Yutaka MIYAKE


Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation
Yuto NAKANO Shinsaku KIYOMOTO Yutaka MIYAKE Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/10/01
Vol. E97-D  No. 10  pp. 2576-2585
Type of Manuscript:  INVITED PAPER (Special Section on Frontiers of Internet of Things)
Category: 
Keyword: 
access pattern protectionoblivious RAMprivate information retrieval
 Summary | Full Text:PDF

Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
Takafumi HIBIKI Naofumi HOMMA Yuto NAKANO Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Yutaka MIYAKE Takafumi AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 157-166
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
side-channel attacksKCipher-2correlation power analysisrandom masking
 Summary | Full Text:PDF

Fast Implementation of KCipher-2 for Software and Hardware
Yuto NAKANO Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Tsukasa ISHIGURO Yutaka MIYAKE Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/01/01
Vol. E97-D  No. 1  pp. 43-52
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
stream cipherKCipher-2software implementationhardware implementation
 Summary | Full Text:PDF

Software Protection Combined with Tamper-Proof Device
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Yutaka MIYAKE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 213-222
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Software Protection
Keyword: 
software protectioncopy protectiontamper-proof devicequantitative security analysis
 Summary | Full Text:PDF

FOREWORD
Yutaka MIYAKE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2067-2068
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF

Service Independent Access Control Architecture for User Generated Content (UGC) and Its Implementation
Akira YAMADA Ayumu KUBOTA Yutaka MIYAKE Kazuo HASHIMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/10/01
Vol. E92-D  No. 10  pp. 1961-1970
Type of Manuscript:  Special Section PAPER (Special Section on New Technologies and their Applications of the Internet)
Category: DRM and Security
Keyword: 
WebUser Generated Content (UGC)blog and cryptographic access control
 Summary | Full Text:PDF

Secure Host Name Resolution Infrastructure for Overlay Networks
Ayumu KUBOTA Yutaka MIYAKE Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/09/01
Vol. E89-B  No. 9  pp. 2434-2439
Type of Manuscript:  Special Section PAPER (Special Section on Networking Technologies for Overlay Networks)
Category: 
Keyword: 
routing overlaysdomain namescryptographically generated identifiersPKI
 Summary | Full Text:PDF

Block Demodulation for Trellis Coded Modulation
Yutaka MIYAKE Masafumi HAGIWARA Masao NAKAGAWA 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/10/25
Vol. E73-E  No. 10  pp. 1674-1680
Type of Manuscript:  Special Section PAPER (Special Issue on Communication Theory and Its Applications)
Category: Modulation and Demodulation
Keyword: 
 Summary | Full Text:PDF