What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Atsuko Miyaji
Google Scholar
ORCID:
0000-0001-8822-5287
79
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiajcis
Privacy-Preserving Attribute Domain Reconstruction for Machine Learning.
Yuto Tsujimoto
Atsuko Miyaji
2025
conf/asiajcis
An Attack on Ring-LWE Using a Dynamically Adjustable Block Size BKW Algorithm.
Kenjiro Hirose
Shinya Okumura
Atsuko Miyaji
2025
conf/asiajcis
Key-Value Commitments with Unlinkability.
Towa Tsujimura
Atsuko Miyaji
2025
conf/provsec
Dynamic Self-feedback Mechanism for Improved Privacy Budgeting in LDP-SGD.
Bingchang He
Atsuko Miyaji
2025
conf/provsec
Improved Constant-Time Modular Inversion.
Shogo Kuramoto
Atsuko Miyaji
2024
conf/asiajcis
Backdoored-input Detection by Trigger Embedding.
Akira Fujimoto
Shintaro Yamashita
Yuntao Wang
Atsuko Miyaji
2024
conf/asiajcis
Pairing Based Multisignature with Message Flexibility.
Kodai Hayashida
Atsuko Miyaji
2024
conf/asiajcis
Proposal for Key-Value Commitments with Offline Batch Update.
Toshiyuki Mineta
Atsuko Miyaji
Hideaki Miyaji
2024
conf/asiajcis
Consideration on Defining Field for Efficient Ring-LWE.
Rintaro Yamada
Shinya Okumura
Atsuko Miyaji
2023
conf/asiajcis
Revisited linear approximation formula of ChaCha.
Atsuki Nagai
Atsuko Miyaji
2023
conf/asiajcis
Privacy-Preserving Frequency Estimation Method.
Naoki Kawahara
Atsuko Miyaji
Tomoaki Mimoto
2023
conf/provsec
Constant-Size Group Signatures with Message-Dependent Opening from Lattices.
Simin Chen
Jiageng Chen
Atsuko Miyaji
Kaiming Chen
2023
conf/wisa
Improved Differential-Linear Cryptanalysis of Reduced Rounds of ChaCha.
Ryo Watanabe
Nasratullah Ghafoori
Atsuko Miyaji
2023
conf/cans
Lattice-Based Key-Value Commitment Scheme with Key-Binding and Key-Hiding Properties.
Hideaki Miyaji
Atsuko Miyaji
2023
conf/cans
A Practical Forward-Secure DualRing.
Nan Li
Yingjiu Li
Atsuko Miyaji
Yangguang Tian
Tsz Hon Yuen
2022
conf/acisp
PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher.
Shotaro Miyashita
Ryoma Ito
Atsuko Miyaji
2022
conf/asiajcis
Lattice-Based Accumulator with Efficient Updating.
Yuta Maeno
Atsuko Miyaji
Hideaki Miyaji
2022
conf/sacrypt
On the Weakness of Ring-LWE mod Prime Ideal $\mathfrak {q}$ by Trace Map.
Tomoka Takahashi
Shinya Okumura
Atsuko Miyaji
2021
conf/acns
Efficient FPGA Design of Exception-Free Generic Elliptic Curve Cryptosystems.
Kiyofumi Tanaka
Atsuko Miyaji
Yaoan Jin
2020
conf/acisp
Secure and Compact Elliptic Curve LR Scalar Multiplication.
Yaoan Jin
Atsuko Miyaji
2020
conf/asiajcis
Privacy Preserving Data Integration Protocol.
Atsuko Miyaji
Yoshitaka Nagao
2020
conf/asiajcis
SIT: Supersingular Isogeny Tree-based Group Key Exchange.
Hector B. Hougaard
Atsuko Miyaji
2020
conf/wisa
Efficient Algorithm for Computing Odd-Degree Isogenies on Montgomery Curves.
Kenta Kodera
Chen-Mou Cheng
Atsuko Miyaji
2020
conf/icics
Tree-Based Ring-LWE Group Key Exchanges with Logarithmic Complexity.
Hector B. Hougaard
Atsuko Miyaji
2019
conf/acisp
Secure and Compact Elliptic Curve Cryptosystems.
Yaoan Jin
Atsuko Miyaji
2019
conf/asiajcis
Secure Online-Efficient Interval Test based on Empty-Set Check.
Katsunari Shishido
Atsuko Miyaji
2019
conf/asiajcis
String commitment scheme with low output locality.
Hideaki Miyaji
Akinori Kawachi
Atsuko Miyaji
2019
conf/sacrypt
An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks.
Akifumi Muroi
Shinya Okumura
Atsuko Miyaji
2018
journals/istr
OTP-IoT: An ownership transfer protocol for the Internet of Things.
Mohammad Saiful Islam Mamun
Chunhua Su
Anjia Yang
Atsuko Miyaji
Ali A. Ghorbani
2018
conf/acisp
New Iterated RC4 Key Correlations.
Ryoma Ito
Atsuko Miyaji
2018
conf/icisc
A Closer Look at the Guo-Johansson-Stankovski Attack Against QC-MDPC Codes.
Tung Chou
Yohei Maezawa
Atsuko Miyaji
2017
journals/tifs
Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices.
Steven Gordon
Xinyi Huang
Atsuko Miyaji
Chunhua Su
Karin Sumongkayothin
Komwut Wipusitwarakun
2017
conf/icisc
On the Computational Complexity of ECDLP for Elliptic Curves in Various Forms Using Index Calculus.
Chen-Mou Cheng
Kenta Kodera
Atsuko Miyaji
2016
conf/acisp
Secure and Traceable Framework for Data Circulation.
Kaitai Liang
Atsuko Miyaji
Chunhua Su
2015
conf/fse
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA.
Ryoma Ito
Atsuko Miyaji
2015
conf/acisp
How TKIP Induces Biases of Internal States of Generic RC4.
Ryoma Ito
Atsuko Miyaji
2015
conf/wisa
M-ORAM: A Matrix ORAM with Log N Bandwidth Cost.
Steven Gordon
Atsuko Miyaji
Chunhua Su
Karin Sumongkayothin
2014
conf/asiajcis
A New (n, n) Blockcipher Hash Function: Apposite for Short Messages.
Atsuko Miyaji
Mazumder Rashed
Tsuyoshi Sawada
2014
conf/icisc
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.
Jiageng Chen
Shoichi Hirose
Hidenori Kuwakado
Atsuko Miyaji
2014
conf/provsec
A Provable Secure Batch Authentication Scheme for EPCGen2 Tags.
Jiageng Chen
Atsuko Miyaji
Chunhua Su
2014
conf/wisa
New Integrated Long-Term Glimpse of RC4.
Ryoma Ito
Atsuko Miyaji
2012
conf/cans
How to Enhance the Security on the Least Significant Bit.
Atsuko Miyaji
Yiren Mo
2011
conf/acisp
) Complexity.
Tetsuya Hatano
Atsuko Miyaji
Takashi Sato
2011
conf/acisp
Toward Dynamic Attribute-Based Signcryption (Poster).
Keita Emura
Atsuko Miyaji
Mohammad Shahriar Rahman
2011
conf/icisc
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.
Keita Emura
Atsuko Miyaji
Kazumasa Omote
2011
conf/icics
Non-interactive Opening for Ciphertexts Encrypted by Shared Keys.
Jiageng Chen
Keita Emura
Atsuko Miyaji
2011
conf/icics
Ideal Secret Sharing Schemes with Share Selectability.
Keita Emura
Atsuko Miyaji
Akito Nomura
Mohammad Shahriar Rahman
Masakazu Soshi
2011
conf/icics
Unconditionally Secure Oblivious Transfer Based on Channel Delays.
Kai-Yuen Cheong
Atsuko Miyaji
2010
conf/provsec
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.
Keita Emura
Atsuko Miyaji
Kazumasa Omote
2010
conf/provsec
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.
Keita Emura
Atsuko Miyaji
Kazumasa Omote
2010
conf/ches
Addition Formulæ and Binary Ladders on Elliptic Curves - (Extended Abstract).
Raveen R. Goundar
Marc Joye
Atsuko Miyaji
2010
conf/wisa
Hidden Credential Retrieval without Random Oracles.
Atsuko Miyaji
Mohammad Shahriar Rahman
Masakazu Soshi
2010
conf/wisa
Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks.
Atsuko Miyaji
Kazumasa Omote
2009
conf/acisp
New Correlations of RC4 PRGA Using Nonzero-Bit Differences.
Atsuko Miyaji
Masahiro Sukegawa
2009
conf/wisa
-Times Relaxed Anonymous Authentication Scheme.
Keita Emura
Atsuko Miyaji
Kazumasa Omote
2007
conf/icisc
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA.
Atsuko Miyaji
2005
conf/acisp
On the Success Probability of chi<sup>2</sup>-attack on RC6.
Atsuko Miyaji
Yuuki Takano
2004
conf/acns
Success Probability in Chi<sup>2</sup>-Attacks.
Takashi Matsunaka
Atsuko Miyaji
Yuuki Takano
2004
conf/acns
A Fully-Functional Group Signature Scheme over Only Known-Order Group.
Atsuko Miyaji
Kozue Umeda
2004
conf/ches
Efficient Countermeasures against RPA, DPA, and SPA.
Hideyo Mamiya
Atsuko Miyaji
Hiroaki Morimoto
2004
conf/ctrsa
A Generic Construction for Intrusion-Resilient Public-Key Encryption.
Yevgeniy Dodis
Matthew K. Franklin
Jonathan Katz
Atsuko Miyaji
Moti Yung
2003
conf/acisp
Evaluation of Anonymity of Practical Anonymous Communication Networks.
Shigeki Kitazawa
Masakazu Soshi
Atsuko Miyaji
2003
conf/acns
Optimized Chi<sup>2</sup>-Attack against RC6.
Norihisa Isogai
Takashi Matsunaka
Atsuko Miyaji
2003
conf/acns
Anonymity-Enhanced Pseudonym System.
Yuko Tamura
Atsuko Miyaji
2003
conf/ctrsa
Intrusion-Resilient Public-Key Encryption.
Yevgeniy Dodis
Matthew K. Franklin
Jonathan Katz
Atsuko Miyaji
Moti Yung
2002
conf/fc
An Improved Fast Signature Scheme without Online Multiplication.
Takeshi Okamoto
Mitsuru Tada
Atsuko Miyaji
2002
conf/fc
A Second-price Sealed-bid Auction with the Discriminant of the p<sub>0</sub>-th Root.
Kazumasa Omote
Atsuko Miyaji
2002
conf/icics
Cryptanalysis of the Reduced-Round RC6.
Atsuko Miyaji
Masao Nonaka
2002
conf/ctrsa
Known Plaintext Correlation Attack against RC5.
Atsuko Miyaji
Masao Nonaka
Yoshinori Takii
2001
conf/acisp
A Practical English Auction with One-Time Registration.
Kazumasa Omote
Atsuko Miyaji
2001
conf/acisp
Efficient and Unconditionally Secure Verifiable Threshold Changeable Scheme.
Ayako Maeda
Atsuko Miyaji
Mitsuru Tada
2001
conf/icisc
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks.
Kei Kawauchi
Hiroshi Minato
Atsuko Miyaji
Mitsuru Tada
2000
conf/acisp
A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability.
Shirow Mitomi
Atsuko Miyaji
2000
conf/icisc
Characterization of Elliptic Curve Traces under FR-Reduction.
Atsuko Miyaji
Masaki Nakabayashi
Shunzo Takano
1998
conf/asiacrypt
Efficient Elliptic Curve Exponentiation Using Mixed Coordinates.
Henri Cohen
Atsuko Miyaji
Takatoshi Ono
1997
conf/icics
Efficient elliptic curve exponentiation.
Atsuko Miyaji
Takatoshi Ono
Henri Cohen
1996
conf/asiacrypt
A Message Recovery Signature Scheme Equivalent to DSA over Elliptic Curves.
Atsuko Miyaji
1992
conf/asiacrypt
Elliptic Curves over F<sub>p</sub> Suitable for Cryptosystems.
Atsuko Miyaji
1991
conf/asiacrypt
On Ordinary Elliptic Curve Cryptosystems.
Atsuko Miyaji
Coauthors
Akifumi Muroi
(1)
Akinori Kawachi
(1)
Akira Fujimoto
(1)
Akito Nomura
(1)
Ali A. Ghorbani
(1)
Anjia Yang
(1)
Atsuki Nagai
(1)
Atsuko Miyaji
(79)
Ayako Maeda
(1)
Bingchang He
(1)
Chen-Mou Cheng
(2)
Chunhua Su
(5)
Hector B. Hougaard
(2)
Henri Cohen
(2)
Hideaki Miyaji
(4)
Hidenori Kuwakado
(1)
Hideyo Mamiya
(1)
Hiroaki Morimoto
(1)
Hiroshi Minato
(1)
Jiageng Chen
(4)
Jonathan Katz
(2)
Kai-Yuen Cheong
(1)
Kaiming Chen
(1)
Kaitai Liang
(1)
Karin Sumongkayothin
(2)
Katsunari Shishido
(1)
Kazumasa Omote
(7)
Kei Kawauchi
(1)
Keita Emura
(7)
Kenjiro Hirose
(1)
Kenta Kodera
(2)
Kiyofumi Tanaka
(1)
Kodai Hayashida
(1)
Komwut Wipusitwarakun
(1)
Kozue Umeda
(1)
Marc Joye
(1)
Masahiro Sukegawa
(1)
Masakazu Soshi
(3)
Masaki Nakabayashi
(1)
Masao Nonaka
(2)
Matthew K. Franklin
(2)
Mazumder Rashed
(1)
Mitsuru Tada
(3)
Mohammad Saiful Islam Mamun
(1)
Mohammad Shahriar Rahman
(3)
Moti Yung
(2)
Nan Li
(1)
Naoki Kawahara
(1)
Nasratullah Ghafoori
(1)
Norihisa Isogai
(1)
Raveen R. Goundar
(1)
Rintaro Yamada
(1)
Ryo Watanabe
(1)
Ryoma Ito
(5)
Shigeki Kitazawa
(1)
Shintaro Yamashita
(1)
Shinya Okumura
(4)
Shirow Mitomi
(1)
Shogo Kuramoto
(1)
Shoichi Hirose
(1)
Shotaro Miyashita
(1)
Shunzo Takano
(1)
Simin Chen
(1)
Steven Gordon
(2)
Takashi Matsunaka
(2)
Takashi Sato
(1)
Takatoshi Ono
(2)
Takeshi Okamoto
(1)
Tetsuya Hatano
(1)
Tomoaki Mimoto
(1)
Tomoka Takahashi
(1)
Toshiyuki Mineta
(1)
Towa Tsujimura
(1)
Tsuyoshi Sawada
(1)
Tsz Hon Yuen
(1)
Tung Chou
(1)
Xinyi Huang
(1)
Yangguang Tian
(1)
Yaoan Jin
(3)
Yevgeniy Dodis
(2)
Yingjiu Li
(1)
Yiren Mo
(1)
Yohei Maezawa
(1)
Yoshinori Takii
(1)
Yoshitaka Nagao
(1)
Yuko Tamura
(1)
Yuntao Wang
(1)
Yuta Maeno
(1)
Yuto Tsujimoto
(1)
Yuuki Takano
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to