the Information Security and Cryptology, 2000

A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability.

Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1998

Efficient Elliptic Curve Exponentiation Using Mixed Coordinates.

Proceedings of the Advances in Cryptology, 1998

1997

Efficient elliptic curve exponentiation.

Proceedings of the Information and Communication Security, First International Conference, 1997

1996

A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves.

Proceedings of the Advances in Cryptology, 1996

1992

Elliptic Curves over F

_{p}Suitable for Cryptosystems.
Proceedings of the Advances in Cryptology, 1992

1991

On Ordinary Elliptic Curve Cryptosystems.

Proceedings of the Advances in Cryptology, 1991