Atsuko MIYAJI


Online-Efficient Interval Test via Secure Empty-Set Check
Katsunari SHISHIDO Atsuko MIYAJI 
Publication:   
Publication Date: 2020/07/01
Vol. E103-D  No. 7  pp. 1598-1607
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
secure interval testprivate set intersectionempty-set check
 Summary | Full Text:PDF

Anonymization Technique Based on SGD Matrix Factorization
Tomoaki MIMOTO Seira HIDANO Shinsaku KIYOMOTO Atsuko MIYAJI 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2  pp. 299-308
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category: Cryptographic Techniques
Keyword: 
time-sequence dataanonymizationmatrix factorizationprivacy and utility
 Summary | Full Text:PDF

New Pseudo-Random Number Generator for EPC Gen2
Hiroshi NOMAGUCHI Chunhua SU Atsuko MIYAJI 
Publication:   
Publication Date: 2020/02/01
Vol. E103-D  No. 2  pp. 292-298
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy, Anonymity and Trust in Cyberspace Computing and Communications)
Category: Cryptographic Techniques
Keyword: 
NLFS (Non-linear feedback shift register)SLFSR (Skip-Linear feedback shift register)pseudo-random number generatorRFIDEPC Gen2
 Summary | Full Text:PDF

Differences among Summation Polynomials over Various Forms of Elliptic Curves
Chen-Mou CHENG Kenta KODERA Atsuko MIYAJI 
Publication:   
Publication Date: 2019/09/01
Vol. E102-A  No. 9  pp. 1061-1071
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
ECDLPindex calculuspoint decomposition problemsecurity evaluationsummation polynomial
 Summary | Full Text:PDF

Refined Construction of RC4 Key Setting in WPA
Ryoma ITO Atsuko MIYAJI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 138-148
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RC4WPATKIPlinear correlationskey setting
 Summary | Full Text:PDF

A Matrix Based ORAM: Design, Implementation and Experimental Analysis
Steven GORDON Atsuko MIYAJI Chunhua SU Karin SUMONGKAYOTHIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8  pp. 2044-2055
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy and Anonymity of Internet of Things)
Category: 
Keyword: 
ORAMsecure communicationsecure access patternsecure protocol
 Summary | Full Text:PDF

Refined RC4 Key Correlations of Internal States in WPA
Ryoma ITO Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6  pp. 1132-1144
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
RC4WPATKIPlinear correlations
 Summary | Full Text:PDF

A New Scheme of Blockcipher Hash
Rashed MAZUMDER Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 796-804
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptography and cryptographic protocols
Keyword: 
cryptographic hashblockcipherideal cipher modelweak cipher modelcollision and preimage resistance
 Summary | Full Text:PDF

A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256
Jiageng CHEN Shoichi HIROSE Hidenori KUWAKADO Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 14-21
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
double-block-length compression functionfree-start collision attackrebound attackAES-256
 Summary | Full Text:PDF

Refined Glimpse Correlations of RC4
Ryoma ITO Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 3-13
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RC4stream cipherGlimpse theoremlong-term Glimpse
 Summary | Full Text:PDF

Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack
Jiageng CHEN Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12  pp. 2148-2159
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
stream cipherrelated key modelRC4
 Summary | Full Text:PDF

Generalized Analysis on Key Collisions of Stream Cipher RC4
Jiageng CHEN Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/11/01
Vol. E94-A  No. 11  pp. 2194-2206
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
RC4key collisionsKSAhamming distanceRC4-Hash
 Summary | Full Text:PDF

Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
Atsuko MIYAJI Kazumasa OMOTE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/10/01
Vol. E94-D  No. 10  pp. 1955-1965
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
secure aggregationsensor networksintegrityTESLA
 Summary | Full Text:PDF

A Timed-Release Proxy Re-Encryption Scheme
Keita EMURA Atsuko MIYAJI Kazumasa OMOTE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/08/01
Vol. E94-A  No. 8  pp. 1682-1695
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
timed-release encryptionproxy re-encryption
 Summary | Full Text:PDF

New Concrete Relation between Trace, Definition Field, and Embedding Degree
Shoujiro HIRASAWA Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1368-1374
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curveembedding degree
 Summary | Full Text:PDF

Sequential Bitwise Sanitizable Signature Schemes
Goichiro HANAOKA Shoichi HIROSE Atsuko MIYAJI Kunihiko MIYAZAKI Bagus SANTOSO Peng YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 392-404
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
sanitizable signaturebitwise controlone-way permutationpseudorandom generator
 Summary | Full Text:PDF

New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
Atsuko MIYAJI Masahiro SUKEGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1066-1077
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
RC4correlationshuffle-exchange structurepseudo key collision
 Summary | Full Text:PDF

Generalized Scalar Multiplication Secure against SPA, DPA, and RPA
Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 2833-2842
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
elliptic curve scalar multiplicationZPARPADPASPA
 Summary | Full Text:PDF

Evaluation of the Security of RC6 against the χ2-Attack
Atsuko MIYAJI Yuuki TAKANO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 22-28
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
block cipherRC6χ2-attacks
 Summary | Full Text:PDF

Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA
Hideyo MAMIYA Atsuko MIYAJI Hiroaki MORIMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/08/01
Vol. E89-A  No. 8  pp. 2207-2215
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
elliptic curve exponentiationZPARPADPASPA
 Summary | Full Text:PDF

Statistical Analysis of χ2-Attacks
Norihisa ISOGAI Atsuko MIYAJI Masao NONAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1190-1197
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
block cipherstatistical analysisRC5χ2-attacks
 Summary | Full Text:PDF

Software Obfuscation on a Theoretical Basis and Its Implementation
Toshio OGISO Yusuke SAKABE Masakazu SOSHI Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 176-186
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols etc.
Keyword: 
tamper-resistant softwareobfuscationstatic analysiscomputational complexity
 Summary | Full Text:PDF

Cryptanalysis of Reduced-Round RC6 without Whitening
Atsuko MIYAJI Masao NONAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 19-30
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block cipherRC6cryptanalysisχ2 attack
 Summary | Full Text:PDF

A Practical English Auction with Simple Revocation
Kazumasa OMOTE Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/05/01
Vol. E85-A  No. 5  pp. 1054-1061
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
anonymitysignature of knowledgebulletin board
 Summary | Full Text:PDF

Improved Correlation Attack on RC5
Atsuko MIYAJI Masao NONAKA Yoshinori TAKII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 44-57
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RC5known plaintext attackcorrelation attack
 Summary | Full Text:PDF

A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability
Shirow MITOMI Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/10/01
Vol. E84-A  No. 10  pp. 2488-2499
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
multisignature schemeDLP-based signatureRSA signaturemessage recovery signature
 Summary | Full Text:PDF

New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
Atsuko MIYAJI Masaki NAKABAYASHI Shunzou TAKANO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/05/01
Vol. E84-A  No. 5  pp. 1234-1243
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemtraceFR-reduction
 Summary | Full Text:PDF

Another Countermeasure to Forgeries over Message Recovery Signature
Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2192-2200
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
message recovery signaturediscrete logarithmsfogery
 Summary | Full Text:PDF

On Secure and Fast Elliptic Curve Cryptosystems over Fp
Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/04/25
Vol. E77-A  No. 4  pp. 630-635
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public-keyelliptic curves
 Summary | Full Text:PDF

Elliptic Curves Suitable for Cryptosystems
Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1  pp. 98-106
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public-keyelliptic curvessmart card
 Summary | Full Text:PDF

Elliptic Curve Cryptosystems Immune to Any Reduction into the Discrete Logarithm Problem
Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 50-54
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public-keydiscrete logarithmselliptic curves
 Summary | Full Text:PDF