The following pages link to Atsuko Miyaji (Q244668):
Displayed 50 items.
- An improved security analysis on an indeterminate equation public key cryptosystem by evaluation attacks (Q778937) (← links)
- On the computational complexity of ECDLP for elliptic curves in various forms using index calculus (Q1642463) (← links)
- A closer look at the Guo-Johansson-Stankovski attack against QC-MDPC codes (Q1736068) (← links)
- Dynamic attribute-based signcryption without random oracles (Q1758888) (← links)
- New iterated RC4 key correlations (Q1784448) (← links)
- Secure and compact elliptic curve LR scalar multiplication (Q2030888) (← links)
- Efficient FPGA design of exception-free generic elliptic curve cryptosystems (Q2117041) (← links)
- Secure and compact elliptic curve cryptosystems (Q2183954) (← links)
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users (Q2336893) (← links)
- SKENO: Secret key encryption with non-interactive opening (Q2515962) (← links)
- Novel strategies for searching RC4 key collisions (Q2629507) (← links)
- (Q2721157) (← links)
- (Q2763028) (← links)
- Secure and Traceable Framework for Data Circulation (Q2817476) (← links)
- Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks (Q2894365) (← links)
- A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 (Q2942841) (← links)
- New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA (Q2946963) (← links)
- Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree (Q2947157) (← links)
- A Provable Secure Batch Authentication Scheme for EPCGen2 Tags (Q2948142) (← links)
- A Second-Price Sealed-Bid Auction with Verifiable Discriminant of p 0-th Root (Q2995362) (← links)
- An Improved Fast Signature Scheme without Online Multiplication (Q2995369) (← links)
- T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity (Q3012988) (← links)
- Toward Dynamic Attribute-Based Signcryption (Poster) (Q3013013) (← links)
- A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model (Q3019916) (← links)
- Redesigning Group Key Exchange Protocol Based on Bilinear Pairing Suitable for Various Environments (Q3019928) (← links)
- How to Find Short RC4 Colliding Key Pairs (Q3095096) (← links)
- (Q3149733) (← links)
- (Q3149760) (← links)
- A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users (Q3168623) (← links)
- How TKIP Induces Biases of Internal States of Generic RC4 (Q3194610) (← links)
- Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves (Q3583441) (← links)
- Generalized RC4 Key Collisions and Hash Collisions (Q3588331) (← links)
- New Correlations of RC4 PRGA Using Nonzero-Bit Differences (Q3634490) (← links)
- (Q4249254) (← links)
- (Q4314052) (← links)
- (Q4341717) (← links)
- (Q4373641) (← links)
- (Q4418524) (← links)
- (Q4428383) (← links)
- (Q4450729) (← links)
- (Q4472071) (← links)
- (Q4472405) (← links)
- (Q4505601) (← links)
- (Q4536244) (← links)
- (Q4536663) (← links)
- Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data (Q4605645) (← links)
- Applied Cryptography and Network Security (Q4680933) (← links)
- Applied Cryptography and Network Security (Q4680952) (← links)
- (Q4788584) (← links)
- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation (Q4933220) (← links)