The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Atsuko Miyaji: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji
    Evaluation of Anonymity of Practical Anonymous Communication Networks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:13-26 [Conf]
  2. Shirow Mitomi, Atsuko Miyaji
    A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:298-312 [Conf]
  3. Atsuko Miyaji, Yuuki Takano
    On the Success Probability of chi2-attack on RC6. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:61-74 [Conf]
  4. Kazumasa Omote, Atsuko Miyaji
    A Practical English Auction with One-Time Registration. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:221-234 [Conf]
  5. Ayako Maeda, Atsuko Miyaji, Mitsuru Tada
    Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2001, pp:403-416 [Conf]
  6. Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano
    Success Probability in Chi2-Attacks. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:310-325 [Conf]
  7. Atsuko Miyaji, Kozue Umeda
    A Fully-Functional Group Signature Scheme over Only Known-Order Group. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:164-179 [Conf]
  8. Yuko Tamura, Atsuko Miyaji
    Anonymity-Enhanced Pseudonym System. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:33-47 [Conf]
  9. Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji
    Optimized Chi2-Attack against RC6. [Citation Graph (0, 0)][DBLP]
    ACNS, 2003, pp:16-32 [Conf]
  10. Henri Cohen, Atsuko Miyaji, Takatoshi Ono
    Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:51-65 [Conf]
  11. Atsuko Miyaji
    On Ordinary Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1991, pp:460-469 [Conf]
  12. Atsuko Miyaji
    Elliptic Curves over Fp Suitable for Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:479-491 [Conf]
  13. Atsuko Miyaji
    A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:1-14 [Conf]
  14. Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto
    Efficient Countermeasures against RPA, DPA, and SPA. [Citation Graph (0, 0)][DBLP]
    CHES, 2004, pp:343-356 [Conf]
  15. Yusuke Sakabe, Masakazu Soshi, Atsuko Miyaji
    Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2003, pp:89-103 [Conf]
  16. Atsuko Miyaji, Masao Nonaka, Yoshinori Takii
    Known Plaintext Correlation Attack against RC5. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:131-148 [Conf]
  17. Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
    Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:19-32 [Conf]
  18. Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung
    A Generic Construction for Intrusion-Resilient Public-Key Encryption. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:81-98 [Conf]
  19. Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
    An Improved Fast Signature Scheme without Online Multiplication. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:152-167 [Conf]
  20. Kazumasa Omote, Atsuko Miyaji
    A Second-price Sealed-bid Auction with the Discriminant of the p0-th Root. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2002, pp:57-71 [Conf]
  21. Atsuko Miyaji, Masao Nonaka
    Cryptanalysis of the Reduced-Round RC6. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:480-494 [Conf]
  22. Atsuko Miyaji, Takatoshi Ono, Henri Cohen
    Efficient elliptic curve exponentiation. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:282-291 [Conf]
  23. Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada
    A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:328-340 [Conf]
  24. Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano
    Characterization of Elliptic Curve Traces under FR-Reduction. [Citation Graph (0, 0)][DBLP]
    ICISC, 2000, pp:90-108 [Conf]
  25. Takeshi Okamoto, Mitsuru Tada, Atsuko Miyaji
    Efficient "on the Fly" Signature Schemes Based on Integer Factoring. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:275-286 [Conf]
  26. Kazumasa Omote, Atsuko Miyaji
    An Anonymous Aution Protocol with a Single Non-trusted Center Using Binary Trees. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:108-120 [Conf]
  27. Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji
    n-State Quantum Coin Flipping Protocol. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2005, pp:776-777 [Conf]
  28. Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji
    An Agent-Based Model of Anonymous Communication Protocols. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:177-182 [Conf]
  29. Atsuko Miyaji
    Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:282-296 [Conf]

  30. A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics. [Citation Graph (, )][DBLP]


  31. A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier. [Citation Graph (, )][DBLP]


  32. New Correlations of RC4 PRGA Using Nonzero-Bit Differences. [Citation Graph (, )][DBLP]


  33. Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract). [Citation Graph (, )][DBLP]


  34. Simple Certificateless Signature with Smart Cards. [Citation Graph (, )][DBLP]


  35. A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length. [Citation Graph (, )][DBLP]


  36. A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance. [Citation Graph (, )][DBLP]


  37. Generalized RC4 Key Collisions and Hash Collisions. [Citation Graph (, )][DBLP]


  38. Mobile Agent Security with Efficient Oblivious Transfer. [Citation Graph (, )][DBLP]


  39. A Selectable k-Times Relaxed Anonymous Authentication Scheme. [Citation Graph (, )][DBLP]


  40. A Secure RFID Authentication Protocol with Low Communication Cost. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002