Atsuko Miyaji

From MaRDI portal
Person:244668

Available identifiers

zbMath Open miyaji.atsukoDBLP20/5513WikidataQ21702346 ScholiaQ21702346MaRDI QIDQ244668

List of research outcomes





PublicationDate of PublicationType
On the weakness of ring-LWE mod prime ideal \(\mathfrak{q}\) by trace map2024-10-16Paper
Lattice-based key-value commitment scheme with key-binding and key-hiding properties2024-06-05Paper
A practical forward-secure DualRing2024-06-05Paper
Lattice-based accumulator with constant time list update and constant time verification2023-10-04Paper
Differential cryptanalysis of Salsa20 based on comprehensive analysis of PNBs2023-08-04Paper
PNB-focused differential cryptanalysis of ChaCha stream cipher2023-07-26Paper
Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity2022-12-21Paper
Message-restriction-free commitment scheme based on lattice assumption2022-08-11Paper
Efficient FPGA design of exception-free generic elliptic curve cryptosystems2022-03-21Paper
Secure and compact elliptic curve LR scalar multiplication2021-06-08Paper
An improved security analysis on an indeterminate equation public key cryptosystem by evaluation attacks2020-07-21Paper
Secure and compact elliptic curve cryptosystems2020-05-27Paper
An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users2019-11-19Paper
A closer look at the Guo-Johansson-Stankovski attack against QC-MDPC codes2019-03-29Paper
New iterated RC4 key correlations2018-09-26Paper
On the computational complexity of ECDLP for elliptic curves in various forms using index calculus2018-06-15Paper
Probably secure keyed-function based authenticated encryption schemes for big data2018-02-23Paper
Secure and traceable framework for data circulation2016-08-31Paper
Accurate estimation of the full differential distribution for general Feistel structures2016-07-25Paper
Novel strategies for searching RC4 key collisions2016-07-06Paper
How TKIP induces biases of internal states of generic RC42015-10-20Paper
A provable secure batch authentication scheme for EPCGen2 tags2015-09-29Paper
Extended explicit relations between trace, definition field, and embedding degree2015-09-22Paper
New linear correlations related to state information of RC4 PRGA using IV in WPA2015-09-18Paper
A collision attack on a double-block-length compression function instantiated with round-reduced AES-2562015-09-11Paper
SKENO: Secret key encryption with non-interactive opening2015-08-07Paper
Dynamic attribute-based signcryption without random oracles2012-11-16Paper
A revocable group signature scheme with the property of hiding the number of revoked users2012-11-01Paper
Lightweight integrity for XOR network coding in wireless sensor networks2012-06-29Paper
How to find short RC4 colliding key pairs2011-10-28Paper
Redesigning group key exchange protocol based on bilinear pairing suitable for various environ\-ments2011-07-29Paper
A new practical key recovery attack on the stream cipher RC4 under related-key model2011-07-29Paper
Toward dynamic attribute-based signcryption (poster)2011-07-07Paper
\(T\)-robust scalable group key exchange protocol with \(O(\log n)\) complexity2011-07-07Paper
A second-price sealed-bid auction with verifiable discriminant of \(p _{0}\)-th root2011-04-20Paper
An improved fast signature scheme without online multiplication2011-04-20Paper
An anonymous designated verifier signature scheme with revocation: how to protect a company's reputation2010-10-12Paper
A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication2010-10-12Paper
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length2010-09-22Paper
Generalized RC4 key collisions and hash collisions2010-09-10Paper
Co-\(Z\) addition formulæ and binary ladders on elliptic curves. (Extended abstract)2010-08-17Paper
New Correlations of RC4 PRGA Using Nonzero-Bit Differences2009-06-25Paper
Topics in Cryptology – CT-RSA 20042009-05-07Paper
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA2008-05-06Paper
Applied Cryptography and Network Security2008-02-19Paper
Applied Cryptography and Network Security2008-02-19Paper
Information Security and Privacy2006-06-22Paper
Cryptographic Hardware and Embedded Systems - CHES 20042005-08-23Paper
Applied Cryptography and Network Security2005-06-13Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q44724052004-08-04Paper
https://portal.mardi4nfdi.de/entity/Q44720712004-08-03Paper
https://portal.mardi4nfdi.de/entity/Q44507292004-02-16Paper
https://portal.mardi4nfdi.de/entity/Q44283832003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44185242003-08-10Paper
https://portal.mardi4nfdi.de/entity/Q47885842003-05-19Paper
https://portal.mardi4nfdi.de/entity/Q45362442003-03-24Paper
https://portal.mardi4nfdi.de/entity/Q45366632002-11-23Paper
https://portal.mardi4nfdi.de/entity/Q31497332002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q31497602002-09-26Paper
https://portal.mardi4nfdi.de/entity/Q27630282002-01-14Paper
https://portal.mardi4nfdi.de/entity/Q27211572001-07-01Paper
https://portal.mardi4nfdi.de/entity/Q45056012000-09-27Paper
https://portal.mardi4nfdi.de/entity/Q42492542000-07-02Paper
https://portal.mardi4nfdi.de/entity/Q43736411998-10-21Paper
https://portal.mardi4nfdi.de/entity/Q43417171997-08-26Paper
https://portal.mardi4nfdi.de/entity/Q43140521995-02-19Paper

Research outcomes over time

This page was built for person: Atsuko Miyaji