Atsushi SHIMBO


Provably Secure Multisignatures in Formal Security Model and Their Optimality
Yuichi KOMANO Kazuo OHTA Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 107-118
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Signatures
Keyword: 
multisignaturestrapdoor one-way permutation (TOWP)claw-free permutation (CFP)provably securerandom oracle model
 Summary | Full Text:PDF

Toward the Fair Anonymous Signatures: Deniable Ring Signatures
Yuichi KOMANO Kazuo OHTA Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 54-64
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Signatures
Keyword: 
group signaturesring signaturesDLPCDHDDHrandom oracle model
 Summary | Full Text:PDF

An SPA-Based Extension of Schindler's Timing Attack against RSA Using CRT
Yuuki TOMOEDA Hideyuki MIYAKE Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 147-153
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
SPAtiming attackMontgomery multiplicationRSAChinese remainder theorem
 Summary | Full Text:PDF

RNS Montgomery Multiplication Algorithm for Duplicate Processing of Base Transformations
Hanae NOZAKI Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 89-97
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Ciphers
Keyword: 
RSA cryptographymodular exponentiationresidue number systemsMontgomery multiplicationbase transformation
 Summary | Full Text:PDF

Security Mechanism of Privacy Enhanced Shared File System Suitable for Mobile Access
Atsushi SHIMBO Toshinari TAKAHASHI Masao MUROTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 102-109
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
encryptionversion controlfile systemconcurrent editing
 Summary | Full Text:PDF

A Fast Modular Exponentiation Algorithm
Shin-ichi KAWAMURA Kyoko TAKABAYASHI Atsushi SHIMBO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/08/25
Vol. E74-A  No. 8  pp. 2136-2142
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: 
Keyword: 
 Summary | Full Text:PDF

Performance Analysis of Server-Aided Secret Computation Protocols for the RSA Cryptosystem
Shin-ichi KAWAMURA Atsushi SHIMBO 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1073-1080
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Public-Key Systems
Keyword: 
 Summary | Full Text:PDF