論文

  1. "Bidder Scalable M+1st-Price Auction with Public Verifiability",
    Po-Chu Hsu and Atsuko Miyaji, IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.34-42, 2021.
  2. "A lightweight multi-party authentication in insecure reader-server channel in RFID-based IoT",
    Mamun M. et al. , Peer-to-Peer Networking and Applications. 2020, ,
  3. "Authenticated logarithmic-order supersingular isogeny group key exchange",
    (with Hector B Hougaard and Atsuko Miyaji)
    International Journal of Information Security, vol. 20, Issue 3,1-15, Springer, 2021.
  4. "Efficient algorithm for computing odd-degree isogenies on Montgomery curves",
    (with Kenta Kodera, Chen-Mou Cheng and Atsuko Miyaji)
    Information Security Applications - 20th International Conference (WISA),Lecture Notes in Computer Science 12583, Springer-Verlag, 258-275, 2020.
  5. "Tree-based Ring-LWE Group Key Exchanges with Logarithmic Complexity",
    (with Hector Bjoljahn Hougaard and Atsuko Miyaji)
    The 20th International Conference on Information and CommunicationsSecurity (ICICS), Lecture Notes in Computer Science 12282,Springer-Verlag, 91-106, 2020.
  6. An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks,
    Akifumi Muroi, Shinya Okumura, and Atsuko Miyaji, Lecture Notes in Computer Science, vol.11959, 2020, pp.421-436.
  7. ``String commitment scheme with low output locality",
    (with Hideaki Miyaji, Akinori Kawachi)
    2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 2019, 32-39.
  8. ``Revisited Diffusion Analysis of Salsa and ChaCha",
    (wiht Yusuke Matsuoka)
    2018 International Symposium on Information Theory and Its Applications (ISITA), 2018, 452-456.
  9. ``An Experimental Analysis on Lattice Attacks against Ring-LWE over Decomposition Fields",
    (with Shota Terada, Hideto Nakano, Shinya Okumura)
    018 International Symposium on Information Theory and Its Applications (ISITA), 2018, 306-310.
  10. ``On the computational complexity of ECDLP for elliptic curves in various forms using index calculus",
    (with Chen-Mou Cheng, Kenta Kodera, and Atsuko Miyaji)
    ICISC 2017, ,Lecture Notes in Computer Science, XXX(2018),Springer-Verlag,XX-XX.
  11. ``(p, N)-identifiability: Anonymity Under Practical Adversaries",
    (with Tomoaki Mimoto, Shinsaku Kiyomoto, Katsuya Tanaka)
    The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'17), IEEE, xxx-xxx, 2017.
  12. ``Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2",
    (with Hiroshi Nomaguchi, Chunhua Su)
    The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'17), IEEE, xxx-xxx, 2017.
  13. ``Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags",
    (with Jiageng Chen, Hiroyuki Sato, Chunhua Su )
    2015 IEEE Trustcom/BigDataSE/ISPA, 2015, 17-24
  14. ``Accurate Estimation of the Full Differential Distribution for General Feistel Structures",
    (with Jiageng Chen, Chunhua Su, Je Sen Teh )
    Lecture Notes in Computer Science, 9589, 2016, 108-124
  15. ``Privacy-Preserving Integration of Medical Data A Practical Multiparty Private Set Intersection",
    (with Kazuhisa Nakasho, Shohei Nishida)
    Journal of Medical Systems,Vol. 41 No. 3(2017), Plenum Press, DOI: 10.1007/s10916-016-0657-4., 1-10
  16. ``A simple authentication encryption scheme",
    (with Rashed Mazumder, Chunhua Su)
    Concurrency and Computation: Practice and Experience,2016, Wiley Publishers, DOI: 10.1002/cpe.4058
  17. ``Variable message encryption through blockcipher compression function",
    (with Jiageng Chen, Rashed Mazumder, Chunhua Su,)
    Concurrency and Computation: Practice and Experience, 2016, Wiley Publishers, DOI: 10.1002/cpe.3956
  18. ``A Single Key Scheduling Based Compression Function",
    (with Jiageng Chen, Rashed Mazumder)
    Risks and Security of Internet and Systems (CRiSIS 2015),LNCS vol. 9572, 207-222
  19. ``Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space",
    (with Karin Sumongkayothin, Steven Gordon, Chunhua Su, Komwut Wipusitwarakun,)
    Applications and Techniques in Information Security 2016 (ATIS 2016),Vol. 651 of Springer series Communications in Computer and Information Science,130-141.
  20. ``Refined Construction of RC4 Key Setting in WPA",
    (with Ryoma Ito,)
    IEICE Trans., Fundamentals. Vol. E100-A, No.1(2017), 138-148.
  21. ``A Matrix based ORAM: Design, Implementation and Experimental Analysis",
    (with Steven Gordon, Chunhua Su, and Karin Sumongkayothin,)
    IEICE Trans., Information and Systems. Vol. E99-D, No.8(2016), 2044-2055.
  22. ``A Blockcipher based Authentication Encryption",
    (with Rashed Mazumdea and Chunhua Su)
    The International Cross-Domain Conference and Workshop (CD-ARES 2016),Lecture Notes in Computer Science, 9817(2016), Springer-Verlag,106-123.
  23. ``An Efficient Construction of a Compression Function for Cryptographic Hash",
    (with Rashed Mazumdea and Chunhua Su)
    The International Cross-Domain Conference and Workshop (CD-ARES 2016),Lecture Notes in Computer Science, 9817(2016), Springer-Verlag,124-140.
  24. ``A Simple Authentication Encryption Scheme",
    (with Rashed Mazumder and Chunhua Su)
    Proceedings in IEEE TrustCom'16.
  25. ``Refined Construction of RC4 Key Setting in WPA",
    (with Ryoma Ito)
    IEICE Trans., Fundamentals. Vol. E100-A, No.1(2017), XX-XX.
  26. ``Security and Experimental Performance Analysis of a Matrix ORAM",
    (with Steven Gordon, Chunhua Su, and Karin Sumongkayyothin)
    International Conference on Communication (ICC 2016), IEEE, 1-6.
  27. ``Refined RC4 key correlations of internal states in WPA",
    (with Ryoma Ito)
    IEICE Trans., Fundamentals. Vol. E99-A, No.6(2016), 1132-1144.
  28. ``A New Scheme of Blockcipher Hash",
    (with Mazumder Rashed)
    IEICE Trans., Information and Systems. Vol. E99-D, No.4(2016), 796-804.
  29. ``Improved Differential Characteristic SearchingMethods",
    (with Jiageng Chen, Chunhua Su and Je Sen Teh)
    The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), IEEE, XX-XX.
  30. ``Accurate Estimati on of the Full Differential Distribution for General Feistel Structures",
    (with Jiageng Chen, Chunhua Su and Je Sen Teh)
    The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015), Lecture Notes in Computer Science, XXX (2015), Springer-Verlag, XX-XX.
  31. ``A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256",
    (with Jiageng Chen, Shoichi Hirose, and Hidenori Kuwakado)
    IEICE Trans., Fundamentals. Vol. E99-A, No.XX(2016), XX-XX.
  32. ``A Scalable and Efficient Multiparty Private Set Intersection",
    (with Syouhei Nishida)
    The 9th International Conference on Network and System Security (NSS 2015), Lecture Notes in Computer Science, 9408(2015), Springer-Verlag, 376-385.
  33. ``A New Statistical Approach For Integral Attack",
    (with Jiageng Chen, Chunhua Su and Liang Zhao)
    The 9th International Conference on Network and System Security (NSS 2015), Lecture Notes in Computer Science, 9408(2015), Springer-Verlag, 345-358.
  34. ``M-ORAM: A Matrix ORAM with logN bandwidth cost",
    (with Steven Gordon, Chunhua Su and Karin Sumongkayothin)
    The 16th International Workshop on Information Security Applications (WISA 2015), Lecture Notes in Computer Science, XXX(2015), Springer-Verlag, XX-XX. to appear.
  35. ``Refined Glimpse correlations of RC4",
    (with Ryoma Ito)
    IEICE Trans., Fundamentals. Vol. E99-A, No.1(2016), 3-13.
  36. ``Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree",
    (with Xiaonan Shi and Satoru Tanaka)
    6th International Conference on Algebraic Informatics (CAI 2015), Lecture Notes in Computer Science, 9270(2015), Springer-Verlag, 165-175.
  37. ``Analysis of Path ORAM toward Practical Utilization",
    (with Steven Gordon, Chunhua Su and Karin Sumongkayothin)
    18th International Conference on Network-Based Information Systems(NBiS 2015), XX-XX, 2015.
  38. ``Self-healing wireless sensor networks",
    (with Kazumasa Omote)
    Concurrency and Computation: Practice and Experience, 2015, Article first published online: April 2015, DOI: 10.1002/cpe.3434.
  39. ``How TKIP induces biases of internal states of generic RC4",
    (with Ryoma Ito)
    The 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, 9144(2015), Springer-Verlag, 329-342.
  40. 山本雅基,小林隆志,宮地充子,奥野拓,粂野文洋,櫻井浩子,海上智昭,春 名修介,井上克郎,
    「enPiTにおける教育効果測定の実践と評価」
    コンピュータソフトウェア, Vol. 32, No.1(2015), pp.213-219, Available online: February 2015.
  41. ``New Linear Correlations related to State Information of RC4 PRGA using IV in WPA",
    (with Ryoma Ito)
    The 22nd International Workshop on Fast Software Encryption (FSE 2015), Lecture Notes in Computer Science, Volume9054(2015), Springer-Verlag, 557-576.
  42. ``A new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling",
    (with Mazumder Rashed )
    The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA 2015), IEEE, 564-570.
  43. ``SKENO: Secret Key Encryption with Non-interactive Opening",
    (with Jiageng Chen and Keita Emura)
    Journal of Mathematical Cryptology, 2014, Available online: November 2014, DOI: 10.1515/jmc-2014-0010.
  44. ``A Collision Attack on a Double-Block-Length Compression FunctionInstantiated with Round-Reduced AES-256",
    (with Jiageng Chen, Shoichi Hirose and Hidenori Kuwakado)
    The 17th Annual International Conference on Information and Security Cryptology (ICISC 2014) Lecture Notes in Computer Science, Volume 8949(2015), Springer-Verlag, 271-285.
  45. ``A new (n, n) blockcipher hash function using Feistel Network: Apposite for RFID Security",
    (with Mzumder Rashed)
    International conference on computional Intelligence in data mining (ICCIDM 2014), Smart Innovation, System and Technologies, Volume 33, Springer-Verlag, 519-528.
  46. ``A new (n, n) Blockcipher based Hash Function for Short Messages",
    (with Mzumder Rashed and Tsuyoshi Sawada)
    The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), IEEE, 56-63.
  47. ``A Provable Secure Batch Authentication Scheme for EPCGen2 Tags",
    (with Jiageng Chen and Chunhua Su)
    The 8th International Conference on Provable Security (Provsec 2014), Lecture Notes in Computer Science, 8782(2014), Springer-Verlag, 103-116.
  48. ``New Integrated Long-Term Glimpse of RC4",
    (with Ryoma Ito)
    The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science, Volume 8909(2015), Springer-Verlag, 137-149, 2015.
  49. ``Improving impossible differential cryptanalysis with concrete investigation of key scheduling algorithm and its application to LBlock",
    (with Jiageng Chen, Yuichi Futa, and Chunhua Su)
    The 8th International Conference on Network and System Security(NSS 2014), Lecture Notes in Computer Science, 8792(2014), Springer-Verlag, 184-197.
  50. ``Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security",
    (with Keita Emura, Mohammad Shahriar Rahman, and Kazumasa Omote)
    Wiley Security and Communication Networks
  51. ``Secure VANET Applications with a refined Group Signature",
    (with Mohammad Saiful Islam Mamun)
    The 12th Annual International Conference on Privacy, Security and Trust (PST 2014), 199-206.
  52. ``A multi-purpose Group Signature for Vehicular Network",
    (with Mohammad Saiful Islam Mamun and Hiroaki Takada)
    The 17th International Conference on Network-Based Information Systems (NBiS 2014), Salerno, Italy, 511-516.
  53. ``POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme",
    (with Cheng-Qiang Huang, Long-Hai Li, and Shang-Mei Xu)
    The 14th IEEE International Conference on Computer and Information Technology (CIT 2014), 373-380.
  54. ``An r-hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users",
    (with Keita Emura and Kazumasa Omote)
    Volume 2014 (2014), Article ID 983040.
  55. ``RFID Path Authentication, Revisited",
    (with Mohammad Saiful Islam Mamun)
    The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE, , pp 245-252, Victoria, Canada.
  56. ``A scalable secure RFID ownership transfer protocol for a large supply chain.",
    (with Mohammad Saiful Islam Mamun)
    The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), pp 343-350, Victoria, Canada.
  57. ``Distributed Pseudo-Random Number Generation and its application to Cloud Database",
    (with Jiageng Chen and Chunhua Su)
    The 10th Information Security Practice and Experience Conference(ISPEC 2014), Springer-Verlag, Volume 8434. pp 373-387.
  58. ``An efficient batch verification system for large scale VANET, Intl. J. of Security and Communication Networks SCN, Wiley Publication. Available online: March 2014, DOI:10.1002/sec.980 ",
    (with Jiageng Chen, Mohammad S.I. Mamun)
  59. ``A privacy-preserving efficient RFID authentication protocol from SLPN assumption",
    (with Mohammad S. I. Mamun)
    International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications, Inderscience Publishers, Vol. 10, No. 3, 2015, 234-243.
  60. ``Self-healing Schemes Suitable for Various WSNs",
    (with Kazumasa Omote)
    The 6th International Conference on Internet and Dsitributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, 8223(2013), Springer-Verlag, 92-105.
  61. ``Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock",
    (with Jiageng Chen)
    Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, 8128(2013), Springer-Verlag, 1-15.
  62. ``Private Multiparty Set Intersection Protocol in Rational Model",
    (with Keita Emura and Mohammad Shahriar Rahman)
    The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), IEEE, 431-438.
  63. ``Novel Strategies for Searching RC4 Key Collisions",
    (with Jiageng Chen)
    Computers & Mathematics with Applications, vol 66, Elsevier, 2013., 1-10.
  64. ``A fully-secure RFID authentication protocol from exact LPN assumption",
    (with Mohammad S. I. Mamun)
    The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), 102-109
  65. ``Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack",
    (with Jiageng Chen)
    IEICE Trans., Fundamentals. Vol. E95-A, No.12(2012), 2148-2159.
  66. ``Dynamic Attribute-based Signcryption without Random Oracles",
    (with Keita Emura and Mohammad Shahriar Rahman)
    Inderscience, Vol.2, No.3, 199-211, 2012.
  67. ``A Novel Hybrid IP Traceback Scheme with Packet Counters",
    (with Tomoyuki Karasawa, Masakazu Soshi)
    The 5th International Conference on Internet and Dsitributed Computing Systems (IDCS 2012),Lecture Notes in Computer Science, Springer-Verlag, Vol7646, 71-84, 2012.
  68. ``Constant-Ciphertext-Size Dual Policy Attribute Based Encryption",
    (with Phuong V.X. TRAN)
    The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Springer-Verlag, Vol.7672, 400-413, 2012.
  69. ``How to Enhance the Security on the Least Significant Bit",
    (with Yiren Mo)
    The 11th International Conference on Cryptology and Network Security (CANS 2012), Springer-Verlag, Vol.7712, 263-279, 2012.
  70. ``A Secure and private RFID authentication protocol under SLPN problem",
    (with Mohammad S. I. Mamun)
    The 6th International Conference on Network and System Security (NSS 2012), Springer-Verlag, 1-8.
  71. ``An Optimized Signature Verification System for Vehicle Ad hoc NETwork",
    (with Mohammad S. I. Mamun)
    The 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2012), IEEE, 1-8.
  72. ``Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks",
    (with Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote )
    The 8th International Conference on Information Security Practice and Experience , ISPEC 2012, Lecture Notes in Computer Science, 7232 (2012), Springer-Verlag, 245-258.
  73. ``Privacy-preserving Set Operations in the Presence of Rational Parties",
    (with Mohammad Shahriar Rahman)
    The 5th International Symposium on Mining and Web (MAW 2012), 869-874 .
  74. ``An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs",
    (with Tatsuro Iida, Keita Emura and Kazumasa Omote)
    The 8th International Workshop on Heterogeneous Wireless Networks (HWISE 2012), 552-557.
  75. ``Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes",
    (with Kazumasa Omote )
    IEICE Trans., Information and Systems. vol. E94-D, No.10(2011), pp.1955-1965.
  76. ``Generalized Analysis on Key Collisions of Stream Cipher RC4",
    (with Jiageng Chen )
    IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(11), 2011, pp.2194-2206.
  77. ``Dynamic Attribute-based Signcryption without Random Oracles",
    (with Keita Emura and Mohammad Shahriar Rahman)
    International Journal of Applied Cryptographyy (IJACT 2011), Vol. 2,No. 3(2012), 199-211.
  78. ``A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users",
    (with Keita Emura and Kazumasa Omote)
    The 14th International Conference on Information and Security Cryptology (ICISC 2011), Lecture Notes in Computer Science, 7259(2012), Springer-Verlag, 186-203.
  79. ``POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks",
    (with Tatsuro Iida and Kazumasa Omote)
    The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011), Lecture Notes in Computer Science, 6976 (2011), Springer-Verlag, 253-267.
  80. ``Unconditionally Secure Oblivious Transfer Based on Channel Delays",
    (with Kai-Yuen Cheong)
    The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, 7043 (2011), Springer-Verlag, 112-120.
  81. ``Non-interactive Opening for Ciphertexts Encrypted by Shared Keys",
    (with Jiageng Chen and Keita Emura)
    The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, 7043 (2011), Springer-Verlag, 57-68.
  82. ``Ideal Secret Sharing Schemes with Share Selectability",
    (with Keita Emura, Akito Nomura, Mohammad Shahriar Rahman, and Masakazu Soshi)
    The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, 7043 (2011), Springer-Verlag, 143-157.
  83. ``How to Find Short RC4 Colliding Key Pairs",
    (with Jiageng Chen)
    The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science,7001 (2011), Springer-Verlag, 32-46.
  84. ``Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption",
    (with Keita Emura and Kazumasa Omote)
    The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science, 7001 (2011), Springer-Verlag, 102-118.
  85. ``A Timed-Release Proxy Re-Encryption Scheme",
    (with Keita Emura and Kazumasa Omote)
    IEICE Trans., Fundamentals. vol. E94-A, No.8(2011), 1682-1695.
  86. ``Scalar Multiplication on Weierstrass Elliptic Curves from Co-Z Arithmetic",
    (with Raveen R. Goundar,Marc Joye, Matthieu Rivain, and Alexandre Venelli,)
    Journal of Cryptographic Engineering (2011), Vol 1, Springer-Verlag, 161-176.
  87. ``T-Robust Group Key Exchange Protocol with O(log n) complexity",
    (with Tetsuya Hatano and Takashi Sato)
    The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, 6812 (2011), Springer-Verlag, 189-207.
  88. ``Toward Dynamic Attribute-Based Signcryption (Poster)",
    (with Keita Emura and Mohammad Shahriar Rahman)
    The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, 6812 (2011), Springer-Verlag, 439-443.
  89. ``Privacy-Preserving Data Mining: A Game-theoretic Approach",
    (with Mohammad Shahriar Rahman)
    The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2011), Lecture Notes in Computer Science, 6818 (2011), Springer-Verlag, 186-200.
  90. ``KIMAP: Key-Insulated Mutual Authentication Protocol for RFID",
    (with Mohammad Shahriar Rahman)
    International Journal of Automated Identification Technology (IJAIT), Vol. 3, No.2(2011), 61-74.
  91. ``New Concrete Relation between Trace, Definition Field, and Embedding Degree",
    (with Shoujirou Hirasawa)
    IEICE Trans., Fundamentals. vol. E94-A, No.6(2011), 1368-1374.
  92. ``A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length",
    (with Keita Emura, Akito Nomura, Kazumasa Omote, and Masakazu Soshi)
    International Journal of Applied Cryptography (IJACT), 2010, Vol. 2, No. 1, pp.46-59.
  93. ``Sequential Bitwise Sanitizable Signature Schemes",
    (with Goichiro Hanaoka, Shoichi Hirose, Kunihiko Miyazaki, Bagus Santoso, and Peng Yang)
    IEICE Trans., Fundamentals. vol. E94-A, No.1(2011), 392-404.
  94. ``Generalized RC4 Key Collisions and Hash Collisions",
    (with Jiageng Chen)
    The 7th Conference on Security and Cryptography for Networks, SCN 2010, Lecture Notes in Computer Science, 6280 (2010), Springer-Verlag, 73-87.
  95. ``Co-Z Addition Formulae and Binary Ladders on Elliptic Curves",
    (with Raveen Ravinesh Goundar, Marc Joye)
    The 12th Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, 6225 (2010), Springer-Verlag, 65-79.
  96. ``An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation",
    (with Keita Emura and Kazumasa Omote)
    The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, 6402 (2010), Springer-Verlag, 184-198.
  97. ``A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication",
    (with Keita Emura and Kazumasa Omote)
    The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, 6402 (2010), Springer-Verlag, 200-213.
  98. ``RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks",
    (with Hisashige Ito, and Kazumasa Omote)
    The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010,1-5.
  99. ``An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System",
    (with Keita Emura, and Kazumasa Omote)
    The 7th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2010, Lecture Notes in Computer Science, 6711 (2010), Springer-Verlag,77-92.
  100. ``Hidden Credential Retrieval Without Random Oracles",
    (with Mohammad Shahriar Rahman, and Masakazu Soshi)
    The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, 6513 (2010), Springer-Verlag. 160-174.
  101. ``Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks" ,
    (with Kazumasa Omote)
    The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, 6513 (2010), Springer-Verlag. 135-149.
  102. ``APRAP: Another Privacy Preserving RFID Authentication Protocol",
    (with Mohammad Shahriar Rahman)
    The 6th workshop on Secure Network Protocols, NPSec 2010, IEEE. 13-18.
  103. ``Efficient Privacy-Preserving Data Mining in Malicious Model",,
    (with Keita Emura, and Mohammad Shahriar Rahman)
    The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, 6440 (2010), Springer-Verlag, 429-440 (The Best Paper Award).
  104. ``Privacy-Preserving Data Mining in Presence of Covert Adversaries",
    (with Mohammad Shahriar Rahman)
    The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, 6440 (2010), Springer-Verlag, 370-382.
  105. ``A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model",
    (with Jiageng Chen)
    The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science, LNCS 6584 (2010), Springer-Verlag. 62-76.
  106. ``Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments",
    (with Yvo Desmedt)
    The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science,LNCS 6584 (2010),Springer-Verlag. 236-254.
  107. ``New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences",
    (with M. Sukegawa)
    IEICE Trans., Fundamentals. vol. E93-A, No.6(2010), 1066-1077.
  108. ``A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance",
    (with Jiageng Chen)
    The 6th Information Security Practice and Experience Conference (ISPEC 2010), Lecture Notes in Computer Science, 6047 (2010), Springer-Verlag, 30-44.
  109. ``A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics",
    (with K. Emura and K. Omote)
    IPSJ Trans, vol. 50, No.9(2009), 1968-1983.
  110. ``A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity",
    (with K. Emura and K. Omote)
    IWSEC 2009, 49-63
  111. ``A Selectable k-Times Relaxed Anonymous Authentication Scheme",
    (with K. Emura and K. Omote)
    The 10th International Workshop on Information Security Applications, WISA 2009, Lecture Notes in Computer Science, 5932 (2009), Springer-Verlag, 281-295.
  112. ``New Correlations of RC4 PRGA Using Nonzero-Bit Differences",
    (with M. Sukegawa)
    ACISP 2009, Lecture Notes in Computer Science, 5594 (2009), Springer-Verlag, 134-152.
  113. ``Elliptic curves with a pre-determined embedding degree",
    (with S. Hirasawa)
    The 2009 IEEE International Symposium on Information Theory, ISIT 2009, 2391-2395.
  114. ``A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length",
    (with K. Emura, A. Nomura, K. Omote, and M. Soshi)
    The 5th Information Security Practice and Experience Conference, ISPEC 2009, Lecture Notes in Computer Science, 5451 (2009), Springer-Verlag, 13-23.
  115. ``A Secure RFID Authentication Protocol with Low Communication Cost",
    (with M. S. Rahman and M. Soshi)
    The 3rd International Workshop on Intelligent,Mobile and Internet Services in Ubiquitous Computing, IMIS 2009, IEEE, 559-564.
  116. ``A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier",
    (with K. Emura and K. Omote)
    The First International Workshop on Recent Innovations and Breakthroughs in Cryptography, RIBC 2009, IEEE, 769-773.
  117. ``A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics",
    (with K. Emura and K. Omote)
    The Forth International Conference on Availability, Reliability and Security (AReS 2009), IEEE, 487-492.
  118. ``Simple Certificateless Signature with Smart Cards",
    (with K. Omote and K. Kato)
    International Workshop on Security in Ubiquitous Computing Systems - SECUBIQ'08, IEEE, 2008.
  119. ``Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair",
    (with A. Waseda, T. Takagi, and M. Soshi)
    The 2008 International Symposium on Information Theory and its Applications, Proceedings of ISITA 2008, 2008.
  120. ``Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point",
    (with K. Mizosoe)
    IPSJ Trans, vol. 49, No.9(2008), 2975-2988.
  121. ``Generalized Scalar Multiplication Secure against SPA, DPA, and RPA", IEICE Trans., Fundamentals. vol. E91-A, No.10(2008), 2833-2842.
  122. ``Generalized MMM-algorithm Secure against SPA, DPA, and RPA",
    ICISC 2007, Lecture Notes in Computer Science, 4817(2007), Springer-Verlag, 282-296.
  123. ``Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption" ,
    IPSJ Trans., vol. 48, No.9(2007), 2999-3013.
  124. ``The security of RC6 against asymmetric chi-square test attack" ,
    (with T. Hinoue, and T. Wada)
    IPSJ Trans., vol. 48, No.9(2007), 2966-2975.
  125. ``Consideration for quantum multi-secret sharing" ,
    (with A. Waseda and M. Soshi)
    IPSJ Trans., vol. 48, No.7(2007), 2447-2464.
  126. ``Mobile agent security with efficient oblivious transfer" ,
    (with W. Hasegawa and M. Soshi)
    In International Conference on Security and Cryptography (SECRYPT 2007), 2007, p299-304.
  127. ``Evaluation of the security of RC6 against the x^2-attack" ,
    (with T. Takano)
    IEICE Trans., Fundamentals. vol. E90-A, No.1(2007), 22-28.
  128. ``An IP Traceback Scheme with Variably Probabilistic Packet Marking" ,
    (with T. Terada, M. Soshi)
    The 2006 International Symposium on Information Theory and its Applications, Proceedings of ISITA 2006, 2006
  129. ``Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA" ,
    (with H. Mamiya and H. Morimoto)
    IEICE Trans., Fundamentals. vol. 89-A, No.8(2006), 2207-2215.
  130. ``Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae" ,
    (with H. Mamiya)
    IPSJ Trans, vol. 47, No.8(2006), 2430-2439.
  131. ``Quantum coin flipping protocol using n-dimensional quantum states" ,
    (with A. Waseda and M. Soshi)
    IPSJ Trans., vol. 46, No.8(2005), 1903-1911.
  132. ``Efficient Group Signature Scheme based on Modified Nyberg-Rueppel Signature" ,
    (with K. Umeda)
    IPSJ Trans., vol. 46, No.8(2005), 1889-1902.
  133. ``Java Obfuscation -- Approaches to Construct Tamper-Resistant Object-Oriented Programs" ,
    (with Y. Sakabe and M. Soshi)
    IPSJ Trans, vol. 46, No.8(2005), 2107-2117.
  134. ``Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae",
    (with H. Mamiya)
    ACNS 2005, to appear.
  135. ``n-state quantum coin flipping protocol" ,
    (with A. Waseda and M. Soshi)
    International Conference on Information Technology - ITCC2005, Vol. II(2005), 776-777.
  136. ``On the Success Probability of chi-square attack on RC6",
    (with Y. Takano)
    ACISP 2005, Lecture Notes in Computer Science, 3089(2005), Springer-Verlag, 310-325.
  137. ``Toward Modeling of a Pushback Mechanism",
    (with T. Terada and M. Soshi)
    IPSJ Trans., vol. 45, No.8(2004), 1948-1953, (in Japanese).
  138. ``On anonymity metrics for practical anonymous communication protocols",
    (with S. Kitazawa and M. Soshi)
    IPSJ Trans., vol. 45, No.8(2004), 1887-1897.
  139. ``Efficient Countermeasures against RPA, DPA, and SPA",
    (with H. Mamiya and H. Morimoto)
    CHES 2004, Lecture Notes in Computer Science, 3156(2004), Springer-Verlag, 343-356.
  140. ``Success probability in chi-square attacks",
    (with T. Matsunaka and Y. Takano)
    ACNS 2004, Lecture Notes in Computer Science, 3089(2004), Springer-Verlag, 310-325.
  141. ``A Fully-Functional group signature scheme over only known-order group",
    (with K. Umeda)
    ACNS 2004, Lecture Notes in Computer Science, 3089(2004), Springer-Verlag, 164-179.
  142. "効率的な代理入札システム",
    (with T. Shiotsuki and Y. Tamura),
    電子情報通信学会誌 vol. J87-A, No.6(2004), 835-842.
  143. ``Generic construction of Intrusion-Resilient Public-Key Encryption",
    (with Y. Dodis, M. Franklin, J. Katz, and M. Yung)
    Topics in Cryptology - CT-RSA2004, Lecture Notes in Computer Science, Springer-Verlag, 2964(2004), Springer-Verlag, 81-98.
  144. ``Anonymity-enhanced Pseudonym System",
    (with Y. Tamura)
    Applied Cryptography and Network Security - Proceeding of ACNS 2003
    Lecture Notes in Computer Science, 2846(2003), Springer-Verlag, 33-47.
  145. ``Optimized X2-attack against RC6",
    (with N. Isogai and T. Matsunaka)
    Applied Cryptography and Network Security - Proceeding of ACNS 2003
    Lecture Notes in Computer Science, 2846(2003), Springer-Verlag, 16-32.
  146. ``Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents",
    (with Y. Sakabe and M. Soshi),
    Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS03, to appear.
  147. ``Evaluation of Anonymity of Practical Anonymous Communication Networks",
    (with S. Kitazawa and M. Soshi), Information security and privacy-Proceedings of ACISP 2003,
    Lecture Notes in Computer Science, 2727(2003), Springer-Verlag, 13-26.
  148. ``Statistical Analysis of chi-square attacks",
    (with N. Isogai and M. Nonaka), IEICE Trans., Fundamentals. vol. E86-A, No.5(2003), 1190-1197.
  149. ``Intrusion-Resilient Public-Key Encryption",
    (with Y. Dodis, M. Franklin, J. Katz, and M. Yung), RSA Conference 2003,
    Lecture Notes in Computer Science, 2612(2003).
  150. ``Software obfuscation on a theoretical basis and its implementation",
    (with T. Ogiso, Y. Sakabe, and M. Soushi), IEICE Trans., Fundamentals. vol. E86-A, No.1(2003), 176-186.
  151. ``Cryptanalysis of the reduced-round RC6 without whitening",
    (with M. Nonaka), IEICE Trans., Fundamentals. vol. E86-A, No.1(2003), 19-30
  152. ``Cryptanalysis of the reduced-round RC6",
    (with M. Nonaka), International Conference on Information and Communications Security, ICICS 2002,
    Lecture Notes in Computer Science, 2513(2002), Springer-Verlag."
  153. ``Software tamper resistance based on the difficulty of interprocedural analysis",
    (with T. Ogiso, Y. Sakabe, M. Soshi), International workshop on information security applications - Proceedings of WISA 2002,
    pp 437-452, August 2002.
  154. ``A Second-price Sealed-bid Auction with Public Verifiability", (with K. Omote),
    IPSJ Trans., vol. 43 , No.8(2002), 2405-2413.
  155. ``Provably secure multi-signature scheme with signers' intentions",
    (with K. Kawauchi, H. Minato, M. Tada), IPSJ Trans., vol. 43 , No.8(2002), 2425-2434.
  156. ``Cryptography and Computer Security",(with S. Hangai and W. Wen),
    Review of Radio Science 2000-2002,
    Edited by W. Ross Stone Oxford University Press.
  157. ``A Practical English Auction with Simple Revocation", (with K. Omote),
    IEICE Trans., Fundamentals. vol. E85-A, No.5(2002), 1054-1061.
  158. ``A Fast Signature Scheme without on-line Multiplication", (with T. Okamoto, and M. Tada)
    Financial Cryptography-Proceedings of FC 2002,
    Lecture Notes in Computer Science, 2357(2002), Springer-Verlag.
  159. " ``A Second-price Sealed-bid Auction with the Discriminant of the p-th Root", (with K. Omote),
    Financial Cryptography-Proceedings of FC 2002,
    Lecture Notes in Computer Science, 2357(2002), Springer-Verlag.
  160. ``A multi-signature scheme with signers' intentinos secure against active attacks",
    (with K. Kawauchi, H. Minato, and M. Tada),
    International conference on information security and cryptology Proceedings of ICISC 2001,
    Lecture Notes in Computer Science, 2288(2002), Springer-Verlag, 328-340.
  161. ``Improved Correlation Attack on RC5", (with M. Nonaka, and Y. Takii)
    IEICE Trans., Fundamentals. vol. E85-A, No.1(2002), 44-57.
  162. ``Known Plaintext Correlation Attack Against RC5", (with M. Nonaka and Y. Takii)
    RSA Conference 2002, Lecture Notes in Computer Science, 2271(2002), Springer-Verlag, pp. 131-148.
  163. ``Efficient "on the fly" signature schemes based on integer factoring", (with Okamoto, and M. Tada),
    Indocrypt 2001, Lecture Notes in Computer Science, 2247(2001), Springer-Verlag, pp. 257-286
  164. ``A general model of multisignature schemes with message flexibility, order flexibility, and order verifiability",
    IEICE Trans.,(with S. Mitomi), Fundamentals. Fundamentals. vol. E84-A, No.10(2001), 2488-2499.
  165. ``Proposal of Efficient Signature Schemes based on Factoring", (T. Okamoto, and M. Tada),
    IPSJ Trans, vol. 42, No.8(2001), 2123-2133(in Japanese).
  166. ``An anonymous sealed-bid auction with a feature of entertainment",
    (with K. Omote), IPSJ Trans, vol. 42, No.8(2001), 2049-2056.
  167. ``Efficient and unconditionally secure verifiable threshold changeable scheme",
    (with Ayako Maeda and Mitsuru Tada),
    Information security and privacy-Proceedings of ACISP 2001,
    Lecture Notes in Computer Science, 2119(2001), Springer-Verlag, 403-416.
  168. ``A practical English auction with one-time registration", (with K. Omote),
    Information security and privacy-Proceedings of ACISP 2001,
    Lecture Notes in Computer Science, 2119(2001), Springer-Verlag, 221-234.
  169. ``An Agent-Based Model of Anonymous Communication Protocols",
    (with S. Kitazawa, and M. Soshi),
    Proceedings of the 10th IEEE Internationall Workshops on Enabling Technologies:
    Infrastructure for Collaborative Enterprise (WETICE 2001), June(2001), 177-182.
  170. `` New explicit conditions of elliptic curve traces for FR-reductions",
    (with Masaki Nakabayashi and Shunzo Takano),
    IEICE Trans., Fundamentals. vol. E84-A, No.5(2001), 1234-1243.
  171. ``Characterization of Elliptic Curve Traces under FR-reduction",
    (Masaki Nakabayashi and Shunzo Takano),
    International conference on information security and cryptology-Proceedings
    of ICISC 2000, Lecture Notes in Computer Science, 2015(2001), Springer-Verlag, 90-108.
  172. ``Linkable E-cash Scheme with User's Anonymity", (with A. Koide and M. Tada),
    International Symposium on Information Theory and Its
    Applications-Proceedings of ISITA2000, Vol. 2, 505-508.
  173. ``An anonymous auction protocol with a single non-trusted center using binary trees with the reference number",
    (with K. Omote), Information security workshop-Proceedings of ISW 2000,
    Lecture Notes in Computer Science, 1975(2000), Springer-Verlag, 108-120.
  174. ``Anonymous Communication with Elementary Cyclic Routes",
    (with S. Kitazawa, S. Nagano, and M. Soshi),
    IPSJ Trans, vol. 41, No.8(2000), 2148-2160, (in Japanese).
  175. ``The Secure Renewal of Cryptosystems in the Open Network Architecture",
    (with M. Soshi and T.Yamada),
    IPSJ Trans, vol. 41, No.8(2000), 2102-2109, (in Japanese).
  176. ``Efficient Construction of Elliptic Curves over Optimal Extension Field",
    (with Y. Futa), IPSJ Trans., vol. 41, No.8(2000), 2092-2101.
  177. ``A multisignature scheme with message flexibility, order flexibility and order verifiability",
    (with S. Mitomi), Information security and privacy-Proceedings of ACISP 2000,
    Lecture Notes in Computer Science, 1841(2000), Springer-Verlag, 298-312.
  178. ``Efficient elliptic curve exponentiaion using mixed coordinates",
    Advances in Cryptology-Proceedings of ASIACRYPT'98,
    Lecture Notes in Computer Science, 1514(1998), Springer-Verlag, 51-65.
  179. ``Efficient elliptic curve exponentiaion",
    Advances in Cryptology-Proceedings of ICICS'97,
    Lecture Notes in Computer Science, 1334(1997), Springer-Verlag, 282-290.
  180. ``Another countermeasure to forgeries over message recovery signature"
    IEICE Trans., Fundamentals. vol. E80-A, No.11(1997), 2192-2200.
  181. ``A message recovery signature scheme equivalent to DSA over elliptic curves",
    Advances in Cryptology-Proceedings of ASIACRYPT'96,
    Lecture Notes in Computer Science, 1163(1996), Springer-Verlag, 1-14.
  182. ``On secure and fast elliptic curve cryptosystems over Fp",
    IEICE Trans., Fundamentals. vol. E77-A, No.4(1994), 630-635.
  183. ``Elliptic curves suitable for cryptosystems",
    IEICE Trans., Fundamentals. vol. E77-A, No.1(1994), 98-105.
  184. 「数論アルゴリズムとその応用」,
    情報処理学会,1993.
  185. ``Isogenous Elliptic Curve Cryptosystems",
    Finite Field Conference Abstracts, Aug.(1993), 35-36.
  186. ``Elliptic curve cryptosystems immune to any reduction into the discrete logarithm problem",
    IEICE Trans., Fundamentals. vol. E76-A, No.1(1993), 50-54.
  187. ``Elliptic curves over Fp suitable for cryptosystems",
    Advances in Cryptology-Proceedings of AUSCRYPT'92,
    Lecture Notes in Computer Science, 718(1993), Springer-Verlag, 479-491.
  188. ``On ordinary elliptic curve cryptosystems",
    Advances in Cryptology-Proceedings of ASIACRYPT'91,
    Lecture Notes in Computer Science, 739(1993), Springer-Verlag, 460-469.
Top