Atsuko Miyaji
Orcid: 0000-0001-8822-5287Affiliations:
- Osaka University, Graduate School of Engineering, Suita, Japan
According to our database1,
Atsuko Miyaji
authored at least 241 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
On csauthors.net:
Bibliography
2024
Comput. J., February, 2024
Pay-Per-Proof: Decentralized Outsourced Multi-User PoR for Cloud Storage Payment Using Blockchain.
IEEE Trans. Cloud Comput., 2024
IEEE Access, 2024
Proceedings of the Information Security Practice and Experience, 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
2023
Comput. J., October, 2023
IEICE Trans. Inf. Syst., September, 2023
IEICE Trans. Inf. Syst., September, 2023
IEICE Trans. Inf. Syst., September, 2023
Computación y Sistemas (CyS), 2023
IEEE Access, 2023
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the Science of Cyber Security - 5th International Conference, 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the Provable and Practical Security, 2023
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Proceedings of the Information Security Practice and Experience, 2023
Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
Lattice-Based Accumulator with Constant Time List Update and Constant Time Verification.
Proceedings of the Codes, Cryptology and Information Security, 2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
Proceedings of the 18th Asia Joint Conference on Information Security, 2023
2022
Int. J. Inf. Sec., 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the Selected Areas in Cryptography - 29th International Conference, 2022
Proceedings of the Information Security Practice and Experience, 2022
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
Proceedings of the Smart Card Research and Advanced Applications, 2022
Proceedings of the 17th Asia Joint Conference on Information Security, 2022
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022
2021
A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT.
Peer-to-Peer Netw. Appl., 2021
Efficient Algorithm to Compute Odd-Degree Isogenies Between Montgomery Curves for CSIDH.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
New Iterated RC4 Key Correlations and their Application to Plaintext Recovery on WPA-TKIP.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the Network and System Security - 15th International Conference, 2021
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Proceedings of the International Conference on Electronics, Information, and Communication, 2021
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021
Proceedings of the Applied Cryptography and Network Security, 2021
2020
J. Inf. Process., 2020
IEICE Trans. Inf. Syst., 2020
IEICE Trans. Inf. Syst., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
Development and Application of Privacy-preserving Distributed Medical Data Integration System.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2020
Proceedings of the Eighth International Symposium on Computing and Networking, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019
Beyond Visual Line of Sight UAV Control for Remote Monitoring Using Directional Antennas.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
Proceedings of the 14th Asia Joint Conference on Information Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2018
J. Inf. Secur. Appl., 2018
Comput. Intell., 2018
Proceedings of the 2018 IEEE International Conference on Smart Computing, 2018
The Possibility of Matrix Decomposition as Anonymization and Evaluation for Time-sequence Data.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018
An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
Development of a Secure Cross-Institutional Data Collection System Based on Distributed Standardized EMR Storage.
Proceedings of the Decision Support Systems and Education, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
IEEE Trans. Inf. Forensics Secur., 2017
Privacy-Preserving Integration of Medical Data - A Practical Multiparty Private Set Intersection.
J. Medical Syst., 2017
Int. J. Found. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Comput. Stand. Interfaces, 2017
Concurr. Comput. Pract. Exp., 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Inf. Syst., 2016
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the Applications and Techniques in Information Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
Proceedings of the Availability, Reliability, and Security in Information Systems, 2016
2015
Generic constructions of secure-channel free searchable encryption with adaptive security.
Secur. Commun. Networks, 2015
An efficient batch verification system and its effect in a real time VANET environment.
Secur. Commun. Networks, 2015
Int. J. Comput. Sci. Eng., 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the Network and System Security - 9th International Conference, 2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
Proceedings of the IEEE 2nd International Conference on Cyber Security and Cloud Computing, 2015
Proceedings of the Risks and Security of Internet and Systems, 2015
Accurate Estimation of the Full Differential Distribution for General Feistel Structures.
Proceedings of the Information Security and Cryptology - 11th International Conference, 2015
Proceedings of the Algebraic Informatics - 6th International Conference, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users.
J. Appl. Math., 2014
Impossible differential cryptanalysis of LBlock with concrete investigation of key scheduling algorithm.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the 2014 Twelfth Annual International Conference on Privacy, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm and Its Application to LBlock.
Proceedings of the Network and System Security - 8th International Conference, 2014
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Proceedings of the Information Security Practice and Experience, 2014
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Ninth Asia Joint Conference on Information Security, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Internet and Distributed Computing Systems, 2013
How to Build Random Key Pre-distribution Schemes with Self-Healing for Multiphase WSNs.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
J. Internet Serv. Inf. Secur., 2012
Informatica (Slovenia), 2012
Int. J. Appl. Cryptogr., 2012
Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Network and System Security - 6th International Conference, 2012
Proceedings of the Information Security Practice and Experience, 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the Cyberspace Safety and Security - 4th International Symposium, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2011
J. Cryptogr. Eng., 2011
IEICE Trans. Inf. Syst., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2011
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption.
Proceedings of the Information Security, 14th International Conference, 2011
Proceedings of the Information Security, 14th International Conference, 2011
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Data and Applications Security and Privacy XXV, 2011
<i>T</i>-Robust Scalable Group Key Exchange Protocol with <i>O</i>(log<i>n</i>) Complexity.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length.
Int. J. Appl. Cryptogr., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the Information Security Applications - 11th International Workshop, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.
Proceedings of the Provable Security - 4th International Conference, 2010
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the Information Security, 2010
RPoK: A Strongly Resilient Polynomial-Based Random Key Pre-Distribution Scheme for Multiphase Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2010
An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model.
Proceedings of the Information Security and Cryptology - 6th International Conference, 2010
Co-<i>Z</i> Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract).
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010
2009
A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics.
J. Inf. Process., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of the 2009 International Conference on Complex, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
J. Inf. Process., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008
2007
Inf. Media Technol., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Mobile Agent Security with Efficient Oblivious Transfer.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the Information Security and Cryptology, 2007
2006
Inf. Media Technol., 2006
Inf. Media Technol., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
2005
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Proceedings of the Topics in Cryptology, 2004
Proceedings of the Cryptographic Hardware and Embedded Systems, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
Proceedings of the Applied Cryptography and Network Security, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Communications and Multimedia Security, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
Proceedings of the Applied Cryptography and Network Security, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Information and Communications Security, 4th International Conference, 2002
A Second-price Sealed-bid Auction with the Discriminant of the p<sub>0</sub>-th Root.
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the Financial Cryptography, 6th International Conference, 2002
Proceedings of the Topics in Cryptology, 2002
2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
Proceedings of the Progress in Cryptology, 2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
2000
Proceedings of the Information Security, Third International Workshop, 2000
Proceedings of the Information Security and Cryptology, 2000
A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000
1998
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
Proceedings of the Advances in Cryptology, 1996
1992
Proceedings of the Advances in Cryptology, 1992
1991
Proceedings of the Advances in Cryptology, 1991