Atsuko MIYAJI


Differences among Summation Polynomials over Various Forms of Elliptic Curves
Chen-Mou CHENG Kenta KODERA Atsuko MIYAJI 
Publication:   
Publication Date: 2019/09/01
Vol. E102-A  No. 9  pp. 1061-1071
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
ECDLPindex calculuspoint decomposition problemsecurity evaluationsummation polynomial
 Summary | Full Text:PDF(1.1MB)

Refined Construction of RC4 Key Setting in WPA
Ryoma ITO Atsuko MIYAJI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 138-148
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RC4WPATKIPlinear correlationskey setting
 Summary | Full Text:PDF(481.5KB)

A Matrix Based ORAM: Design, Implementation and Experimental Analysis
Steven GORDON Atsuko MIYAJI Chunhua SU Karin SUMONGKAYOTHIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/08/01
Vol. E99-D  No. 8  pp. 2044-2055
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy and Anonymity of Internet of Things)
Category: 
Keyword: 
ORAMsecure communicationsecure access patternsecure protocol
 Summary | Full Text:PDF(1.6MB)

Refined RC4 Key Correlations of Internal States in WPA
Ryoma ITO Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6  pp. 1132-1144
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
RC4WPATKIPlinear correlations
 Summary | Full Text:PDF(875.8KB)

A New Scheme of Blockcipher Hash
Rashed MAZUMDER Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 796-804
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptography and cryptographic protocols
Keyword: 
cryptographic hashblockcipherideal cipher modelweak cipher modelcollision and preimage resistance
 Summary | Full Text:PDF(531.7KB)

Refined Glimpse Correlations of RC4
Ryoma ITO Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 3-13
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RC4stream cipherGlimpse theoremlong-term Glimpse
 Summary | Full Text:PDF(1.1MB)

A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256
Jiageng CHEN Shoichi HIROSE Hidenori KUWAKADO Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 14-21
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
double-block-length compression functionfree-start collision attackrebound attackAES-256
 Summary | Full Text:PDF(1.3MB)

Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack
Jiageng CHEN Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12  pp. 2148-2159
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
stream cipherrelated key modelRC4
 Summary | Full Text:PDF(1.2MB)

Generalized Analysis on Key Collisions of Stream Cipher RC4
Jiageng CHEN Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/11/01
Vol. E94-A  No. 11  pp. 2194-2206
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
RC4key collisionsKSAhamming distanceRC4-Hash
 Summary | Full Text:PDF(1.3MB)

Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes
Atsuko MIYAJI Kazumasa OMOTE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/10/01
Vol. E94-D  No. 10  pp. 1955-1965
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
secure aggregationsensor networksintegrityTESLA
 Summary | Full Text:PDF(380.1KB)

A Timed-Release Proxy Re-Encryption Scheme
Keita EMURA Atsuko MIYAJI Kazumasa OMOTE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/08/01
Vol. E94-A  No. 8  pp. 1682-1695
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
timed-release encryptionproxy re-encryption
 Summary | Full Text:PDF(397.7KB)

New Concrete Relation between Trace, Definition Field, and Embedding Degree
Shoujiro HIRASAWA Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1368-1374
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curveembedding degree
 Summary | Full Text:PDF(237.3KB)

Sequential Bitwise Sanitizable Signature Schemes
Goichiro HANAOKA Shoichi HIROSE Atsuko MIYAJI Kunihiko MIYAZAKI Bagus SANTOSO Peng YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 392-404
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
sanitizable signaturebitwise controlone-way permutationpseudorandom generator
 Summary | Full Text:PDF(645.5KB)

New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
Atsuko MIYAJI Masahiro SUKEGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1066-1077
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
RC4correlationshuffle-exchange structurepseudo key collision
 Summary | Full Text:PDF(1018.7KB)

Generalized Scalar Multiplication Secure against SPA, DPA, and RPA
Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 2833-2842
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
elliptic curve scalar multiplicationZPARPADPASPA
 Summary | Full Text:PDF(213.5KB)

Evaluation of the Security of RC6 against the χ2-Attack
Atsuko MIYAJI Yuuki TAKANO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 22-28
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
block cipherRC6χ2-attacks
 Summary | Full Text:PDF(183.6KB)

Secure Elliptic Curve Exponentiation against RPA, ZRA, DPA, and SPA
Hideyo MAMIYA Atsuko MIYAJI Hiroaki MORIMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/08/01
Vol. E89-A  No. 8  pp. 2207-2215
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
elliptic curve exponentiationZPARPADPASPA
 Summary | Full Text:PDF(228.5KB)

Statistical Analysis of χ2-Attacks
Norihisa ISOGAI Atsuko MIYAJI Masao NONAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1190-1197
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
block cipherstatistical analysisRC5χ2-attacks
 Summary | Full Text:PDF(250.6KB)

Cryptanalysis of Reduced-Round RC6 without Whitening
Atsuko MIYAJI Masao NONAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 19-30
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block cipherRC6cryptanalysisχ2 attack
 Summary | Full Text:PDF(685.3KB)

Software Obfuscation on a Theoretical Basis and Its Implementation
Toshio OGISO Yusuke SAKABE Masakazu SOSHI Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 176-186
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols etc.
Keyword: 
tamper-resistant softwareobfuscationstatic analysiscomputational complexity
 Summary | Full Text:PDF(744.1KB)

A Practical English Auction with Simple Revocation
Kazumasa OMOTE Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/05/01
Vol. E85-A  No. 5  pp. 1054-1061
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
anonymitysignature of knowledgebulletin board
 Summary | Full Text:PDF(300.6KB)

Improved Correlation Attack on RC5
Atsuko MIYAJI Masao NONAKA Yoshinori TAKII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 44-57
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RC5known plaintext attackcorrelation attack
 Summary | Full Text:PDF(630KB)

A General Model of Multisignature Schemes with Message Flexibility, Order Flexibility, and Order Verifiability
Shirow MITOMI Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/10/01
Vol. E84-A  No. 10  pp. 2488-2499
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
multisignature schemeDLP-based signatureRSA signaturemessage recovery signature
 Summary | Full Text:PDF(438.1KB)

New Explicit Conditions of Elliptic Curve Traces for FR-Reduction
Atsuko MIYAJI Masaki NAKABAYASHI Shunzou TAKANO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/05/01
Vol. E84-A  No. 5  pp. 1234-1243
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemtraceFR-reduction
 Summary | Full Text:PDF(290.5KB)

Another Countermeasure to Forgeries over Message Recovery Signature
Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2192-2200
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
message recovery signaturediscrete logarithmsfogery
 Summary | Full Text:PDF(789.1KB)

On Secure and Fast Elliptic Curve Cryptosystems over Fp
Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/04/25
Vol. E77-A  No. 4  pp. 630-635
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public-keyelliptic curves
 Summary | Full Text:PDF(427.3KB)

Elliptic Curves Suitable for Cryptosystems
Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1  pp. 98-106
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public-keyelliptic curvessmart card
 Summary | Full Text:PDF(560.8KB)

Elliptic Curve Cryptosystems Immune to Any Reduction into the Discrete Logarithm Problem
Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 50-54
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public-keydiscrete logarithmselliptic curves
 Summary | Full Text:PDF(400.2KB)