Search the dblp DataBase
Atsuko Miyaji :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Shigeki Kitazawa , Masakazu Soshi , Atsuko Miyaji Evaluation of Anonymity of Practical Anonymous Communication Networks. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:13-26 [Conf ] Shirow Mitomi , Atsuko Miyaji A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. [Citation Graph (0, 0)][DBLP ] ACISP, 2000, pp:298-312 [Conf ] Atsuko Miyaji , Yuuki Takano On the Success Probability of chi2 -attack on RC6. [Citation Graph (0, 0)][DBLP ] ACISP, 2005, pp:61-74 [Conf ] Kazumasa Omote , Atsuko Miyaji A Practical English Auction with One-Time Registration. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:221-234 [Conf ] Ayako Maeda , Atsuko Miyaji , Mitsuru Tada Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2001, pp:403-416 [Conf ] Takashi Matsunaka , Atsuko Miyaji , Yuuki Takano Success Probability in Chi2 -Attacks. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:310-325 [Conf ] Atsuko Miyaji , Kozue Umeda A Fully-Functional Group Signature Scheme over Only Known-Order Group. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:164-179 [Conf ] Yuko Tamura , Atsuko Miyaji Anonymity-Enhanced Pseudonym System. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:33-47 [Conf ] Norihisa Isogai , Takashi Matsunaka , Atsuko Miyaji Optimized Chi2 -Attack against RC6. [Citation Graph (0, 0)][DBLP ] ACNS, 2003, pp:16-32 [Conf ] Henri Cohen , Atsuko Miyaji , Takatoshi Ono Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1998, pp:51-65 [Conf ] Atsuko Miyaji On Ordinary Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1991, pp:460-469 [Conf ] Atsuko Miyaji Elliptic Curves over Fp Suitable for Cryptosystems. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1992, pp:479-491 [Conf ] Atsuko Miyaji A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1996, pp:1-14 [Conf ] Hideyo Mamiya , Atsuko Miyaji , Hiroaki Morimoto Efficient Countermeasures against RPA, DPA, and SPA. [Citation Graph (0, 0)][DBLP ] CHES, 2004, pp:343-356 [Conf ] Yusuke Sakabe , Masakazu Soshi , Atsuko Miyaji Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. [Citation Graph (0, 0)][DBLP ] Communications and Multimedia Security, 2003, pp:89-103 [Conf ] Atsuko Miyaji , Masao Nonaka , Yoshinori Takii Known Plaintext Correlation Attack against RC5. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2002, pp:131-148 [Conf ] Yevgeniy Dodis , Matthew K. Franklin , Jonathan Katz , Atsuko Miyaji , Moti Yung Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:19-32 [Conf ] Yevgeniy Dodis , Matthew K. Franklin , Jonathan Katz , Atsuko Miyaji , Moti Yung A Generic Construction for Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2004, pp:81-98 [Conf ] Takeshi Okamoto , Mitsuru Tada , Atsuko Miyaji An Improved Fast Signature Scheme without Online Multiplication. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:152-167 [Conf ] Kazumasa Omote , Atsuko Miyaji A Second-price Sealed-bid Auction with the Discriminant of the p0 -th Root. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2002, pp:57-71 [Conf ] Atsuko Miyaji , Masao Nonaka Cryptanalysis of the Reduced-Round RC6. [Citation Graph (0, 0)][DBLP ] ICICS, 2002, pp:480-494 [Conf ] Atsuko Miyaji , Takatoshi Ono , Henri Cohen Efficient elliptic curve exponentiation. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:282-291 [Conf ] Kei Kawauchi , Hiroshi Minato , Atsuko Miyaji , Mitsuru Tada A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2001, pp:328-340 [Conf ] Atsuko Miyaji , Masaki Nakabayashi , Shunzo Takano Characterization of Elliptic Curve Traces under FR-Reduction. [Citation Graph (0, 0)][DBLP ] ICISC, 2000, pp:90-108 [Conf ] Takeshi Okamoto , Mitsuru Tada , Atsuko Miyaji Efficient "on the Fly" Signature Schemes Based on Integer Factoring. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2001, pp:275-286 [Conf ] Kazumasa Omote , Atsuko Miyaji An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. [Citation Graph (0, 0)][DBLP ] ISW, 2000, pp:108-120 [Conf ] Atsushi Waseda , Masakazu Soshi , Atsuko Miyaji n-State Quantum Coin Flipping Protocol. [Citation Graph (0, 0)][DBLP ] ITCC (2), 2005, pp:776-777 [Conf ] Shigeki Kitazawa , Masakazu Soshi , Atsuko Miyaji An Agent-Based Model of Anonymous Communication Protocols. [Citation Graph (0, 0)][DBLP ] WETICE, 2001, pp:177-182 [Conf ] Atsuko Miyaji Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. [Citation Graph (0, 0)][DBLP ] ICISC, 2007, pp:282-296 [Conf ] A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. [Citation Graph (, )][DBLP ] A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. [Citation Graph (, )][DBLP ] New Correlations of RC4 PRGA Using Nonzero-Bit Differences. [Citation Graph (, )][DBLP ] Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract). [Citation Graph (, )][DBLP ] Simple Certificateless Signature with Smart Cards. [Citation Graph (, )][DBLP ] A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. [Citation Graph (, )][DBLP ] A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. [Citation Graph (, )][DBLP ] Generalized RC4 Key Collisions and Hash Collisions. [Citation Graph (, )][DBLP ] Mobile Agent Security with Efficient Oblivious Transfer. [Citation Graph (, )][DBLP ] A Selectable k -Times Relaxed Anonymous Authentication Scheme. [Citation Graph (, )][DBLP ] A Secure RFID Authentication Protocol with Low Communication Cost. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.004secs