Atsuko Miyaji

From MaRDI portal
Person:244668

Available identifiers

zbMath Open miyaji.atsukoDBLP20/5513WikidataQ21702346 ScholiaQ21702346MaRDI QIDQ244668

List of research outcomes





PublicationDate of PublicationType
On the weakness of ring-LWE mod prime ideal \(\mathfrak{q}\) by trace map2024-10-16Paper
Lattice-based key-value commitment scheme with key-binding and key-hiding properties2024-06-05Paper
A practical forward-secure DualRing2024-06-05Paper
Lattice-based accumulator with constant time list update and constant time verification2023-10-04Paper
Differential cryptanalysis of Salsa20 based on comprehensive analysis of PNBs2023-08-04Paper
PNB-focused differential cryptanalysis of ChaCha stream cipher2023-07-26Paper
Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity2022-12-21Paper
Message-Restriction-Free Commitment Scheme Based on Lattice Assumption2022-08-11Paper
Efficient FPGA design of exception-free generic elliptic curve cryptosystems2022-03-21Paper
Secure and compact elliptic curve LR scalar multiplication2021-06-08Paper
An improved security analysis on an indeterminate equation public key cryptosystem by evaluation attacks2020-07-21Paper
Secure and compact elliptic curve cryptosystems2020-05-27Paper
An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users2019-11-19Paper
A closer look at the Guo-Johansson-Stankovski attack against QC-MDPC codes2019-03-29Paper
New iterated RC4 key correlations2018-09-26Paper
On the computational complexity of ECDLP for elliptic curves in various forms using index calculus2018-06-15Paper
Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data2018-02-23Paper
Secure and Traceable Framework for Data Circulation2016-08-31Paper
Accurate Estimation of the Full Differential Distribution for General Feistel Structures2016-07-25Paper
Novel strategies for searching RC4 key collisions2016-07-06Paper
How TKIP Induces Biases of Internal States of Generic RC42015-10-20Paper
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags2015-09-29Paper
Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree2015-09-22Paper
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA2015-09-18Paper
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-2562015-09-11Paper
SKENO: Secret key encryption with non-interactive opening2015-08-07Paper
Dynamic attribute-based signcryption without random oracles2012-11-16Paper
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users2012-11-01Paper
Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks2012-06-29Paper
How to Find Short RC4 Colliding Key Pairs2011-10-28Paper
Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments2011-07-29Paper
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model2011-07-29Paper
Toward Dynamic Attribute-Based Signcryption (Poster)2011-07-07Paper
T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity2011-07-07Paper
A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root2011-04-20Paper
An Improved Fast Signature Scheme without Online Multiplication2011-04-20Paper
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation2010-10-12Paper
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication2010-10-12Paper
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length2010-09-22Paper
Generalized RC4 Key Collisions and Hash Collisions2010-09-10Paper
Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves2010-08-17Paper
New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009-06-25Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA2008-05-06Paper
Applied Cryptography and Network Security2008-02-19Paper
Applied Cryptography and Network Security2008-02-19Paper
Information Security and Privacy2006-06-22Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper
Applied Cryptography and Network Security2005-06-13Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q44724052004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44720712004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44507292004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44283832003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44185242003-08-10Paper
https://portal.mardi4nfdi.de/entity/Q47885842003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q45362442003-03-24Paper
https://portal.mardi4nfdi.de/entity/Q45366632002-11-23Paper
https://portal.mardi4nfdi.de/entity/Q31497332002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q31497602002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q27630282002-01-14Paper
https://portal.mardi4nfdi.de/entity/Q27211572001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q45056012000-09-27Paper
https://portal.mardi4nfdi.de/entity/Q42492542000-07-02Paper
https://portal.mardi4nfdi.de/entity/Q43736411998-10-21Paper
https://portal.mardi4nfdi.de/entity/Q43417171997-08-26Paper
https://portal.mardi4nfdi.de/entity/Q43140521995-02-19Paper

Research outcomes over time

This page was built for person: Atsuko Miyaji