Masahiro MAMBO


FOREWORD
Masahiro MAMBO 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 1-2
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(80.7KB)

Implementation of µNaCl on 32-bit ARM Cortex-M0
Toshifumi NISHINAGA Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8  pp. 2056-2060
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy and Anonymity of Internet of Things)
Category: 
Keyword: 
Cortex-M0crypto libraryembeddedmicrocontrollerIoT
 Summary | Full Text:PDF(178KB)

Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
Lihua WANG Licheng WANG Masahiro MAMBO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 70-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
proxy decryptionproxy re-encryptionrevocabilityhierarchical confidentialities
 Summary | Full Text:PDF(901.5KB)

A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism
Naoto YANAI Eikoh CHIDA Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1346-1355
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
multisignature schemestructured multisignature schemehomomorphic schemenon-commutative ring homomorphismrandom oracle model
 Summary | Full Text:PDF(366.7KB)

Toward Separating Integer Factoring from Discrete Logarithm mod p
Shuji ISOBE Wataru KUMAGAI Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 48-53
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundations
Keyword: 
preimage functionsrange injection reductionthe Heath-Brown conjectureinteger factoringcertified discrete logarithm
 Summary | Full Text:PDF(328.2KB)

On the Polynomial Time Computability of Abstract Ray-Tracing Problems
Shuji ISOBE Tetsuo KURIYAMA Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5  pp. 1209-1213
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
ray-tracing problemabstract ray-tracing problem (ARTP)PSPACE-hard/completescene
 Summary | Full Text:PDF(176.6KB)

The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem
Chisato KONOMA Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 81-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
discrete logarithm problemdouble discrete logarithm problemsquare root of discrete logarithm probleme-th root of discrete logarithm problem
 Summary | Full Text:PDF(193.3KB)

Complexity Analysis of the Cryptographic Primitive Problems through Square-Root Exponent
Chisato KONOMA Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1083-1091
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
square-root exponentdiscrete logarithm problemfactoring problemDiffie-Hellman problemcomputing problemdecision problem
 Summary | Full Text:PDF(218.5KB)

On the Strength of the Strong RSA Assumption
Shintaro ITAGAKI Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1164-1170
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
strong RSA assumptionRSAalgebraic computationstraight-line program
 Summary | Full Text:PDF(236.4KB)

On the Security of Girault Key Agreement Protocols against Active Attacks
Soo-Hyun OH Masahiro MAMBO Hiroki SHIZUYA Dong-Ho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1181-1189
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
self-certified public keyGirault key agreement protocolreduction
 Summary | Full Text:PDF(502.4KB)

On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks
Seungjoo KIM Masahiro MAMBO Takeshi OKAMOTO Hiroki SHIZUYA Mitsuru TADA Dongho WON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 231-238
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Okamoto-Tanaka key exchange schemeID-based schemeactive attackknown-key attackforward secrecy
 Summary | Full Text:PDF(288.5KB)

On the Complexity of Constructing an Elliptic Curve of a Given Order
Masato YAMAMICHI Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 140-145
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
elliptic curvefunction classcomputational complexity
 Summary | Full Text:PDF(215.8KB)

A Note on the Complexity of Breaking Okamoto-Tanaka ID-Based Key Exchange Scheme
Masahiro MAMBO Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 77-80
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key exchange schemeOkamoto-TanakaDiffie-HellmanRSAreducibility
 Summary | Full Text:PDF(121.5KB)

Constructing Identity-Based Key Distribution Systems over Elliptic Curves
Hisao SAKAZAKI Eiji OKAMOTO Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10  pp. 2138-2143
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
ID-based key distribution systemselliptic curve message recovery signature
 Summary | Full Text:PDF(530.5KB)

Anonymous Public Key Certificates and their Applications
Kazuomi OISHI Masahiro MAMBO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1  pp. 56-64
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public key certificatesone-time certificatesanonymityunlinkability
 Summary | Full Text:PDF(816.5KB)

Factoring Hard Integers on a Parallel Machine
Rene PERALTA Masahiro MAMBO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/04/25
Vol. E80-A  No. 4  pp. 658-662
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
integer factorizationCunningham projectparallel algorithmsHMPQSnumber-theoretic cryptology
 Summary | Full Text:PDF(444KB)

Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts
Masahiro MAMBO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 54-63
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
proxy cryptosystemproxyproxy decryptorciphertext transformation
 Summary | Full Text:PDF(897.9KB)

Proxy Signatures: Delegation of the Power to Sign Messages
Masahiro MAMBO Keisuke USUDA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/09/25
Vol. E79-A  No. 9  pp. 1338-1354
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Source Coding/Security
Keyword: 
proxyproxy signatureproxy signerdelegationseal
 Summary | Full Text:PDF(1.5MB)

Proposal of an Automatic Signature Scheme Using a Compiler
Keisuke USUDA Masahiro MAMBO Tomohiko UYEMATSU Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 94-101
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
computer virusvirus protectiondigital signatureautomatic signature scheme
 Summary | Full Text:PDF(685.5KB)

Permutation Cipher Scheme Using Polynomials over a Field
Eiji OKAMOTO Tomohiko UYEMATSU Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1995/02/25
Vol. E78-D  No. 2  pp. 138-142
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyinformation securitypermutationReed-Solomon code
 Summary | Full Text:PDF(382.8KB)

A Secure Broadcast Communication Method with Short Messages
Masahiro MAMBO Akinori NISHIKAWA Eiji OKAMOTO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8  pp. 1319-1327
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
secure broadcast communicationmessage length
 Summary | Full Text:PDF(793.9KB)

5-Move Statistical Zero Knowledge
Kaoru KUROSAWA Masahiro MAMBO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 40-45
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
statistical ZKIPperfect ZKIPstandard ZKIPinvulnerable generatorclass K
 Summary | Full Text:PDF(529.1KB)