• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Study on the security of elliptic curve discrete logarithm problems

Research Project

Project/Area Number 23650006
Research Category

Grant-in-Aid for Challenging Exploratory Research

Allocation TypeMulti-year Fund
Research Field Fundamental theory of informatics
Research InstitutionJapan Advanced Institute of Science and Technology

Principal Investigator

MIYAJI Atsuko  北陸先端科学技術大学院大学, 情報科学研究科, 教授 (10313701)

Project Period (FY) 2011-04-28 – 2015-03-31
Project Status Completed (Fiscal Year 2014)
Budget Amount *help
¥3,770,000 (Direct Cost: ¥2,900,000、Indirect Cost: ¥870,000)
Fiscal Year 2013: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2012: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2011: ¥1,950,000 (Direct Cost: ¥1,500,000、Indirect Cost: ¥450,000)
Keywords暗号・認証等 / 楕円曲線暗号 / 安全性評価 / 暗号・認証
Outline of Final Research Achievements

An elliptic curve cryptosystem is based on elliptic curve discrete logarithm
problem (ECDLP).An elliptic curve is uniquely determined by mathematical parameters such as j-invariant, trace, etc.The security of ECDLP is different from each elliptic curve, and there exist some ECDLP whose security is extremely low compared with others.This is why it is very important to find relation between mathematical parameters of elliptic curve and security level of ECDLP.However, only a few elliptic curves can explicitly give their security level by using their mathematical parameters.Recently, Hitt proves relations between security level and mathematical parameters of hyper elliptic curve.Hirasawa and Miyaji applied Hitt's approach to ECDLP and presented new relations between mathematical parameters and embedding degrees.In this research, we further extended their conditions and found new explicit relations between elliptic-curve parameters and embedding degrees.

Report

(5 results)
  • 2014 Annual Research Report   Final Research Report ( PDF )
  • 2013 Research-status Report
  • 2012 Research-status Report
  • 2011 Research-status Report
  • Research Products

    (79 results)

All 2015 2014 2013 2012 2011 Other

All Journal Article (41 results) (of which Peer Reviewed: 38 results,  Open Access: 15 results) Presentation (37 results) (of which Invited: 7 results) Book (1 results)

  • [Journal Article] enPiT における教育効果測定の実践と評価2015

    • Author(s)
      山本雅基,小林隆志,宮地充子,奥野拓,粂野文洋,櫻井浩子,海上智昭,春名修介,井上克郎
    • Journal Title

      コンピュータソフトウェア

      Volume: Vol. 32, No.1 Pages: 213-219

    • NAID

      40020582107

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Self-healing wireless sensor networks2015

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: - Issue: 10 Pages: 2547-2568

    • DOI

      10.1002/cpe.3434

    • NAID

      120005624453

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] How TKIP induces biases of internal states of generic RC42015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, (2015), Springer-Verlag

      Volume: -

    • NAID

      120005767114

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Linear Correlations related to State Information of RC4 PRGA2015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 22nd International Workshop on Fast Software Encryption (FSE 2015), Lecture Notes in Computer Science, Springer-Verlag

      Volume: -

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA 2015), IEEE

      Volume: - Pages: 564-570

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-2562015

    • Author(s)
      Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, and Atsuko Miyaji
    • Journal Title

      The 17th International Conference on Information and Security Cryptology, ICISC 2014, Lecture Notes in Computer Science, 8949(2015), Springer-Verlag

      Volume: 8949 Pages: 271-285

    • NAID

      120005723611

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A new (n, n) blockcipher hash function using Feistel Network: Apposite for RFID Security2015

    • Author(s)
      Atsuko Miyaji and Mazumder Rashed
    • Journal Title

      International Conference on Computational Intelligence in Data Mining (ICCIDM 2014), Lecture Notes in Computer Science, Volume 33(2015), Springer-Verlag

      Volume: Volume 33 Pages: 519-528

    • NAID

      120005678257

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] New Integrated Long-Term Glimpse of RC42015

    • Author(s)
      Ryoma Ito and Atsuko Miyaji
    • Journal Title

      The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science, Volume 8909(2015), Springer-Verlag

      Volume: 8909 Pages: 137-149

    • NAID

      120005691304

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] ユビキタスネットワークにおけるセキュリティ技術-積極的利用を促すセキュリティ技術-2014

    • Author(s)
      宮地充子
    • Journal Title

      「電気評論」

      Volume: 夏季増刊号特集 Pages: 12-15

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] SKENO: Secret key encryption with non-interactive opening2014

    • Author(s)
      Jiageng Chen, Keita Emura, and Atsuko Miyaji
    • Journal Title

      Journal of Mathematical Cryptology

      Volume: - Issue: 2 Pages: 63-74

    • DOI

      10.1515/jmc-2014-0010

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Generic constructions of secure-channel free searchable encryption with adaptive security2014

    • Author(s)
      Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, and Kazumasa Omote
    • Journal Title

      Wiley Security and Communication Networks

      Volume: - Issue: 8 Pages: 1547-1560

    • DOI

      10.1002/sec.1103

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A new (n, n) Blockcipher based Hash Function for Short Messages2014

    • Author(s)
      Atsuko Miyaji, Mazumder Rashed and Tsuyoshi Sawada
    • Journal Title

      2014 Ninth Asia Joint Conference on Information Security (ASIA JCIS), IEEE

      Volume: - Pages: 56-63

    • NAID

      120006675662

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A Provable Secure Batch Authentication Scheme for EPCGen2 Tags2014

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 8th International Conference on Provable Security (Provsec 2014), Lecture Notes in Computer Science, Volume 8782(2014), Springer-Verlag

      Volume: 8782 Pages: 103-116

    • NAID

      120005657979

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock2014

    • Author(s)
      Jiageng Chen, Yuichi Futa, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 8th International Conference on Network and System Security (NSS 2014), Lecture Notes in Computer Science, 8792(2014), Springer-Verlag

      Volume: 8792 Pages: 184-197

    • NAID

      120005661888

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Secure VANET Applications with a refined Group Signature2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      2014 Twelfth Annual International Conference on Privacy, Security and Trust (PST)

      Volume: - Pages: 199-206

    • NAID

      120006675652

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] A multi-purpose Group Signature for Vehicular Network Security2014

    • Author(s)
      Mohammad Saiful Islam Mamun, Atsuko Miyaji, and Hiroaki Takada
    • Journal Title

      2014 17th International Conference on Network-Based Information Systems (NBiS)

      Volume: - Pages: 511-516

    • NAID

      120006675661

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme2014

    • Author(s)
      Cheng-Qiang Huangy, Atsuko Miyajiy, Long-Hai Li, and Shang-Mei Xu
    • Journal Title

      2014 IEEE International Conference on Computer and Information Technology (CIT)

      Volume: - Pages: 373-387

    • NAID

      120006675656

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] Distributed Pseudo-Random Number Generation and its application to Cloud Database2014

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, and Chunhua Su
    • Journal Title

      The 10th Information Security Practice and Experience Conference(ISPEC 2014), Lecture Notes in Com- puter Science, 8434(2014), Springer-Verlag

      Volume: 8434 Pages: 373-387

    • NAID

      120005602733

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A Scalable and Secure RFID Ownership Transfer Protocol2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE

      Volume: - Pages: 343-350

    • NAID

      120007005446

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] RFID Path Authentication, Revisited2014

    • Author(s)
      Mohammad Saiful Islam Mamun and Atsuko Miyaji
    • Journal Title

      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE

      Volume: - Pages: 245-252

    • NAID

      120007005447

    • Related Report
      2014 Annual Research Report
    • Peer Reviewed / Open Access
  • [Journal Article] An r-hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users2014

    • Author(s)
      Keita Emura, Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      Journal of Applied Mathematics

      Volume: 2014

    • NAID

      120005624449

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] An efficient batch verification system for large scale VANET2014

    • Author(s)
      Jiageng Chen, Mohammad S.I. Mamun, Atsuko Miyaji
    • Journal Title

      Intl. J. of Security and Communication Networks SCN

      Volume: Online Issue: 2 Pages: 298-310

    • DOI

      10.1002/sec.980

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] A privacy-preserving efficient RFID authentication protocol from SLPN assumption2013

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications

      Volume: -

    • NAID

      120005661887

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Novel Strategies for Searching RC4 Key Collisions2013

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      Computers & Mathematics with Applications

      Volume: 66 Pages: 1-10

    • NAID

      120005298575

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock2013

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, 8128(2013), Springer-Verlag

      Volume: 8128 Pages: 1-15

    • NAID

      120005367951

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Private Multiparty Set Intersection Protocol in Rational Model2013

    • Author(s)
      Keita Emura, Atsuko Miyaji and Mohammad Shahriar Rahman
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13)

      Volume: CD-ROM Pages: 431-438

    • DOI

      10.1109/trustcom.2013.54

    • NAID

      120006675373

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] A fully-secure RFID authentication protocol from exact LPN assumption2013

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13)

      Volume: CD-ROM Pages: 102-109

    • DOI

      10.1109/trustcom.2013.17

    • NAID

      120006675368

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Self-healing Schemes Suitable for Various WSNs2013

    • Author(s)
      Atsuko Miyaji and Kazumasa Omote
    • Journal Title

      The 6th International Conference on Internet and Dsitributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, Springer-Verlag

      Volume: 8223 Pages: 92-105

    • Related Report
      2013 Research-status Report
    • Peer Reviewed
  • [Journal Article] Dynamic Attribute-based Signcryption without RandomOracles2012

    • Author(s)
      Keita Emura, Atsuko Miyaji, and Mohammad Shahriar Rahman
    • Journal Title

      International Journal of Applied Cryptography (IJACT)

      Volume: 2(3) Pages: 199-211

    • NAID

      120004664487

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack2012

    • Author(s)
      Jiageng Chen and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals

      Volume: E95-A(12) Pages: 2148-2159

    • NAID

      10031161346

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Novel Hybrid IP Traceback Scheme with Packet Counters2012

    • Author(s)
      Tomoyuki Karasawa, Masakazu Soshi and Atsuko Miyaji
    • Journal Title

      The 5th International Conference on Internet and Dsitributed Computing Systems, IDCS 2012,Lecture Notes in Computer Science, Springer-Verlag

      Volume: 7646 Pages: 71-84

    • NAID

      120005147911

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] How to Enhance the Security on the Least Significant Bit2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      The 4th International Symposium on Cyberspace Safety and Security , CANS 2012, Springer-Verlag

      Volume: 7712 Pages: 263-279

    • NAID

      120005147913

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Constant-Ciphertext-Size Dual Policy Attribute Based Encryption2012

    • Author(s)
      Atsuko Miyaji and Phuong V.X. TRAN
    • Journal Title

      The 11th International Conference on Cryptology and Network Security, CSS 2012, Springer-Verlag

      Volume: 7672 Pages: 400-413

    • NAID

      120005147912

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] An Optimized Signature Verification System for Vehicle Ad hoc NETwork2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 8th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM2012, IEEE

      Volume: - Pages: 1-8

    • NAID

      120006675329

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] A Secure and private RFID authentication protocol under SLPN problem2012

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Journal Title

      The 6th International Conference on Network and System Security , NSS 2012, Springer-Verlag

      Volume: 7645 Pages: 476-489

    • NAID

      120005147914

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks2012

    • Author(s)
      Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote
    • Journal Title

      The 8th International Conference on Information Security Practice and Experience, ISPEC 2012, Lecture Notes in Computer Science

      Volume: 7232 Pages: 245-258

    • NAID

      120004247387

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Jacobian 座標系族の加法公式の改良2012

    • Author(s)
      Ratemo Alice Harriet Mwango, Yang Cuinan, Atsuko Miyaji
    • Journal Title

      The 2012 Symposium on Cryptography and Information Security

      Volume: SCIS2012- 1B2-2E

    • Related Report
      2011 Research-status Report
  • [Journal Article] Improved Left-to-Right Scalar Multiplication Algorithms2012

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2012 (2012-3) Pages: 141-148

    • NAID

      110009545770

    • Related Report
      2011 Research-status Report
  • [Journal Article] Scalar Multiplication on Weierstrass Elliptic Curves from Co-Z Arithmetic2011

    • Author(s)
      Raveen R. Goundar, Marc Joye, Atsuko Miyaji, Matthieu Rivain, andAlexandre Venelli
    • Journal Title

      Journal of Cryptographic Engineering (2011),Springer-Verlag

      Volume: Vol.1 Pages: 161-176

    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] New Concrete Relation between Trace, Definition Field, and Embedding Degree2011

    • Author(s)
      Shoujirou Hirasawa and Atsuko Miyaji
    • Journal Title

      IEICE Trans., Fundamentals.

      Volume: E94-A Pages: 1368-1374

    • NAID

      10029802473

    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] An Optimized Right-to-Left Scalar Mutiplication Algorithm Resistant Against Safe-Error Attack, SPA and DPA2011

    • Author(s)
      Atsuko Miyaji and Yiren Mo
    • Journal Title

      IEICE Japan Tech. Rep.

      Volume: ISEC2011 (2011-11) Pages: 109-114

    • Related Report
      2011 Research-status Report
  • [Presentation] RFID における擬似乱数生成器の安全性に関する考察2015

    • Author(s)
      佐藤洋行, 宮地充子, 蘇春華
    • Organizer
      ICSS2014, 第29回情報通信システムセキュリティ研究会
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] 楕円曲線のトレースと埋め込み次数の関係について2015

    • Author(s)
      宮地充子, 田中覚
    • Organizer
      ICSS2014, 第29回情報通信システムセキュリティ研究会
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] サイドチャネル攻撃耐性を持つスカラー倍算アルゴリズム2015

    • Author(s)
      木藤圭亮, 宮地充子, 高橋良太
    • Organizer
      ICSS2014, 第29回情報通信システムセキュリティ研究会
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] ブラウザにおけるSSL/TLS の証明書検証の改善2015

    • Author(s)
      亀川慧, 宮地充子, 布田裕一,
    • Organizer
      ICSS2014, 第29回情報通信システムセキュリティ研究会
    • Place of Presentation
      名桜大学(沖縄県名護市)
    • Year and Date
      2015-03-03 – 2015-03-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] Double-Triple の公式を用いた新しいスカラー倍算2015

    • Author(s)
      高橋良太, 宮地充子
    • Organizer
      The 32nd Symposium on Cryptography and Information Security, SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] WPA におけるRC4 の内部状態に関する新しい線形相関2015

    • Author(s)
      伊藤竜馬, 宮地充子
    • Organizer
      The 32nd Symposium on Cryptography and Information Security, SCIS2015
    • Place of Presentation
      リーガロイヤルホテル小倉(福岡県北九州市)
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Annual Research Report
  • [Presentation] SSL/TLS における証明書検証機能改善に関する研究2014

    • Author(s)
      亀川慧, 宮地充子, 布田裕一
    • Organizer
      ISEC2014, 電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      兵庫県立大学(兵庫県神戸市)
    • Year and Date
      2014-11-21 – 2014-11-22
    • Related Report
      2014 Annual Research Report
  • [Presentation] Further Application on RFID with Privacy-Preserving2014

    • Author(s)
      Atsuko Miyaji
    • Organizer
      The 1st International Conference on Future Data and Security Engineering, FDSE 2014
    • Place of Presentation
      Ho Chi Minh City, Vietnam
    • Year and Date
      2014-11-19 – 2014-11-21
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] 仮想環境化における擬似乱数生成器-Whirlwind-の安全性に関する考察2014

    • Author(s)
      佐藤洋之, 宮地充子, 蘇春華
    • Organizer
      Computer Security Symposium,CSS2014
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
  • [Presentation] 効率的な多機関のPrivate Set Intersection2014

    • Author(s)
      西田昌平, 宮地充子
    • Organizer
      Computer Security Symposium,CSS2014
    • Place of Presentation
      札幌コンベンションセンター(北海道札幌市)
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Annual Research Report
  • [Presentation] 安全・安心社会を実現するセキュリティ基盤2014

    • Author(s)
      宮地充子
    • Organizer
      情報処理学会第13 回情報科学技術フォーラム
    • Place of Presentation
      筑波大学(茨木県つくば市)
    • Year and Date
      2014-09-03 – 2014-09-05
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] 情報セキュリティの標準化動向について- ISO/IEC JTC1/SC27/WG2 2014 年4月香港会議報告-2014

    • Author(s)
      宮地充子, 近澤武, 竜田敏男, 大熊健司, 渡辺創, 松尾真一郎
    • Organizer
      第27回電子情報通信学会研究会
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2014 Annual Research Report
    • Invited
  • [Presentation] How to Construct PRNGs for distributed Cloud Databases2014

    • Author(s)
      Jiageng Chen,Atsuko Miyaji,and Chunhua Su
    • Organizer
      CSEC2014, 第62回CSEC研究会
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] Perfect Conjugate-Addition Sequence を用いた新たな事前計算テーブル計算手法について2014

    • Author(s)
      高橋良太, 宮地充子
    • Organizer
      ISEC2014, 電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      サン・リフレ函館(北海道函館市)
    • Year and Date
      2014-07-03 – 2014-07-04
    • Related Report
      2014 Annual Research Report
  • [Presentation] RC4 のLong-Term Glimpse における新しいNegative Biases2014

    • Author(s)
      伊藤竜馬, 宮地充子
    • Organizer
      ISEC2014, 電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機械振興会館(東京都港区)
    • Year and Date
      2014-05-09
    • Related Report
      2014 Annual Research Report
  • [Presentation] 医療情報と暗号化・匿名化2013

    • Author(s)
      宮地充子
    • Organizer
      MELT up 講演会
    • Place of Presentation
      中央大学後楽園キャンパス
    • Related Report
      2013 Research-status Report
    • Invited
  • [Presentation] 社会保障・税の番号制度の実務的課題 -プライバシー保護の技術的側面2013

    • Author(s)
      宮地充子
    • Organizer
      第61回情報処理学会 電子化知的財産・社会基盤研究会
    • Place of Presentation
      金沢工業大学 扇が丘キャンパス
    • Related Report
      2013 Research-status Report
    • Invited
  • [Presentation] Recent topics on Elliptic Curve Cryptosystem: Research and International Standardization2012

    • Author(s)
      宮地 充子
    • Organizer
      ダッカ大学(招待講演)
    • Place of Presentation
      ダッカ大学(ダッカ,バングラデシュ)
    • Related Report
      2011 Research-status Report
  • [Presentation] Efficient and Secure Elliptic Curve Scalar Multiplication2012

    • Author(s)
      宮地 充子
    • Organizer
      天津大学(招待講演)
    • Place of Presentation
      天津大学(天津市,中国)
    • Related Report
      2011 Research-status Report
  • [Presentation] Various techniques on Efficient and Secure Elliptic Curve Scalar Multiplication2011

    • Author(s)
      宮地 充子
    • Organizer
      ICISC(招待講演)
    • Place of Presentation
      KOFST(ソウル,韓国)
    • Related Report
      2011 Research-status Report
  • [Presentation] 情報セキュリティの標準化動向について-ISO/IEC JTC1/SC27/WG2 2013年4月ニース会議報告-

    • Author(s)
      宮地 充子, 近澤 武, 竜田 敏男, 渡辺 創, 松尾 真一郎, 大熊 健司
    • Organizer
      電子情報通信学会,信学技報 ISEC2013
    • Place of Presentation
      札幌コンベンションセンター
    • Related Report
      2013 Research-status Report
  • [Presentation] Secure Dynamic Hourglass Protocol for Untrusted Server

    • Author(s)
      Ratemo Alice Harriet Mwango, 宮地 充子
    • Organizer
      ISEC2013
    • Place of Presentation
      機械振興会館(東京)
    • Related Report
      2013 Research-status Report
  • [Presentation] 効率的なMulti-Party Private Set Intersection Protocol

    • Author(s)
      三本 知明, 宮地 充子
    • Organizer
      ISEC2013
    • Place of Presentation
      東北大学
    • Related Report
      2013 Research-status Report
  • [Presentation] Multi-Party Private Set Intersection Protocolの改良

    • Author(s)
      三本 知明, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Related Report
      2013 Research-status Report
  • [Presentation] A mobile RFID authentication protocol from exact LPN problem

    • Author(s)
      Mohammad Saiful Islam Mamun, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Related Report
      2013 Research-status Report
  • [Presentation] Improve the Preimage Security of Double Block Length Hash Function

    • Author(s)
      MAZUMDER RASHED, 宮地 充子
    • Organizer
      The 31st Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島)
    • Related Report
      2013 Research-status Report
  • [Presentation] A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256

    • Author(s)
      陳嘉耕, 廣瀬勝一, 桑門秀典, 宮地充子
    • Organizer
      電子情報通信学会技術研究報告
    • Place of Presentation
      札幌コンベンションセンター
    • Related Report
      2013 Research-status Report
  • [Presentation] Cryptographic Approach to Enhance the Security against Recent Threats

    • Author(s)
      Atsuko Miyaji
    • Organizer
      NSC-JST Workshop on ``Information and Communication Technology"
    • Place of Presentation
      JST Tokyo
    • Related Report
      2012 Research-status Report
    • Invited
  • [Presentation] 情報のグローバル化とプライバシー

    • Author(s)
      宮地 充子
    • Organizer
      情報処理学会 第75回 全国大会
    • Place of Presentation
      東北大学 川内キャンパス
    • Related Report
      2012 Research-status Report
    • Invited
  • [Presentation] 初期差分を用いたRC4 PRGAの内部状態解析

    • Author(s)
      市丸 祐, 宮地 充子
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      ウィスティン都ホテル京都
    • Related Report
      2012 Research-status Report
  • [Presentation] ネットワークコーディングに適したMACの一考察

    • Author(s)
      浅野 貴哉, 宮地 充子,面 和成
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      ウィスティン都ホテル京都
    • Related Report
      2012 Research-status Report
  • [Presentation] Improved Elliptic Curve Scalar Multiplication Using Triple Formula

    • Author(s)
      Atsuko Miyaji and Cuinan Yang
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Related Report
      2012 Research-status Report
  • [Presentation] 効率的な倍ブロック長ハッシュ関数に関する一考察

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      ISEC2012
    • Place of Presentation
      関西学院大学 大阪梅田キャンパス
    • Related Report
      2012 Research-status Report
  • [Presentation] Greedy algorithmを改良したDBNS利用による効率的な楕円曲線暗号のスカラー倍算

    • Author(s)
      河面祥男,宮地充子
    • Organizer
      ISEC2012
    • Place of Presentation
      静岡市産学交流センター
    • Related Report
      2012 Research-status Report
  • [Presentation] A new explicit relation between trace, definition field, and embedding degree

    • Author(s)
      Atsuko Miyaji and Xiaonan Shi
    • Organizer
      ISEC2012
    • Place of Presentation
      静岡市産学交流センター
    • Related Report
      2012 Research-status Report
  • [Presentation] An Optimized ID based Group Signature Veri?cation System and its impact in VANET

    • Author(s)
      Mohammad S. I. Mamun and Atsuko Miyaji
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Related Report
      2012 Research-status Report
  • [Presentation] (n,n)ブロック暗号を用いた倍ブロック長ハッシュ関数の提案

    • Author(s)
      澤田 剛, 宮地 充子
    • Organizer
      Computer Security Symposium (CSS2012)
    • Place of Presentation
      くにびきメッセ (島根県立産業交流会館)
    • Related Report
      2012 Research-status Report
  • [Book] 代数学から学ぶ暗号理論2012

    • Author(s)
      宮地 充子
    • Total Pages
      288
    • Publisher
      日本評論社
    • Related Report
      2011 Research-status Report

URL: 

Published: 2011-08-05   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi