• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Study on secure and safety technology for sensor networks

Research Project

Project/Area Number 21240001
Research Category

Grant-in-Aid for Scientific Research (A)

Allocation TypeSingle-year Grants
Section一般
Research Field Fundamental theory of informatics
Research InstitutionJapan Advanced Institute of Science and Technology

Principal Investigator

MIYAJI Atsuko  北陸先端科学技術大学院大学, 情報科学研究科, 教授 (10313701)

Co-Investigator(Kenkyū-buntansha) HIROSE Syouichi  福井大学, 工学(系)研究科(研究院), 教授 (20228836)
SOSHI Masakazu  広島市立大学, 情報科学研究科, 准教授 (00293142)
OKAZAKI Hiroyuki  信州大学, 工学部, 助教 (50432167)
Project Period (FY) 2009-04-01 – 2015-03-31
Project Status Completed (Fiscal Year 2014)
Budget Amount *help
¥46,410,000 (Direct Cost: ¥35,700,000、Indirect Cost: ¥10,710,000)
Fiscal Year 2013: ¥9,100,000 (Direct Cost: ¥7,000,000、Indirect Cost: ¥2,100,000)
Fiscal Year 2012: ¥9,100,000 (Direct Cost: ¥7,000,000、Indirect Cost: ¥2,100,000)
Fiscal Year 2011: ¥9,100,000 (Direct Cost: ¥7,000,000、Indirect Cost: ¥2,100,000)
Fiscal Year 2010: ¥9,100,000 (Direct Cost: ¥7,000,000、Indirect Cost: ¥2,100,000)
Fiscal Year 2009: ¥10,010,000 (Direct Cost: ¥7,700,000、Indirect Cost: ¥2,310,000)
Keywords暗号・認証等 / センサーネットワーク / 暗号・承認等 / センサネットワーク
Outline of Final Research Achievements

Wireless Sensor Networks (WSNs) consist of battery-operated, limited memory and computational power sensor nodes. It is important to achieve secure communication among WSN. In this research, we have studied a group key exchange (GKE), application of hash functions to GKE, formal security proof, and simulation of GKE. The following are our results. 1.We have proposed T-robust scalable GKE with communicational and computational complexity O(log n) for n parties. Our GKE not only has a resistance to party failures resulting from party crashes, run-down batteries, and network failures, but also satisfies scalability to parties’ environment such as computational resources, batteries, etc. 2.We have redesigned GKE using bilinear pairings to reduce the computational and communicational complexity among a small group of parties. We have also redesigned GKE among a large number of parties, where each party is in a different environment.

Report

(6 results)
  • 2014 Final Research Report ( PDF )
  • 2013 Annual Research Report
  • 2012 Annual Research Report
  • 2011 Annual Research Report
  • 2010 Annual Research Report
  • 2009 Annual Research Report
  • Research Products

    (208 results)

All 2015 2014 2013 2012 2011 2010 2009 Other

All Journal Article (137 results) (of which Peer Reviewed: 99 results,  Open Access: 19 results) Presentation (69 results) (of which Invited: 9 results) Book (2 results)

  • [Journal Article] enPiT における教育効果測定の実践と評価2015

    • Author(s)
      山本雅基,小林隆志,宮地充子,奥野拓,粂野文洋,櫻井浩子,海上智昭,春名修介,井上克郎
    • Journal Title

      コンピュータソフトウェア

      Volume: Vol. 32, No.1 Pages: 213-219

    • NAID

      40020582107

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Self-healing wireless sensor networks2015

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: - Issue: 10 Pages: 2547-2568

    • DOI

      10.1002/cpe.3434

    • NAID

      120005624453

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] How TKIP induces biases of internal states of generic RC42015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, XXX(2015), Springer-Verlag

      Volume: -

    • NAID

      120005767114

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Linear Correlations related to State Information of RC4 PRGA2015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 22nd International Workshop on Fast Software Encryption (FSE 2015), Lecture Notes in Computer Science, Springer-Verlag

      Volume: -

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA 2015), IEEE

      Volume: - Pages: 564-570

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-2562015

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      The 17th International Conference on Information and Security Cryptology, ICISC 2014, Lecture Notes in Computer Science, 8949(2015), Springer-Verlag

      Volume: 8949 Pages: 271-285

    • NAID

      110009778465

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A new (n, n) blockcipher hash function using Feistel Network: Apposite for RFID Security2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      International Conference on Computational Intelligence in Data Mining (ICCIDM 2014), Lecture Notes in Computer Science, Volume 33(2015), Springer-Verlag

      Volume: Volume 33 Pages: 519-528

    • NAID

      120005678257

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] New Integrated Long-Term Glimpse of RC42015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science, Volume 8909(2015), Springer-Verlag

      Volume: 8909 Pages: 137-149

    • NAID

      120005691304

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] SKENO: Secret key encryption with non-interactive opening2014

    • Author(s)
      Jiageng Chen, Keita Emura, and Atsuko Miyaji
    • Journal Title

      Journal of Mathematical Cryptology

      Volume: - Issue: 2 Pages: 63-74

    • DOI

      10.1515/jmc-2014-0010

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Generic constructions of secure-channel free searchable encryption with adaptive security2014

    • Author(s)
      Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, and Kazumasa Omote
    • Journal Title

      Wiley Security and Communication Networks

      Volume: - Issue: 8 Pages: 1547-1560

    • DOI

      10.1002/sec.1103

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] ユビキタスネットワークにおけるセキュリティ技術-積極的利用を促すセキュリティ技術-2014

    • Author(s)
      宮地充子
    • Journal Title

      「電気評論」

      Volume: 夏季増刊号特集 Pages: 12-15

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A new (n, n) Blockcipher based Hash Function for Short Messages2014

    • Author(s)
      Atsuko Miyaji, Mazumder Rashed and Tsuyoshi Sawada
    • Journal Title

      2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS), IEEE

      Volume: - Pages: 56-63

    • NAID

      120006675662

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Provable Secure Batch Authentication Scheme for EPCGen2 Tags2014

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 8th International Conference on Provable Security (Provsec 2014), Lecture Notes in Computer Science, Volume 8782(2014), Springer-Verlag

      Volume: 8782 Pages: 103-116

    • NAID

      120005657979

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock2014

    • Author(s)
      Jiageng Chen, Yuichi Futa, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 8th International Conference on Network and System Security (NSS 2014), Lecture Notes in Computer Science, 8792(2014), Springer-Verlag

      Volume: 8792 Pages: 184-197

    • NAID

      120005661888

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Secure VANET Applications with a refined Group Signature2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST)

      Volume: - Pages: 199-206

    • NAID

      120006675652

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A multi-purpose Group Signature for Vehicular Network Security2014

    • Author(s)
      Mohammad Saiful Islam Mamun, Atsuko Miyaji, and Hiroaki Takada
    • Journal Title

      2014 17th International Conference on Network-Based Information Systems (NBiS)

      Volume: - Pages: 511-516

    • NAID

      120006675661

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme2014

    • Author(s)
      Cheng-Qiang Huangy, Atsuko Miyajiy, Long-Hai Li, and Shang-Mei Xu
    • Journal Title

      2014 IEEE International Conference on Computer and Information Technology (CIT)

      Volume: - Pages: 373-387

    • NAID

      120006675656

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Distributed Pseudo-Random Number Generation and its application to Cloud Database2014

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 10th Information Security Practice and Experience Conference(ISPEC 2014), Lecture Notes in Com- puter Science, 8434(2014), Springer-Verlag

      Volume: 8434 Pages: 373-387

    • NAID

      120005602733

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Scalable and Secure RFID Ownership Transfer Protocol2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE

      Volume: - Pages: 343-350

    • NAID

      120007005446

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] RFID Path Authentication, Revisited2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE

      Volume: - Pages: 245-252

    • NAID

      120007005447

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] An r-hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users2014

    • Author(s)
      Keita Emura, Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      Journal of Applied Mathematics

      Volume: 2014

    • NAID

      120005624449

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An efficient batch verification system for large scale VANET2014

    • Author(s)
      Jiageng Chen, Mohammad S.I. Mamun, Atsuko Miyaji
    • Journal Title

      Intl. J. of Security and Communication Networks SCN

      Volume: Online Issue: 2 Pages: 298-310

    • DOI

      10.1002/sec.980

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A privacy-preserving efficient RFID authentication protocol from SLPN assumption2014

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications

      Volume: 印刷中

    • NAID

      120005661887

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Submodule of free Z-module2014

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 21(4) Issue: 4 Pages: 275-284

    • DOI

      10.2478/forma-2013-0029

    • NAID

      120007101157

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock2013

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, 8128(2013), Springer-Verlag

      Volume: 8128 Pages: 1-15

    • NAID

      120005367951

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A fully-secure RFID authentication protocol from exact LPN assumption2013

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communica- tions (IEEE TrustCom’13), IEEE

      Volume: - Pages: 102-109

    • NAID

      120006675368

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Private Multiparty Set Intersection Protocol in Rational Model2013

    • Author(s)
      Keita Emura, Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communica- tions (IEEE TrustCom’13), IEEE

      Volume: - Pages: 431-438

    • NAID

      120006675373

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock2013

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops,, Lecture Notes in Computer Science,Springer-Verlag

      Volume: 8128 Pages: 1-15

    • NAID

      120005367951

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Novel Strategies for Searching RC4 Key Collisions2013

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      Computers & Mathematics with Applications

      Volume: 66 Pages: 1-10

    • NAID

      120005298575

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Private Multiparty Set Intersection Protocol in Rational Model2013

    • Author(s)
      Keita Emura, Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13)

      Volume: CD-ROM Pages: 431-438

    • DOI

      10.1109/trustcom.2013.54

    • NAID

      120006675373

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A fully-secure RFID authentication protocol from exact LPN assumption2013

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13)

      Volume: CD-ROM Pages: 102-109

    • DOI

      10.1109/trustcom.2013.17

    • NAID

      120006675368

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Self-healing Schemes Suitable for Various WSNs2013

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      The 6th International Conference on Internet and Dsitributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag

      Volume: 8223 Pages: 92-105

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 段数を削減したPRESENTを用いた倍ブロック長圧縮関数に対する衝突攻撃2013

    • Author(s)
      小林哲也, 廣瀬勝一
    • Journal Title

      電子情報通信学会論文誌A

      Volume: J96-A Pages: 541-550

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Formalization of the Advanced Encryption Standard. Part I2013

    • Author(s)
      Kenichi Arai, Hiroyuki Okazaki
    • Journal Title

      Formalized Mathematics

      Volume: 21(3) Issue: 3 Pages: 171-184

    • DOI

      10.2478/forma-2013-0019

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Gaussian Integers2013

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Daich Mizushima, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 21(2) Issue: 2 Pages: 115-125

    • DOI

      10.2478/forma-2013-0013

    • NAID

      120007101136

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Formal Definition of Probability on Finite and Discrete Sample Space for Proving Security of Cryptographic Systems Using Mizar2013

    • Author(s)
      Hiroyuki Okazaki, Yuichi Futa, Yasunari Shidama
    • Journal Title

      Artificial Intelligence Research

      Volume: 2(4) Issue: 4 Pages: 37-48

    • DOI

      10.5430/air.v2n4p37

    • NAID

      120007105032

    • Related Report
      2012 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Formalization of Definitions and Theorems Related to an Elliptic Curve Over a Finite Prime Field by Using Mizar2013

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama
    • Journal Title

      Journal of Automated Reasoning

      Volume: 50(2) Pages: 161-172

    • NAID

      120007105033

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Free Z-module2013

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 20(4) Pages: 275-280

    • NAID

      120007101126

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Posterior Probability on Finite Set2013

    • Author(s)
      Hiroyuki Okazaki
    • Journal Title

      Formalized Mathematics

      Volume: 20(4) Pages: 257-263

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Extended Euclidean Algorithm and CRT Algorithm2013

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 20(2) Pages: 175-179

    • NAID

      120007101129

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Dynamic Attribute-based Signcryption without RandomOracles2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: 2(3) Pages: 199-211

    • NAID

      120004664487

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack2012

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E95-A(12) Pages: 2148-2159

    • NAID

      10031161346

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Novel Hybrid IP Traceback Scheme with Packet Counters2012

    • Author(s)
      Tomoyuki Karasawa, Masakazu Soshi and Atsuko Miyaji
    • Journal Title

      The 5th International Conference on Internet and Dsitributed Computing Systems, IDCS 2012,Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7646 Pages: 71-84

    • NAID

      120005147911

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] How to Enhance the Security on the Least Significant Bit2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      The 4th International Symposium on Cyberspace Safety and Security , CANS 2012, Springer-Verlag

      Volume: 7712 Pages: 263-279

    • NAID

      120005147913

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Constant-Ciphertext-Size Dual Policy Attribute Based Encryption2012

    • Author(s)
      Atsuko Miyaji and Phuong V.X. TRAN
    • Journal Title

      The 11th International Conference on Cryptology and Network Security, CSS 2012, Springer-Verlag

      Volume: 7672 Pages: 400-413

    • NAID

      120005147912

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An Optimized Signature Verification System for Vehicle Ad hoc NETwork2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 8th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM2012, IEEE

      Volume: - Pages: 1-8

    • NAID

      120006675329

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Secure and private RFID authentication protocol under SLPN problem2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 6th International Conference on Network and System Security , NSS 2012, Springer-Verlag

      Volume: 7645 Pages: 476-489

    • NAID

      120005147914

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks2012

    • Author(s)
      Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 8th International Conference on Information Security Practice and Experience, ISPEC 2012, Lecture Notes in Computer Science

      Volume: 7232 Pages: 245-258

    • NAID

      120004247387

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Consideration for multi-threshold multi-secret sharing schemes2012

    • Author(s)
      Atsushi Waseda and Masakazu Soshi
    • Journal Title

      International Symposium on Information Theory and Applications (ISITA 2012)

      Volume: 96-A Pages: 265-269

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Dynamic Attribute-based Signcryption without Random Oracles2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: Vol. 2 Pages: 199-211

    • NAID

      120004664487

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 14th International Conference on Information Security and Cryptology, ICISC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7259 Pages: 186-203

    • NAID

      120004462279

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs2012

    • Author(s)
      Tatsuro Iida, Keita Emura, Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      The 8th International Workshop on Heterogeneous Wireless Networks (AINA 2012 Workshops), HWISE 2012, IEEE

      Volume: - Pages: 552-557

    • NAID

      120007005471

    • Related Report
      2011 Annual Research Report
  • [Journal Article] Privacy-preserving Set Operations in the Presence of Rational Parties2012

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 5th International Symposium on Mining and Web (AINA 2012 Workshops), MAW 2012, IEEE

      Volume: - Pages: 869-874

    • NAID

      120007005472

    • Related Report
      2011 Annual Research Report
  • [Journal Article] Jacobian 座標系族の加法公式の改良2012

    • Author(s)
      Ratemo Alice Harriet Mwango, Yang Cuinan, Atsuko Miyaji
    • Journal Title

      The 2012 Symposium on Cryptography and Information Security

      Volume: SCIS2012- 1B2-2E

    • Related Report
      2011 Annual Research Report
  • [Journal Article] 初期差分を用いたRC4 PRGAの解析2012

    • Author(s)
      市丸 祐, 宮地 充子
    • Journal Title

      The 2012 Symposium on Cryptography and Information Security

      Volume: SCIS2012- 2C1-3

    • Related Report
      2011 Annual Research Report
  • [Journal Article] Improved Left-to-Right Scalar Multiplication Algorithms2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2012 (2012-3) Pages: 141-148

    • NAID

      110009545770

    • Related Report
      2011 Annual Research Report
  • [Journal Article] Operations of Points on Elliptic Curve in Projective Coordinates2012

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Daichi Mizushima, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 20(1) Pages: 87-95

    • NAID

      120007101132

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Formalization of the Data Encryption Standard2012

    • Author(s)
      Hiroyuki Okazaki, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 20(2) Pages: 125-146

    • NAID

      120007101130

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Scalar Multiplication on Weierstrass Elliptic Curves from Co-Z Arithmetic2011

    • Author(s)
      Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, andAlexandre Venelli
    • Journal Title

      Journal of Cryptographic Engineering (2011),Springer-Verlag

      Volume: Vol. 1 Pages: 161-176

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Concrete Relation between Trace, Definition Field, and Embedding Degree2011

    • Author(s)
      Shoujirou Hirasawa and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals.

      Volume: E94-A Pages: 1368-1374

    • NAID

      10029802473

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] KIMAP: Key-Insulated Mutual Authentication Protocol for RFID2011

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Automated Identification Technology (IJAIT)

      Volume: Vol. 3(2) Pages: 61-74

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Timed-Release Proxy Re-Encryption Scheme2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      IEICE Trans., Fundamentals.

      Volume: E94-A Pages: 1682-1695

    • NAID

      10030190459

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient and Low-Cost RFID Authentication Schemes2011

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman, and Masakazu Soshi
    • Journal Title

      Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA)

      Volume: Vol. 2 Pages: 4-25

    • NAID

      120003367901

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Privacy-Preserving Data Mining: A Game-theoretic Approach2011

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSEC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6818 Pages: 186-200

    • NAID

      120003184342

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Toward Dynamic Attribute-Based Signcryption (Poster)2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6812 Pages: 439-443

    • NAID

      120003184343

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] T-Robust Group Key Exchange Protocol with O(log n) complexity2011

    • Author(s)
      Tetsuya Hatano, Atsuko Miyaji, and Takashi Sato
    • Journal Title

      The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6812 Pages: 289-207

    • Related Report
      2011 Annual Research Report 2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks2011

    • Author(s)
      Tatsuro Iida, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6976 Pages: 253-267

    • NAID

      120003752197

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7001 Pages: 102-118

    • NAID

      120003752193

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] How to Find Short RC4 Colliding Key Pairs2011

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7001 Pages: 32-46

    • NAID

      120003752194

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Non-interactive Opening for Ciphertexts Encrypted by Shared Keys2011

    • Author(s)
      Jiageng Chen, Keita Emura, and Atsuko Miyaji
    • Journal Title

      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7043 Pages: 57-68

    • NAID

      120003752196

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Ideal Secret Sharing Schemes with Share Selectability2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, and Masakazu Soshi
    • Journal Title

      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7043 Pages: 143-157

    • NAID

      120003752195

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Unconditionally Secure Oblivious Transfer Based on Channel Delays2011

    • Author(s)
      Kai-Yuen Cheong and Atsuko Miyaji
    • Journal Title

      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7043 Pages: 112-120

    • NAID

      120003752198

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 汚染攻撃に耐性を持つXORネットワーク符号化の比較・評価2011

    • Author(s)
      伊澤 和也, 宮地 充子, 面 和成
    • Journal Title

      Computer Security Symposium

      Volume: CSS2011-2B4-4 Pages: 498-503

    • NAID

      170000067525

    • Related Report
      2011 Annual Research Report
  • [Journal Article] An Optimized Right-to-Left Scalar Mutiplication Algorithm Resistant Against Safe-Error Attack, SPA and DPA2011

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2011 (2011-11) Pages: 109-114

    • Related Report
      2011 Annual Research Report
  • [Journal Article] Efficient Privacy Preserving Set Operations2011

    • Author(s)
      Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2011 (2011-11) Pages: 115-122

    • NAID

      10031099403

    • Related Report
      2011 Annual Research Report
  • [Journal Article] A Note on Practical Key Derivation Functions2011

    • Author(s)
      Shoichi Hirose
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E94-A Issue: 8 Pages: 1764-1767

    • DOI

      10.1587/transfun.E94.A.1764

    • NAID

      10030190662

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing2011

    • Author(s)
      Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida
    • Journal Title

      Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7259 Pages: 7259-7259

    • Related Report
      2011 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Scalar Multiplication on Weierstrass Elliptic Curves from Co-Z Arithmetic2011

    • Author(s)
      Raveen R.Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, Alexandre Venelli
    • Journal Title

      Journal of Cryptographic Engineering

      Volume: Vol.1 Pages: 161-176

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Concrete Relation between Trace, Definition Field, and Embedding Degree2011

    • Author(s)
      Shoujirou Hirasawa, Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E94-A Pages: 1368-1374

    • NAID

      10029802473

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Privacy-Preserving Data Mining : A Game-theoretic Approach2011

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSEC 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6818 Pages: 186-200

    • NAID

      120003184342

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Toward Dynamic Attribute-Based Signcryption2011

    • Author(s)
      Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6812(Poster) Pages: 439-443

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Sequential Bitwise Sanitizable Signature Schemes2011

    • Author(s)
      Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E94-A Pages: 392-404

    • NAID

      10027987169

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments2011

    • Author(s)
      Yvo Desmedt, Atsuko Miyaji
    • Journal Title

      The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science

      Volume: 6584 Pages: 236-254

    • NAID

      120003752191

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] HC-128の内部状態非独立性について2011

    • Author(s)
      陳嘉耕, 柿脇一穂, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3B1-2

    • Related Report
      2010 Annual Research Report
  • [Journal Article] ARMを利用した楕円曲線暗号の効率的な実装2011

    • Author(s)
      永田智芳, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3D2-2

    • Related Report
      2010 Annual Research Report
  • [Journal Article] Redesigning Group Key Exchange Protocol based on Bilinear Pairing2011

    • Author(s)
      Yvo Desmedt, Atsuko Miyaji
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3F4-3

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 実用的な耐故障性を実現する効率的なグループ鍵共有法2011

    • Author(s)
      佐藤高嗣, 宮地充子
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-3F4-4

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 匿名IDベース暗号を用いたセキュアチャネルフリー検索可能公開鍵暗号方式の一般的構成法2011

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      The 2011 Symposium on Cryptography and Information Security

      Volume: SCIS2011-4C2-6

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 差分情報を利用したRC4 PRGA内部状態復元アルゴリズムの改良2011

    • Author(s)
      柿脇一穂, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 57-64

    • NAID

      110008689674

    • Related Report
      2010 Annual Research Report
  • [Journal Article] メモリを考慮した事前計算点生成手法の提案2011

    • Author(s)
      笹原大揮, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 159-166

    • NAID

      110008689691

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 耐故障性を持つグループ鍵共有法の性能評価2011

    • Author(s)
      佐藤高嗣, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep

      Volume: ISEC2010-99 Pages: 167-175

    • NAID

      110008689692

    • Related Report
      2010 Annual Research Report
  • [Journal Article] カウンタを用いたIPトレースバック方式の評価2011

    • Author(s)
      唐沢智之, 双紙正和, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52

    • Related Report
      2010 Annual Research Report
  • [Journal Article] ワイヤレスセンサネットワークにおける自己治癒機能を有する鍵共有方式の検討2011

    • Author(s)
      飯田達朗, 面和成, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52

    • NAID

      110008583565

    • Related Report
      2010 Annual Research Report
  • [Journal Article] ワイヤレスセンサネットワークにおけるMicaZを用いたデータアグリゲーション実装の検討2011

    • Author(s)
      伊澤和也, 面和成, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2011-CSEC-52

    • Related Report
      2010 Annual Research Report
  • [Journal Article] Normal Subgroup of Product of Groups2011

    • Author(s)
      Hiroyuki Okazaki, Kenichi Arai, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 19(掲載確定)

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Set of Points on Elliptic Curve in Projective Coordinates2011

    • Author(s)
      Yuichi Futa, Hiroyuki Okazaki, Yasunari Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 19(掲載確定)

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Akito Nomura, Kazumasa Omote, Masakazu Soshi
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: Vol.2 Pages: 46-59

    • NAID

      120002260310

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences2010

    • Author(s)
      Atsuko Miyaji, Masahiro Sukegawa
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E93-A Pages: 1066-1077

    • NAID

      10026864635

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 6th Information Security Practice and Experience Conference, ISPEC 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6047 Pages: 30-44

    • NAID

      120002260312

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Generalized RC4 Key Collisions and Hash Collisions2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 7th Conference on Security and Cryptography for Networks, SCN 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6280 Pages: 73-87

    • NAID

      120002753787

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Co-Z Addition Formulae and Binary Ladders on Elliptic Curves2010

    • Author(s)
      Raveen Ravinesh Goundar, Marc Joye, Atsuko Miyaji
    • Journal Title

      The 12th Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6225 Pages: 65-79

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An Anonymous Designated Verifier Signature Scheme with Revocation : How to Protect a Company's Reputation2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6402 Pages: 184-198

    • NAID

      120002710166

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6402 Pages: 200-213

    • NAID

      120002710165

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] RPOK : A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks2010

    • Author(s)
      Hisashige Ito, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010

      Pages: 1-5

    • NAID

      120006674763

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 7th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2010, Lecture Notes in Computer Science

      Volume: (掲載確定)

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6513 Pages: 135-149

    • NAID

      120003184340

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Efficient Privacy-Preserving Data Mining in Malicious Model2010

    • Author(s)
      Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6440 Pages: 429-440

    • NAID

      120002737938

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Privacy-Preserving Data Mining in Presence of Covert Adversaries2010

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman
    • Journal Title

      The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6440 Pages: 370-382

    • NAID

      120002737939

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model2010

    • Author(s)
      Jiageng Chen, Atsuko Miyaji
    • Journal Title

      The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science

      Volume: (掲載確定)

    • NAID

      120003752190

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Secure Data Aggregation in Wireless Sensor Networks2010

    • Author(s)
      Atsuko Miyaji, Kazumasa Omote
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1D2-4 Pages: 177-182

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 差分情報を利用したRC4 PRGA内部状態復元アルゴリズムの提案2010

    • Author(s)
      柿脇一穂, 宮地充子
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1B1-2 Pages: 31-36

    • Related Report
      2010 Annual Research Report
  • [Journal Article] マルチフェーズワイヤレスセンサネットワークにおける効率的かつセキュアな鍵共有方式2010

    • Author(s)
      飯田達朗, 宮地充子, 面和成
    • Journal Title

      Computer Security Symposium

      Volume: CSS2010-1D2-3 Pages: 183-188

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 削除機能付き匿名検証者指定署名とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ICSS2010-47 Pages: 17-22

    • NAID

      110008152383

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 時限式プロキシ再暗号化方式とその応用2010

    • Author(s)
      江村恵太, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ICSS2010-48 Pages: 23-28

    • NAID

      110008152384

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 効率的な3倍算公式を用いたスカラー倍算手法の提案2010

    • Author(s)
      笹原大揮, 宮地充子
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2010-CSEC-51

    • Related Report
      2010 Annual Research Report
  • [Journal Article] 暗号における擬似乱数列とその生成法2010

    • Author(s)
      廣瀬勝一
    • Journal Title

      システム制御情報学会誌

      Volume: 54 Pages: 192-197

    • NAID

      110007610246

    • Related Report
      2010 Annual Research Report
  • [Journal Article] Hidden Credential Retrieval Without Random Oracles2010

    • Author(s)
      Atsuko Miyaji, Mohammad Shahriar Rahman, Masakazu Soshi
    • Journal Title

      The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 6513 Pages: 160-174

    • NAID

      120003184341

    • Related Report
      2010 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 新しい加法公式に基づく効率的なスカラー倍算について2010

    • Author(s)
      横川広幸, 宮地充子, 笹原大揮
    • Journal Title

      The 2010 Symposium on Cryptography and Information Security

      Volume: SCIS2010, 2D4-3

    • Related Report
      2009 Annual Research Report
  • [Journal Article] 新しい加法公式に基づく効率的な予備計算手法について2010

    • Author(s)
      笹原大揮, 宮地充子, 横川広幸
    • Journal Title

      The 2010 Symposium on Cryptography and Information Security

      Volume: SCIS2010, 2D4-4

    • Related Report
      2009 Annual Research Report
  • [Journal Article] A New Class of RC4 Colliding Key Pair2010

    • Author(s)
      J.Chen, A.Miyaji
    • Journal Title

      The 2010 Symposium on Cryptography and Information Security

      Volume: SCIS2010, 3D2-4

    • Related Report
      2009 Annual Research Report
  • [Journal Article] ワイヤレスセンサネットワークにおけるグループ鍵分配プロトコルの考察2010

    • Author(s)
      村上大樹, 双紙正和
    • Journal Title

      コンピュータセキュリティ研究会

      Volume: CSEC-48

    • NAID

      110007990977

    • Related Report
      2009 Annual Research Report
  • [Journal Article] ワイヤレスセンサネットワークのためのグループ鍵分配プロトコルの提案2010

    • Author(s)
      村上大樹, 双紙正和
    • Journal Title

      暗号と情報セキュリティシンポジウム

      Volume: SCIS2010, 3C3-3

    • Related Report
      2009 Annual Research Report
  • [Journal Article] Probability Measure on Discrete Spaces and Algebra of Real Valued Random Variables2010

    • Author(s)
      H.Okazaki, Y.Shidama
    • Journal Title

      Formalized Mathematics

      Volume: 18 Pages: 213-217

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      IPSJ Journal

      Volume: Vol.50 Pages: 1968-1983

    • NAID

      120006674342

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length2009

    • Author(s)
      K.Emura, A.Miyaji, A.Nomura, K.Omote, M.Soshi
    • Journal Title

      The 5th Information Security Practice and Experience Conference, ISPEC 2009, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 5451 Pages: 13-23

    • NAID

      120002260310

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Elliptic curves with a pre-determined embedding degree2009

    • Author(s)
      S.Hirasawa, A.Miyaji
    • Journal Title

      The 2009 IEEE International Symposium on Information Theory, ISIT 2009

      Pages: 2391-2395

    • NAID

      110007324412

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Journal Title

      ACISP 2009, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 5594 Pages: 134-152

    • NAID

      120002260315

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      Proceedings of 4th International Workshop on Security, IWSEC 2009-Short Papers-, Co-organized byIEICE and IPSJ

      Pages: 49-63

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Selectable k-Times Relaxed Anonymous Authentication Scheme2009

    • Author(s)
      K.Emura, A.Miyaji, K.Omote
    • Journal Title

      The 10th International Workshop on Information Security Applications, WISA 2009, Lecture Notes in Computer Science, Springer-Verlag

      Volume: 5932 Pages: 281-295

    • NAID

      120002260313

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Pairing-based Group Key Exchange with an Edge-based Tree2009

    • Author(s)
      A.Miyaji, Y.Desmedt
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ISEC2009-11 Pages: 69-76

    • NAID

      110007161986

    • Related Report
      2009 Annual Research Report
  • [Journal Article] 木構造を用いた鍵管理プロトコルについて2009

    • Author(s)
      宮地充子, 吉田勝彦
    • Journal Title

      IPSJ SIG Tech.Rep.

      Volume: 2009-CSEC-45

    • NAID

      10026676728

    • Related Report
      2009 Annual Research Report
  • [Journal Article] 効率的な耐故障性をもつ鍵共有方式2009

    • Author(s)
      波多野哲也, 宮地充子
    • Journal Title

      Computer Security Symposium

      Volume: CSS2009-B8-3 Pages: 817-822

    • NAID

      170000065973

    • Related Report
      2009 Annual Research Report
  • [Journal Article] 差分を持つ内部状態を用いたRC4 PRGAの内部状態の解読2009

    • Author(s)
      網代充希, 宮地充子
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ISEC2009-65 Pages: 95-100

    • NAID

      110007504897

    • Related Report
      2009 Annual Research Report
  • [Journal Article] マルチフェーズワイヤレスセンサネットワークにおける効率的な鍵事前配布方式2009

    • Author(s)
      伊藤久繁, 宮地充子, 面和成
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ISEC2009-66 Pages: 101-106

    • NAID

      110007504898

    • Related Report
      2009 Annual Research Report
  • [Journal Article] Authenticating RFID Tags using Insulated Keys2009

    • Author(s)
      M.S.Rahman, A.Miyaji
    • Journal Title

      IEICE Japan Tech.Rep.

      Volume: ICSS2009-59 Pages: 31-36

    • NAID

      110007520922

    • Related Report
      2009 Annual Research Report
  • [Journal Article] Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function2009

    • Author(s)
      S.Hirose, H.Kuwakado
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: E92-A Pages: 2447-2453

    • NAID

      10026860049

    • Related Report
      2009 Annual Research Report
    • Peer Reviewed
  • [Journal Article] ワイヤレスセンサネットワークにおける柔軟な鍵共有プロトコルの検討2009

    • Author(s)
      村上大樹, 双紙正和
    • Journal Title

      電気・情報関連学会中国支部第60回連合大会

      Pages: 367-368

    • Related Report
      2009 Annual Research Report
  • [Presentation] RFID における擬似乱数生成器の安全性に関する考察2015

    • Author(s)
      佐藤洋行, 宮地充子, 蘇春華
    • Organizer
      ICSS2014
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Related Report
      2013 Annual Research Report
  • [Presentation] 楕円曲線のトレースと埋め込み次数の関係について2015

    • Author(s)
      宮地充子, 田中覚
    • Organizer
      ICSS2014
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Related Report
      2013 Annual Research Report
  • [Presentation] サイドチャネル攻撃耐性を持つスカラー倍算アルゴリズム2015

    • Author(s)
      木藤圭亮, 宮地充子, 高橋良太
    • Organizer
      ICSS2014
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Related Report
      2013 Annual Research Report
  • [Presentation] ブラウザにおけるSSL/TLS の証明書検証の改善2015

    • Author(s)
      亀川慧, 宮地充子, 布田裕一
    • Organizer
      ICSS2014
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Related Report
      2013 Annual Research Report
  • [Presentation] Double-Triple の公式を用いた新しいスカラー倍算2015

    • Author(s)
      高橋良太, 宮地充子
    • Organizer
      The 32nd Symposium on Cryptography and Information Security, SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2013 Annual Research Report
  • [Presentation] WPA におけるRC4 の内部状態に関する新しい線形相関2015

    • Author(s)
      伊藤竜馬, 宮地充子
    • Organizer
      The 32nd Symposium on Cryptography and Information Security, SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2013 Annual Research Report
  • [Presentation] SSL/TLS における証明書検証機能改善に関する研究2014

    • Author(s)
      亀川慧, 宮地充子, 布田裕一
    • Organizer
      ISEC2014
    • Place of Presentation
      兵庫県立大学(兵庫県神戸市)
    • Year and Date
      2014-11-21 – 2014-11-22
    • Related Report
      2013 Annual Research Report
  • [Presentation] Further Application on RFID with Privacy-Preserving2014

    • Author(s)
      Atsuko Miyaji
    • Organizer
      The 1st International Conference on Future Data and Security Engineering, FDSE 2014.
    • Place of Presentation
      Ho Chi Minh City, Vietnam
    • Year and Date
      2014-11-19 – 2014-11-21
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] 仮想環境化における擬似乱数生成器-Whirlwind-の安全性に関する考察2014

    • Author(s)
      佐藤洋之, 宮地充子, 蘇春華
    • Organizer
      Computer Security Symposium,CSS2014
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2013 Annual Research Report
  • [Presentation] 効率的な多機関のPrivate Set Intersection2014

    • Author(s)
      西田昌平, 宮地充子
    • Organizer
      Computer Security Symposium,CSS2014
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2013 Annual Research Report
  • [Presentation] 安全・安心社会を実現するセキュリティ基盤2014

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会第13 回情報科学技術フォーラム
    • Place of Presentation
      筑波大学(茨木県つくば市)
    • Year and Date
      2014-09-03 – 2014-09-05
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] 情報セキュリティの標準化動向について- ISO/IEC JTC1/SC27/WG2 2014 年4月香港会議報告-2014

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊健司, 渡辺創, 松尾真一郎
    • Organizer
      電子情報通信学会
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2013 Annual Research Report
    • Invited
  • [Presentation] How to Construct PRNGs for distributed Cloud Databases2014

    • Author(s)
      Jiageng Chen,Atsuko Miyaji,and Chunhua Su
    • Organizer
      CSEC2014
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2013 Annual Research Report
  • [Presentation] Perfect Conjugate-Addition Sequence を用いた新たな事前計算テーブル計算手法について2014

    • Author(s)
      高橋良太, 宮地充子
    • Organizer
      ISEC2014
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2013 Annual Research Report
  • [Presentation] RC4 のLong-Term Glimpse における新しいNegative Biases2014

    • Author(s)
      伊藤竜馬, 宮地充子
    • Organizer
      ISEC2014
    • Place of Presentation
      機械振興会館(東京都港区)
    • Year and Date
      2014-05-09
    • Related Report
      2013 Annual Research Report
  • [Presentation] 社会保障・税の番号制度の実務的課題 -プライバシー保護の技術的側面2013

    • Author(s)
      宮地充子
    • Organizer
      第61回情報処理学会 電子化知的財産・社会基盤研究会
    • Place of Presentation
      金沢工業大学 扇が丘キャンパス
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] 医療情報と暗号化・匿名化2013

    • Author(s)
      宮地充子
    • Organizer
      MELT up 講演会
    • Place of Presentation
      中央大学後楽園キャンパス
    • Related Report
      2012 Annual Research Report
    • Invited
  • [Presentation] Formalization of Gaussian Integers, Gaussian Rational Numbers, and Their Algebraic Structures with Mizar2012

    • Author(s)
      Yuichi Futa, Daichi Mizushima,Hiroyuki Okazaki
    • Organizer
      2012 International Symposium on Information Theory and its Applications (ISITA2012)
    • Place of Presentation
      Honolulu, Hawaii, USA
    • Related Report
      2011 Annual Research Report
  • [Presentation] Formalization Verification of AES Using the Mizar Proof Checker2012

    • Author(s)
      Hiroyuki Okazaki, Kenichi Arai, Yasunari Shidama
    • Organizer
      2012 International Conference on Foundations of Computer Science (FCS'12)
    • Place of Presentation
      Las Vegas, Nevada, USA
    • Related Report
      2011 Annual Research Report
  • [Presentation] 複数閾値複数秘密分散に関する一考察2012

    • Author(s)
      早稲田篤志, 双紙正和
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急 (金沢市)
    • Related Report
      2011 Annual Research Report
  • [Presentation] 形式化数学記述言語 Mizar による楕円曲線の形式化2012

    • Author(s)
      水島大地, 布田裕一, 岡崎裕之
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      2012年暗号と情報セキュリティシンポジウム 金沢エクセルホテル東急 (金沢市)
    • Related Report
      2011 Annual Research Report
  • [Presentation] ProVerifによるペアリングの形式化に関する考察2012

    • Author(s)
      荒井研一, 岡崎裕之
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急 (金沢市)
    • Related Report
      2011 Annual Research Report
  • [Presentation] Model of Blockcipher-Based Hash Functions Suitable for Memory-Constrained Devices2011

    • Author(s)
      廣瀬勝一, 桑門秀典, 吉田博隆
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県)
    • Year and Date
      2011-01-28
    • Related Report
      2010 Annual Research Report
  • [Presentation] Formal Verification of DES Using the Mizar Proof Checker2011

    • Author(s)
      Hiroyuki Okazaki, Kenichi Arai, Yasunari Shidama
    • Organizer
      2011 International Conference on Foundations of Computer Science (FCS'11)
    • Place of Presentation
      Monte Carlo Resort hotel (Las Vegas, Nevada, USA)
    • Related Report
      2011 Annual Research Report
  • [Presentation] Formal Definition of Probability and Probabilistic Function on Finite and Discrete Sample Space for Proving Security of Cryptographic Systems Using Mizar2011

    • Author(s)
      Hiroyuki Okazaki, Yasunari Shidama, Yuichi Futa
    • Organizer
      The 2011 Joint Mathematics Meetings
    • Place of Presentation
      New Orleans, USA
    • Related Report
      2010 Annual Research Report
  • [Presentation] Mizarによる有限かつ離散的な標本空間における確率の形式化2011

    • Author(s)
      荒井研一, 岡崎裕之
    • Organizer
      2011年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡)
    • Related Report
      2010 Annual Research Report
  • [Presentation] 新しいハッジュ連鎖の構成による単純な認証方式とその応用2010

    • Author(s)
      双紙正和
    • Organizer
      情報通信システムセキュリティ研究会ICSS2010-44(2010-11)
    • Place of Presentation
      広島市立大学
    • Year and Date
      2010-11-05
    • Related Report
      2010 Annual Research Report
  • [Presentation] ワイヤレスセンサネットワークにおける効率的なグループ鍵配送プロトコル2010

    • Author(s)
      三吉雄大, 双紙正和
    • Organizer
      情報通信システムセキュリティ研究会ICSS2010-45(2010-11)
    • Place of Presentation
      広島市立大学
    • Year and Date
      2010-11-05
    • Related Report
      2010 Annual Research Report
  • [Presentation] ハッシュ連鎖による単純な認証法とセンサーネットワークへの応用2010

    • Author(s)
      双紙正和
    • Organizer
      Computer Security Symposium 2010 (CSS 2010)
    • Place of Presentation
      岡山コンベンションセンター
    • Year and Date
      2010-10-19
    • Related Report
      2010 Annual Research Report
  • [Presentation] ワイヤレスセンサネットワークにおけるグループ鍵配送プロトコルの検討2010

    • Author(s)
      三吉雄大, 双紙正和
    • Organizer
      Computer Security Symposium 2010 (CSS 2010)
    • Place of Presentation
      岡山コンベンションセンター
    • Year and Date
      2010-10-19
    • Related Report
      2010 Annual Research Report
  • [Presentation] 安全・安心かつ便利な情報社会を実現する情報セキュリティー技術2010

    • Author(s)
      宮地充子
    • Organizer
      第4回関西安全・安心を支える科学技術推進会議シンポジウム
    • Place of Presentation
      大阪科学技術センター(招待講演)
    • Year and Date
      2010-06-16
    • Related Report
      2010 Annual Research Report
  • [Presentation] A Note on Practical Key Derivation Functions2010

    • Author(s)
      廣瀬勝一
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      信州大学
    • Year and Date
      2010-03-05
    • Related Report
      2009 Annual Research Report
  • [Presentation] AES-256を用いたDM型圧縮関数に対する衝突攻撃について2010

    • Author(s)
      小林哲也, 廣瀬勝一
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      信州大学
    • Year and Date
      2010-03-05
    • Related Report
      2009 Annual Research Report
  • [Presentation] 形式化数学記述言語MizarによるDESの形式化2010

    • Author(s)
      小林亮太, 荒井研一, 岡崎裕之, 師玉康
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松
    • Year and Date
      2010-01-20
    • Related Report
      2009 Annual Research Report
  • [Presentation] 情報セキュリティの標準化動向について~ISO/IEC JTC1/SC27/WG2 2010年4月マラッカ会議報告~2010

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊建司, 渡辺創
    • Organizer
      情報セキュリティ研究会(ISEC)
    • Place of Presentation
      弘前大学(解説)
    • Related Report
      2010 Annual Research Report
  • [Presentation] Formalization of Probability and Random Sampling on a Finite and Discrete Sample Space Using the Mizar Proof Checker2010

    • Author(s)
      Kenichi Arai, Nobuaki Kondo, Hiroyuki Okazaki
    • Organizer
      2010 International Conference on Foundations of Computer Science (FCS'10)
    • Place of Presentation
      Las Vegas Nevada, USA
    • Related Report
      2010 Annual Research Report
  • [Presentation] セキュリティとディペンダビリティ2010

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会創立50周年記念(第72回)全国大会
    • Place of Presentation
      東京大学 本郷キャンパス
    • Related Report
      2009 Annual Research Report
  • [Presentation] Formalization of Probability and Random Sampling on a Finite and Discrete Sample Space Using the Mizar Proof Checker2010

    • Author(s)
      K.Arai, N.Kondo, H.Okazaki
    • Organizer
      2010 International Conference on Foundations of Computer Science (FCS'10)
    • Place of Presentation
      Las Vegas, Nevada, USA
    • Related Report
      2009 Annual Research Report
  • [Presentation] 情報セキュリティの標準化動向について~ISO/IEC JTC1/SC27/WG2 2009年5月北京会議報告~2009

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊建司
    • Organizer
      IEICE Japan Tech.Rep
    • Place of Presentation
      機械振興会館(東京)
    • Year and Date
      2009-09-25
    • Related Report
      2009 Annual Research Report
  • [Presentation] ユビキタス社会の情報セキュリティについて-安全・安心な情報基盤を保証する情報セキュリティ-2009

    • Author(s)
      宮地充子
    • Organizer
      石川県企業産業交流研究会OB会
    • Place of Presentation
      石川県工業試験場(招待講演)
    • Year and Date
      2009-06-10
    • Related Report
      2009 Annual Research Report
  • [Presentation] New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009

    • Author(s)
      A.Miyaji, M.Sukegawa
    • Organizer
      The 14th Australasian Conference on Information Security and Privacy (ACISP2009)
    • Place of Presentation
      Brisbane, Australia
    • Related Report
      2009 Annual Research Report
  • [Presentation] 情報セキュリティの標準化動向について-ISO/IEC JTC1/SC27/WG2 2013年4月ニース会議報告-

    • Author(s)
      宮地 充子, 近澤 武, 竜田 敏男, 渡辺 創, 松尾 真一郎, 大熊 健司
    • Organizer
      電子情報通信学会,信学技報 ISEC2013
    • Place of Presentation
      札幌コンベンションセンター
    • Related Report
      2012 Annual Research Report
  • [Presentation] Secure Dynamic Hourglass Protocol for Untrusted Server

    • Author(s)
      Ratemo Alice Harriet Mwango, 宮地 充子
    • Organizer
      ISEC2013
    • Place of Presentation
      機械振興会館(東京)
    • Related Report
      2012 Annual Research Report
  • [Presentation] 効率的なMulti-Party Private Set Intersection Protocol

    • Author(s)
      三本 知明, 宮地 充子
    • Organizer
      ISEC2013
    • Place of Presentation
      東北大学
    • Related Report
      2012 Annual Research Report
  • [Presentation] Multi-Party Private Set Intersection Protocolの改良

    • Author(s)
      三本 知明, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Related Report
      2012 Annual Research Report
  • [Presentation] A mobile RFID authentication protocol from exact LPN problem

    • Author(s)
      Mohammad Saiful Islam Mamun, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Related Report
      2012 Annual Research Report
  • [Presentation] Improve the Preimage Security of Double Block Length Hash Function

    • Author(s)
      MAZUMDER RASHED, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Related Report
      2012 Annual Research Report
  • [Presentation] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256

    • Author(s)
      陳嘉耕, 廣瀬勝一, 桑門秀典, 宮地充子
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      札幌コンベンションセンター
    • Related Report
      2012 Annual Research Report
  • [Presentation] DDoS攻撃における space-time encoding の効率化

    • Author(s)
      双紙正和
    • Organizer
      情報処理学会研究報告
    • Place of Presentation
      弘前大学
    • Related Report
      2012 Annual Research Report
  • [Presentation] P2P型ネットワークにおけるハッシュ木構成法の評価

    • Author(s)
      浅枝智之, 樋口太平, 双紙正和
    • Organizer
      信学技報
    • Place of Presentation
      名桜大学(沖縄)
    • Related Report
      2012 Annual Research Report
  • [Presentation] VANETにおけるグループ One-Way Cross-Networks

    • Author(s)
      北山翔馬, 双紙正和
    • Organizer
      信学技報
    • Place of Presentation
      名桜大学(沖縄)
    • Related Report
      2012 Annual Research Report
  • [Presentation] Negligibleの形式定義に関する考察

    • Author(s)
      岡崎 裕之, 布田 裕一
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Related Report
      2012 Annual Research Report
  • [Presentation] Cryptographic Approach to Enhance the Security against Recent Threats

    • Author(s)
      Atsuko Miyaji
    • Organizer
      NSC-JST Workshop on ``Information and Communication Technology"
    • Place of Presentation
      JST Tokyo
    • Related Report
      2011 Annual Research Report
    • Invited
  • [Presentation] 情報のグローバル化とプライバシー

    • Author(s)
      宮地 充子
    • Organizer
      情報処理学会 第75回 全国大会
    • Place of Presentation
      東北大学 川内キャンパス
    • Related Report
      2011 Annual Research Report
    • Invited
  • [Presentation] 初期差分を用いたRC4 PRGAの内部状態解析

    • Author(s)
      市丸 祐, 宮地 充子
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      ウィスティン都ホテル京都
    • Related Report
      2011 Annual Research Report
  • [Presentation] ネットワークコーディングに適したMACの一考察

    • Author(s)
      浅野 貴哉, 宮地 充子,面 和成
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      ウィスティン都ホテル京都
    • Related Report
      2011 Annual Research Report
  • [Presentation] Improved Elliptic Curve Scalar Multiplication Using Triple Formula

    • Author(s)
      Atsuko Miyaji and Cuinan Yang
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Related Report
      2011 Annual Research Report
  • [Presentation] 効率的な倍ブロック長ハッシュ関数に関する一考察

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Related Report
      2011 Annual Research Report
  • [Presentation] Greedy algorithmを改良したDBNS利用による効率的な楕円曲線暗号のスカラー倍算

    • Author(s)
      河面祥男,宮地充子
    • Organizer
      ISEC2012
    • Place of Presentation
      静岡市産学交流センター
    • Related Report
      2011 Annual Research Report
  • [Presentation] A new explicit relation between trace, definition field, and embedding degree

    • Author(s)
      Atsuko Miyaji and Xiaonan Shi
    • Organizer
      ISEC2012
    • Place of Presentation
      静岡市産学交流センター
    • Related Report
      2011 Annual Research Report
  • [Presentation] An Optimized ID based Group Signature Veri?cation System and its impact in VANET

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Related Report
      2011 Annual Research Report
  • [Presentation] (n,n)ブロック暗号を用いた倍ブロック長ハッシュ関数の提案

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Related Report
      2011 Annual Research Report
  • [Presentation] VANETにおける経路認証について

    • Author(s)
      双紙正和, 三吉雄大
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Related Report
      2011 Annual Research Report
  • [Presentation] P2Pシステムにおけるハッシュ木の効率的な構築法の検討.

    • Author(s)
      樋口太平, 双紙正和, 浅枝智之
    • Organizer
      情報処理学会研究報告
    • Place of Presentation
      東京電機大学
    • Related Report
      2011 Annual Research Report
  • [Presentation] ショートホップトレースバック方式の提案.

    • Author(s)
      古川真之, 双紙正和.
    • Organizer
      情報処理学会研究報告
    • Place of Presentation
      東京電機大学
    • Related Report
      2011 Annual Research Report
  • [Presentation] Various techniques on Efficient and Secure Elliptic Curve Scalar Multiplication

    • Author(s)
      宮地 充子
    • Organizer
      ICISC
    • Place of Presentation
      KOFST(ソウル,韓国)
    • Related Report
      2011 Annual Research Report
    • Invited
  • [Presentation] Recent topics on Elliptic Curve Cryptosystem: Research and International Standardization

    • Author(s)
      宮地 充子
    • Organizer
      ダッカ大学
    • Place of Presentation
      ダッカ大学(ダッカ,バングラデシュ)
    • Related Report
      2011 Annual Research Report
    • Invited
  • [Presentation] Efficient and Secure Elliptic Curve Scalar Multiplication

    • Author(s)
      宮地 充子
    • Organizer
      天津大学
    • Place of Presentation
      天津大学(天津市,中国)
    • Related Report
      2011 Annual Research Report
  • [Presentation] One time signature の効率的な構成の検討

    • Author(s)
      双紙正和, 早稲田篤志
    • Organizer
      情報処理学会研究報告,2012-CSEC-56, vol. 35
    • Place of Presentation
      横浜市開港記念会館(横浜市)
    • Related Report
      2011 Annual Research Report
  • [Book] 一般教育の情報2013

    • Author(s)
      北上始(編),双紙正和(共著)
    • Total Pages
      211
    • Publisher
      あいり出版
    • Related Report
      2012 Annual Research Report
  • [Book] 代数学から学ぶ暗号理論2012

    • Author(s)
      宮地 充子
    • Total Pages
      288
    • Publisher
      日本評論社
    • Related Report
      2011 Annual Research Report

URL: 

Published: 2009-04-01   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi