Top | 研究室紹介 | メンバー紹介 | 研究室業績 | 学会関連 | 関連情報 | イベント | English


    教授 宮地 充子(1998-)

    TOP 
    論文  解説論文・招待講演  著書  研究内容  受賞暦 
    国際・国内貢献  国際会議プログラム委員  共著者リスト  楕円暗号の初期研究  講義資料 

    Selected publications

    1. ``Security and Experimental Performance Analysis of a Matrix ORAM",
      (with Steven Gordon, Chunhua Su and Karin Sumongkaoythin)
      IEEE International Conference on Communications (IEEE ICC 2016), IEEE, XX-XX.

    2. ``Refined RC4 key correlations of internal states in WPA",
      (with Ryoma Ito)
      IEICE Trans., Fundamentals. Vol. E99-A, No.XX(2016), XX-XX.

    3. ``Improved Differential Characteristic Searching Methods",
      (with Jiageng Chen, Chunhua Su and Je Sen Teh)
      The 2nd IEEE International Conference on Cyber Security and Cloud Computing (CSCloud 2015), IEEE, XX-XX.

    4. ``Accurate Estimati on of the Full Differential Distribution for General Feistel Structures",
      (with Jiageng Chen, Chunhua Su and Je Sen Teh)
      The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015), Lecture Notes in Computer Science, XXX (2015), Springer-Verlag, XX-XX.

    5. ``A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256",
      (with Jiageng Chen, Shoichi Hirose, and Hidenori Kuwakado)
      IEICE Trans., Fundamentals. Vol. E99-A, No.1(2016), 14-21.

    6. ``A Scalable and Efficient Multiparty Private Set Intersection",
      (with Syouhei Nishida)
      The 9th International Conference on Network and System Security (NSS 2015), Lecture Notes in Computer Science, 9408(2015), Springer-Verlag, 376-385.

    7. ``A New Statistical Approach For Integral Attack",
      (with Jiageng Chen, Chunhua Su and Liang Zhao)
      The 9th International Conference on Network and System Security (NSS 2015), Lecture Notes in Computer Science, 9408(2015), Springer-Verlag, 345-358.

    8. ``M-ORAM: A Matrix ORAM with logN bandwidth cost",
      (with Steven Gordon, Chunhua Su and Karin Sumongkayothin)
      The 16th International Workshop on Information Security Applications (WISA 2015), Lecture Notes in Computer Science, XXX(2015), Springer-Verlag, XX-XX. to appear.

    9. ``Refined Glimpse correlations of RC4",
      (with Ryoma Ito)
      IEICE Trans., Fundamentals. Vol. E99-A, No.1(2016), 3-13.

    10. ``Extended Explicit Relations Between Trace, Definition Field, and Embedding Degree",
      (with Xiaonan Shi and Satoru Tanaka)
      6th International Conference on Algebraic Informatics (CAI 2015), Lecture Notes in Computer Science, 9270(2015), Springer-Verlag, 165-175.

    11. ``Analysis of Path ORAM toward Practical Utilization",
      (with Steven Gordon, Chunhua Su and Karin Sumongkayothin)
      18th International Conference on Network-Based Information Systems(NBiS 2015), XX-XX, 2015.

    12. ``Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags",
      (with Jiageng Chen, Hiroyuki Sato and Chunhua Su)
      The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'15), IEEE, XX-XX, 2015.

    13. ``Self-healing wireless sensor networks",
      (with Kazumasa Omote)
      Concurrency and Computation: Practice and Experience, 2015, Article first published online: April 2015, DOI: 10.1002/cpe.3434.

    14. ``How TKIP induces biases of internal states of generic RC4",
      (with Ryoma Ito)
      The 20th Australasian Conference on Information Security and Privacy (ACISP 2015), Lecture Notes in Computer Science, 9144(2015), Springer-Verlag, 329-342.

    15. 山本雅基,小林隆志,宮地充子,奥野拓,粂野文洋,櫻井浩子,海上智昭,春 名修介,井上克郎,
      「enPiTにおける教育効果測定の実践と評価」
      コンピュータソフトウェア, Vol. 32, No.1(2015), pp.213-219, Available online: February 2015.

    16. ``New Linear Correlations related to State Information of RC4 PRGA using IV in WPA",
      (with Ryoma Ito)
      The 22nd International Workshop on Fast Software Encryption (FSE 2015), Lecture Notes in Computer Science, Volume9054(2015), Springer-Verlag, 557-576.

    17. ``A new (n, 2n) Double Block Length Hash Function based on Single Key Scheduling",
      (with Mazumder Rashed )
      The 29th IEEE International Conference on Advanced Information Networking and Applications (AINA 2015), IEEE, 564-570.

    18. ``SKENO: Secret Key Encryption with Non-interactive Opening",
      (with Jiageng Chen and Keita Emura)
      Journal of Mathematical Cryptology, 2014, Available online: November 2014, DOI: 10.1515/jmc-2014-0010.

    19. ``A Collision Attack on a Double-Block-Length Compression FunctionInstantiated with Round-Reduced AES-256",
      (with Jiageng Chen, Shoichi Hirose and Hidenori Kuwakado)
      The 17th Annual International Conference on Information and Security Cryptology (ICISC 2014) Lecture Notes in Computer Science, Volume 8949(2015), Springer-Verlag, 271-285.

    20. ``A new (n, n) blockcipher hash function using Feistel Network: Apposite for RFID Security",
      (with Mzumder Rashed)
      International conference on computional Intelligence in data mining (ICCIDM 2014), Smart Innovation, System and Technologies, Volume 33, Springer-Verlag, 519-528.

    21. ``A new (n, n) Blockcipher based Hash Function for Short Messages",
      (with Mzumder Rashed and Tsuyoshi Sawada)
      The 9th Asia Joint Conference on Information Security (AsiaJCIS 2014), IEEE, 56-63.

    22. ``A Provable Secure Batch Authentication Scheme for EPCGen2 Tags",
      (with Jiageng Chen and Chunhua Su)
      The 8th International Conference on Provable Security (Provsec 2014), Lecture Notes in Computer Science, 8782(2014), Springer-Verlag, 103-116.

    23. ``New Integrated Long-Term Glimpse of RC4",
      (with Ryoma Ito)
      The 15th International Workshop on Information Security Applications (WISA 2014), Lecture Notes in Computer Science, Volume 8909(2015), Springer-Verlag, 137-149, 2015.

    24. ``Improving impossible differential cryptanalysis with concrete investigation of key scheduling algorithm and its application to LBlock",
      (with Jiageng Chen, Yuichi Futa, and Chunhua Su)
      The 8th International Conference on Network and System Security(NSS 2014), Lecture Notes in Computer Science, 8792(2014), Springer-Verlag, 184-197.

    25. ``Generic Constructions of Secure-Channel Free Searchable Encryption with Adaptive Security",
      (with Keita Emura, Mohammad Shahriar Rahman, and Kazumasa Omote)
      Wiley Security and Communication Networks

    26. ``Secure VANET Applications with a refined Group Signature",
      (with Mohammad Saiful Islam Mamun)
      The 12th Annual International Conference on Privacy, Security and Trust (PST 2014), 199-206.

    27. ``A multi-purpose Group Signature for Vehicular Network",
      (with Mohammad Saiful Islam Mamun and Hiroaki Takada)
      The 17th International Conference on Network-Based Information Systems (NBiS 2014), Salerno, Italy, 511-516.

    28. ``POND: A Novel Protocol for Network Coding based on Hybrid Cryptographic Scheme",
      (with Cheng-Qiang Huang, Long-Hai Li, and Shang-Mei Xu)
      The 14th IEEE International Conference on Computer and Information Technology (CIT 2014), 373-380.

    29. ``An r-hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users",
      (with Keita Emura and Kazumasa Omote)
      Volume 2014 (2014), Article ID 983040.

    30. ``RFID Path Authentication, Revisited",
      (with Mohammad Saiful Islam Mamun)
      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA 2014), IEEE, , pp 245-252, Victoria, Canada.

    31. ``A scalable secure RFID ownership transfer protocol for a large supply chain.",
      (with Mohammad Saiful Islam Mamun)
      The 28th IEEE International Conference on Advanced Information Networking and Applications (AINA-2014), pp 343-350, Victoria, Canada.

    32. ``Distributed Pseudo-Random Number Generation and its application to Cloud Database",
      (with Jiageng Chen and Chunhua Su)
      The 10th Information Security Practice and Experience Conference(ISPEC 2014), Springer-Verlag, Volume 8434. pp 373-387.

    33. ``An efficient batch verification system for large scale VANET, Intl. J. of Security and Communication Networks SCN, Wiley Publication. Available online: March 2014, DOI:10.1002/sec.980 ",
      (with Jiageng Chen, Mohammad S.I. Mamun)


    34. ``A privacy-preserving efficient RFID authentication protocol from SLPN assumption",
      (with Mohammad S. I. Mamun)
      International Journal of Computational Science and Engineering (IJCSE), Special Issue on Converged Networks, Technologies and Applications, Inderscience Publishers, Vol. 10, No. 3, 2015, 234-243.

    35. ``Self-healing Schemes Suitable for Various WSNs",
      (with Kazumasa Omote)
      The 6th International Conference on Internet and Dsitributed Computing Systems (IDCS 2013), Lecture Notes in Computer Science, 8223(2013), Springer-Verlag, 92-105.

    36. ``Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock",
      (with Jiageng Chen)
      Security Engineering and Intelligence Informatics, CD-ARES 2013 Workshops, Lecture Notes in Computer Science, 8128(2013), Springer-Verlag, 1-15.

    37. ``Private Multiparty Set Intersection Protocol in Rational Model",
      (with Keita Emura and Mohammad Shahriar Rahman)
      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), IEEE, 431-438.

    38. ``Novel Strategies for Searching RC4 Key Collisions",
      (with Jiageng Chen)
      Computers & Mathematics with Applications, vol 66, Elsevier, 2013., 1-10.

    39. ``A fully-secure RFID authentication protocol from exact LPN assumption",
      (with Mohammad S. I. Mamun)
      The 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom'13), 102-109

    40. ``Cryptanalysis of Stream Ciphers From a New Aspect: How to Apply Key Collisions to Key Recovery Attack",
      (with Jiageng Chen)
      IEICE Trans., Fundamentals. Vol. E95-A, No.12(2012), 2148-2159.

    41. ``Dynamic Attribute-based Signcryption without Random Oracles",
      (with Keita Emura and Mohammad Shahriar Rahman)
      Inderscience, Vol.2, No.3, 199-211, 2012.

    42. ``A Novel Hybrid IP Traceback Scheme with Packet Counters",
      (with Tomoyuki Karasawa, Masakazu Soshi)
      The 5th International Conference on Internet and Dsitributed Computing Systems (IDCS 2012),Lecture Notes in Computer Science, Springer-Verlag, Vol7646, 71-84, 2012.

    43. ``Constant-Ciphertext-Size Dual Policy Attribute Based Encryption",
      (with Phuong V.X. TRAN)
      The 4th International Symposium on Cyberspace Safety and Security (CSS 2012), Springer-Verlag, Vol.7672, 400-413, 2012.

    44. ``How to Enhance the Security on the Least Significant Bit",
      (with Yiren Mo)
      The 11th International Conference on Cryptology and Network Security (CANS 2012), Springer-Verlag, Vol.7712, 263-279, 2012.

    45. ``A Secure and private RFID authentication protocol under SLPN problem",
      (with Mohammad S. I. Mamun)
      The 6th International Conference on Network and System Security (NSS 2012), Springer-Verlag, 1-8.

    46. ``An Optimized Signature Verification System for Vehicle Ad hoc NETwork",
      (with Mohammad S. I. Mamun)
      The 8th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM2012), IEEE, 1-8.

    47. ``Lightweight Integrity for XOR Network Coding in Wireless Sensor Networks",
      (with Kazuya Izawa, Atsuko Miyaji, and Kazumasa Omote )
      The 8th International Conference on Information Security Practice and Experience , ISPEC 2012, Lecture Notes in Computer Science, 7232 (2012), Springer-Verlag, 245-258.

    48. ``Privacy-preserving Set Operations in the Presence of Rational Parties",
      (with Mohammad Shahriar Rahman)
      The 5th International Symposium on Mining and Web (MAW 2012), 869-874 .

    49. ``An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs",
      (with Tatsuro Iida, Keita Emura and Kazumasa Omote)
      The 8th International Workshop on Heterogeneous Wireless Networks (HWISE 2012), 552-557.

    50. ``Efficient and Secure Aggregation of Sensor Data against Multiple Corrupted Nodes",
      (with Kazumasa Omote )
      IEICE Trans., Information and Systems. vol. E94-D, No.10(2011), pp.1955-1965.

    51. ``Generalized Analysis on Key Collisions of Stream Cipher RC4",
      (with Jiageng Chen )
      IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, E94-A(11), 2011, pp.2194-2206.

    52. ``Dynamic Attribute-based Signcryption without Random Oracles",
      (with Keita Emura and Mohammad Shahriar Rahman)
      International Journal of Applied Cryptographyy (IJACT 2011), Vol. 2,No. 3(2012), 199-211.

    53. ``A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users",
      (with Keita Emura and Kazumasa Omote)
      The 14th International Conference on Information and Security Cryptology (ICISC 2011), Lecture Notes in Computer Science, 7259(2012), Springer-Verlag, 186-203.

    54. ``POLISH: Proactive co-Operative LInk Self-Healing for Wireless Sensor Networks",
      (with Tatsuro Iida and Kazumasa Omote)
      The 13th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2011), Lecture Notes in Computer Science, 6976 (2011), Springer-Verlag, 253-267.

    55. ``Unconditionally Secure Oblivious Transfer Based on Channel Delays",
      (with Kai-Yuen Cheong)
      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, 7043 (2011), Springer-Verlag, 112-120.

    56. ``Non-interactive Opening for Ciphertexts Encrypted by Shared Keys",
      (with Jiageng Chen and Keita Emura)
      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, 7043 (2011), Springer-Verlag, 57-68.

    57. ``Ideal Secret Sharing Schemes with Share Selectability",
      (with Keita Emura, Akito Nomura, Mohammad Shahriar Rahman, and Masakazu Soshi)
      The 13th International Conference on Information and Communications Security, ICICS 2011, Lecture Notes in Computer Science, 7043 (2011), Springer-Verlag, 143-157.

    58. ``How to Find Short RC4 Colliding Key Pairs",
      (with Jiageng Chen)
      The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science,7001 (2011), Springer-Verlag, 32-46.

    59. ``Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption",
      (with Keita Emura and Kazumasa Omote)
      The 14th Information Security Conference, ISC 2011, Lecture Notes in Computer Science, 7001 (2011), Springer-Verlag, 102-118.

    60. ``A Timed-Release Proxy Re-Encryption Scheme",
      (with Keita Emura and Kazumasa Omote)
      IEICE Trans., Fundamentals. vol. E94-A, No.8(2011), 1682-1695.

    61. ``Scalar Multiplication on Weierstrass Elliptic Curves from Co-Z Arithmetic",
      (with Raveen R. Goundar,Marc Joye, Matthieu Rivain, and Alexandre Venelli,)
      Journal of Cryptographic Engineering (2011), Vol 1, Springer-Verlag, 161-176.

    62. ``T-Robust Group Key Exchange Protocol with O(log n) complexity",
      (with Tetsuya Hatano and Takashi Sato)
      The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, 6812 (2011), Springer-Verlag, 189-207.

    63. ``Toward Dynamic Attribute-Based Signcryption (Poster)",
      (with Keita Emura and Mohammad Shahriar Rahman)
      The 16th Australasian Conference on Information Security and Privacy, ACISP 2011, Lecture Notes in Computer Science, 6812 (2011), Springer-Verlag, 439-443.

    64. ``Privacy-Preserving Data Mining: A Game-theoretic Approach",
      (with Mohammad Shahriar Rahman)
      The 25th IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSEC 2011), Lecture Notes in Computer Science, 6818 (2011), Springer-Verlag, 186-200.

    65. ``KIMAP: Key-Insulated Mutual Authentication Protocol for RFID",
      (with Mohammad Shahriar Rahman)
      International Journal of Automated Identification Technology (IJAIT), Vol. 3, No.2(2011), 61-74.

    66. ``New Concrete Relation between Trace, Definition Field, and Embedding Degree",
      (with Shoujirou Hirasawa)
      IEICE Trans., Fundamentals. vol. E94-A, No.6(2011), 1368-1374.

    67. ``A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length",
      (with Keita Emura, Akito Nomura, Kazumasa Omote, and Masakazu Soshi)
      International Journal of Applied Cryptography (IJACT), 2010, Vol. 2, No. 1, pp.46-59.

    68. ``Sequential Bitwise Sanitizable Signature Schemes",
      (with Goichiro Hanaoka, Shoichi Hirose, Kunihiko Miyazaki, Bagus Santoso, and Peng Yang)
      IEICE Trans., Fundamentals. vol. E94-A, No.1(2011), 392-404.

    69. ``Generalized RC4 Key Collisions and Hash Collisions",
      (with Jiageng Chen)
      The 7th Conference on Security and Cryptography for Networks, SCN 2010, Lecture Notes in Computer Science, 6280 (2010), Springer-Verlag, 73-87.

    70. ``Co-Z Addition Formulae and Binary Ladders on Elliptic Curves",
      (with Raveen Ravinesh Goundar, Marc Joye)
      The 12th Workshop on Cryptographic Hardware and Embedded Systems, CHES 2010, Lecture Notes in Computer Science, 6225 (2010), Springer-Verlag, 65-79.

    71. ``An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation",
      (with Keita Emura and Kazumasa Omote)
      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, 6402 (2010), Springer-Verlag, 184-198.

    72. ``A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication",
      (with Keita Emura and Kazumasa Omote)
      The 4th International Conference on Provable Security, ProvSec 2010, Lecture Notes in Computer Science, 6402 (2010), Springer-Verlag, 200-213.

    73. ``RPoK: A Strongly Resilient Polynomial-based Random Key Pre-distribution Scheme for Multiphase Wireless Sensor Networks",
      (with Hisashige Ito, and Kazumasa Omote)
      The 8th Grobal Communications Conference Exhibition & Industry Forum, IEEE GLOBECOM 2010,1-5.

    74. ``An Identity-based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-list System",
      (with Keita Emura, and Kazumasa Omote)
      The 7th European Workshop on Public Key Services, Applications and Infrastructures, EuroPKI 2010, Lecture Notes in Computer Science, 6711 (2010), Springer-Verlag,77-92.

    75. ``Hidden Credential Retrieval Without Random Oracles",
      (with Mohammad Shahriar Rahman, and Masakazu Soshi)
      The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, 6513 (2010), Springer-Verlag. 160-174.

    76. ``Efficient and Optimally Secure In-Network Aggregation in Wireless Sensor Networks" ,
      (with Kazumasa Omote)
      The 11th International Workshop on Information Security Applications, WISA 2010, Lecture Notes in Computer Science, 6513 (2010), Springer-Verlag. 135-149.

    77. ``APRAP: Another Privacy Preserving RFID Authentication Protocol",
      (with Mohammad Shahriar Rahman)
      The 6th workshop on Secure Network Protocols, NPSec 2010, IEEE. 13-18.

    78. ``Efficient Privacy-Preserving Data Mining in Malicious Model",,
      (with Keita Emura, and Mohammad Shahriar Rahman)
      The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, 6440 (2010), Springer-Verlag, 429-440 (The Best Paper Award).

    79. ``Privacy-Preserving Data Mining in Presence of Covert Adversaries",
      (with Mohammad Shahriar Rahman)
      The 6th International Conference on Advanced Data Mining and Applications, ADMA 2010, Lecture Notes in Computer Science, 6440 (2010), Springer-Verlag, 370-382.

    80. ``A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model",
      (with Jiageng Chen)
      The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science, LNCS 6584 (2010), Springer-Verlag. 62-76.

    81. ``Redesigning Group Key Exchange Protocol based on Bilinear Pairing Suitable for Various Environments",
      (with Yvo Desmedt)
      The 6th China International Conference on Information Security and Cryptology, Inscrypt 2010, Lecture Notes in Computer Science,LNCS 6584 (2010),Springer-Verlag. 236-254.

    82. ``New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences",
      (with M. Sukegawa)
      IEICE Trans., Fundamentals. vol. E93-A, No.6(2010), 1066-1077.

    83. ``A New Class of RC4 Colliding Key Pairs with Greater Hamming Distance",
      (with Jiageng Chen)
      The 6th Information Security Practice and Experience Conference (ISPEC 2010), Lecture Notes in Computer Science, 6047 (2010), Springer-Verlag, 30-44.

    84. ``A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics",
      (with K. Emura and K. Omote)
      IPSJ Trans, vol. 50, No.9(2009), 1968-1983.

    85. ``A Ciphertext-Policy Attribute-Based Encryption Scheme with Strong Recipient Anonymity",
      (with K. Emura and K. Omote)
      IWSEC 2009, 49-63

    86. ``A Selectable k-Times Relaxed Anonymous Authentication Scheme",
      (with K. Emura and K. Omote)
      The 10th International Workshop on Information Security Applications, WISA 2009, Lecture Notes in Computer Science, 5932 (2009), Springer-Verlag, 281-295.

    87. ``New Correlations of RC4 PRGA Using Nonzero-Bit Differences",
      (with M. Sukegawa)
      ACISP 2009, Lecture Notes in Computer Science, 5594 (2009), Springer-Verlag, 134-152.

    88. ``Elliptic curves with a pre-determined embedding degree",
      (with S. Hirasawa)
      The 2009 IEEE International Symposium on Information Theory, ISIT 2009, 2391-2395.

    89. ``A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length",
      (with K. Emura, A. Nomura, K. Omote, and M. Soshi)
      The 5th Information Security Practice and Experience Conference, ISPEC 2009, Lecture Notes in Computer Science, 5451 (2009), Springer-Verlag, 13-23.

    90. ``A Secure RFID Authentication Protocol with Low Communication Cost",
      (with M. S. Rahman and M. Soshi)
      The 3rd International Workshop on Intelligent,Mobile and Internet Services in Ubiquitous Computing, IMIS 2009, IEEE, 559-564.

    91. ``A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier",
      (with K. Emura and K. Omote)
      The First International Workshop on Recent Innovations and Breakthroughs in Cryptography, RIBC 2009, IEEE, 769-773.

    92. ``A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics",
      (with K. Emura and K. Omote)
      The Forth International Conference on Availability, Reliability and Security (AReS 2009), IEEE, 487-492.

    93. ``Simple Certificateless Signature with Smart Cards",
      (with K. Omote and K. Kato)
      International Workshop on Security in Ubiquitous Computing Systems - SECUBIQ'08, IEEE, 2008.

    94. ``Quantum Secret Sharing between Multiparty and Multiparty against the Attack with Single Photons or EPR-pair",
      (with A. Waseda, T. Takagi, and M. Soshi)
      The 2008 International Symposium on Information Theory and its Applications, Proceedings of ISITA 2008, 2008.

    95. ``Revisited (Hyper)-Elliptic Curve Scalar Multiplication with a Fixed Point",
      (with K. Mizosoe)
      IPSJ Trans, vol. 49, No.9(2008), 2975-2988.

    96. ``Generalized Scalar Multiplication Secure against SPA, DPA, and RPA", IEICE Trans., Fundamentals. vol. E91-A, No.10(2008), 2833-2842.

    97. ``Generalized MMM-algorithm Secure against SPA, DPA, and RPA",
      ICISC 2007, Lecture Notes in Computer Science, 4817(2007), Springer-Verlag, 282-296.

    98. ``Ancestor Excludable Hierarchical ID-based Encryption and Its Application to Broadcast Encryption" ,
      IPSJ Trans., vol. 48, No.9(2007), 2999-3013.

    99. ``The security of RC6 against asymmetric chi-square test attack" ,
      (with T. Hinoue, and T. Wada)
      IPSJ Trans., vol. 48, No.9(2007), 2966-2975.

    100. ``Consideration for quantum multi-secret sharing" ,
      (with A. Waseda and M. Soshi)
      IPSJ Trans., vol. 48, No.7(2007), 2447-2464.

    101. ``Mobile agent security with efficient oblivious transfer" ,
      (with W. Hasegawa and M. Soshi)
      In International Conference on Security and Cryptography (SECRYPT 2007), 2007, p299-304.

    102. ``Evaluation of the security of RC6 against the x^2-attack" ,
      (with T. Takano)
      IEICE Trans., Fundamentals. vol. E90-A, No.1(2007), 22-28.

    103. ``An IP Traceback Scheme with Variably Probabilistic Packet Marking" ,
      (with T. Terada, M. Soshi)
      The 2006 International Symposium on Information Theory and its Applications, Proceedings of ISITA 2006, 2006

    104. ``Secure elliptic curve exponentiation against RPA, ZRA, DPA, and SPA" ,
      (with H. Mamiya and H. Morimoto)
      IEICE Trans., Fundamentals. vol. 89-A, No.8(2006), 2207-2215.

    105. ``Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae" ,
      (with H. Mamiya)
      IPSJ Trans, vol. 47, No.8(2006), 2430-2439.

    106. ``Quantum coin flipping protocol using n-dimensional quantum states" ,
      (with A. Waseda and M. Soshi)
      IPSJ Trans., vol. 46, No.8(2005), 1903-1911.

    107. ``Efficient Group Signature Scheme based on Modified Nyberg-Rueppel Signature" ,
      (with K. Umeda)
      IPSJ Trans., vol. 46, No.8(2005), 1889-1902.

    108. ``Java Obfuscation -- Approaches to Construct Tamper-Resistant Object-Oriented Programs" ,
      (with Y. Sakabe and M. Soshi)
      IPSJ Trans, vol. 46, No.8(2005), 2107-2117.

    109. ``Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae",
      (with H. Mamiya)
      ACNS 2005, to appear.

    110. ``n-state quantum coin flipping protocol" ,
      (with A. Waseda and M. Soshi)
      International Conference on Information Technology - ITCC2005, Vol. II(2005), 776-777.

    111. ``On the Success Probability of chi-square attack on RC6",
      (with Y. Takano)
      ACISP 2005, Lecture Notes in Computer Science, 3089(2005), Springer-Verlag, 310-325.

    112. ``Toward Modeling of a Pushback Mechanism",
      (with T. Terada and M. Soshi)
      IPSJ Trans., vol. 45, No.8(2004), 1948-1953, (in Japanese).

    113. ``On anonymity metrics for practical anonymous communication protocols",
      (with S. Kitazawa and M. Soshi)
      IPSJ Trans., vol. 45, No.8(2004), 1887-1897.

    114. ``Efficient Countermeasures against RPA, DPA, and SPA",
      (with H. Mamiya and H. Morimoto)
      CHES 2004, Lecture Notes in Computer Science, 3156(2004), Springer-Verlag, 343-356.

    115. ``Success probability in chi-square attacks",
      (with T. Matsunaka and Y. Takano)
      ACNS 2004, Lecture Notes in Computer Science, 3089(2004), Springer-Verlag, 310-325.

    116. ``A Fully-Functional group signature scheme over only known-order group",
      (with K. Umeda)
      ACNS 2004, Lecture Notes in Computer Science, 3089(2004), Springer-Verlag, 164-179.

    117. "効率的な代理入札システム",
      (with T. Shiotsuki and Y. Tamura),
      電子情報通信学会誌 vol. J87-A, No.6(2004), 835-842.

    118. ``Generic construction of Intrusion-Resilient Public-Key Encryption",
      (with Y. Dodis, M. Franklin, J. Katz, and M. Yung)
      Topics in Cryptology - CT-RSA2004, Lecture Notes in Computer Science, Springer-Verlag, 2964(2004), Springer-Verlag, 81-98.

    119. ``Anonymity-enhanced Pseudonym System",
      (with Y. Tamura)
      Applied Cryptography and Network Security - Proceeding of ACNS 2003
      Lecture Notes in Computer Science, 2846(2003), Springer-Verlag, 33-47.

    120. ``Optimized X2-attack against RC6",
      (with N. Isogai and T. Matsunaka)
      Applied Cryptography and Network Security - Proceeding of ACNS 2003
      Lecture Notes in Computer Science, 2846(2003), Springer-Verlag, 16-32.

    121. ``Java Obfuscation with a Theoretical Basis for Building Secure Mobile Agents",
      (with Y. Sakabe and M. Soshi),
      Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, CMS03, to appear.

    122. ``Evaluation of Anonymity of Practical Anonymous Communication Networks",
      (with S. Kitazawa and M. Soshi), Information security and privacy-Proceedings of ACISP 2003,
      Lecture Notes in Computer Science, 2727(2003), Springer-Verlag, 13-26.

    123. ``Statistical Analysis of chi-square attacks",
      (with N. Isogai and M. Nonaka), IEICE Trans., Fundamentals. vol. E86-A, No.5(2003), 1190-1197.

    124. ``Intrusion-Resilient Public-Key Encryption",
      (with Y. Dodis, M. Franklin, J. Katz, and M. Yung), RSA Conference 2003,
      Lecture Notes in Computer Science, 2612(2003).

    125. ``Software obfuscation on a theoretical basis and its implementation",
      (with T. Ogiso, Y. Sakabe, and M. Soushi), IEICE Trans., Fundamentals. vol. E86-A, No.1(2003), 176-186.

    126. ``Cryptanalysis of the reduced-round RC6 without whitening",
      (with M. Nonaka), IEICE Trans., Fundamentals. vol. E86-A, No.1(2003), 19-30

    127. ``Cryptanalysis of the reduced-round RC6",
      (with M. Nonaka), International Conference on Information and Communications Security, ICICS 2002,
      Lecture Notes in Computer Science, 2513(2002), Springer-Verlag."

    128. ``Software tamper resistance based on the difficulty of interprocedural analysis",
      (with T. Ogiso, Y. Sakabe, M. Soshi), International workshop on information security applications - Proceedings of WISA 2002,
      pp 437-452, August 2002.

    129. ``A Second-price Sealed-bid Auction with Public Verifiability", (with K. Omote),
      IPSJ Trans., vol. 43 , No.8(2002), 2405-2413.

    130. ``Provably secure multi-signature scheme with signers' intentions",
      (with K. Kawauchi, H. Minato, M. Tada), IPSJ Trans., vol. 43 , No.8(2002), 2425-2434.

    131. ``Cryptography and Computer Security",(with S. Hangai and W. Wen),
      Review of Radio Science 2000-2002,
      Edited by W. Ross Stone Oxford University Press.

    132. ``A Practical English Auction with Simple Revocation", (with K. Omote),
      IEICE Trans., Fundamentals. vol. E85-A, No.5(2002), 1054-1061.

    133. ``A Fast Signature Scheme without on-line Multiplication", (with T. Okamoto, and M. Tada)
      Financial Cryptography-Proceedings of FC 2002,
      Lecture Notes in Computer Science, 2357(2002), Springer-Verlag.

    134. " ``A Second-price Sealed-bid Auction with the Discriminant of the p-th Root", (with K. Omote),
      Financial Cryptography-Proceedings of FC 2002,
      Lecture Notes in Computer Science, 2357(2002), Springer-Verlag.

    135. ``A multi-signature scheme with signers' intentinos secure against active attacks",
      (with K. Kawauchi, H. Minato, and M. Tada),
      International conference on information security and cryptology Proceedings of ICISC 2001,
      Lecture Notes in Computer Science, 2288(2002), Springer-Verlag, 328-340.

    136. ``Improved Correlation Attack on RC5", (with M. Nonaka, and Y. Takii)
      IEICE Trans., Fundamentals. vol. E85-A, No.1(2002), 44-57.

    137. ``Known Plaintext Correlation Attack Against RC5", (with M. Nonaka and Y. Takii)
      RSA Conference 2002, Lecture Notes in Computer Science, 2271(2002), Springer-Verlag, pp. 131-148.

    138. ``Efficient "on the fly" signature schemes based on integer factoring", (with Okamoto, and M. Tada),
      Indocrypt 2001, Lecture Notes in Computer Science, 2247(2001), Springer-Verlag, pp. 257-286

    139. ``A general model of multisignature schemes with message flexibility, order flexibility, and order verifiability",
      IEICE Trans.,(with S. Mitomi), Fundamentals. Fundamentals. vol. E84-A, No.10(2001), 2488-2499.

    140. ``Proposal of Efficient Signature Schemes based on Factoring", (T. Okamoto, and M. Tada),
      IPSJ Trans, vol. 42, No.8(2001), 2123-2133(in Japanese).

    141. ``An anonymous sealed-bid auction with a feature of entertainment",
      (with K. Omote), IPSJ Trans, vol. 42, No.8(2001), 2049-2056.

    142. ``Efficient and unconditionally secure verifiable threshold changeable scheme",
      (with Ayako Maeda and Mitsuru Tada),
      Information security and privacy-Proceedings of ACISP 2001,
      Lecture Notes in Computer Science, 2119(2001), Springer-Verlag, 403-416.

    143. ``A practical English auction with one-time registration", (with K. Omote),
      Information security and privacy-Proceedings of ACISP 2001,
      Lecture Notes in Computer Science, 2119(2001), Springer-Verlag, 221-234.

    144. ``An Agent-Based Model of Anonymous Communication Protocols",
      (with S. Kitazawa, and M. Soshi),
      Proceedings of the 10th IEEE Internationall Workshops on Enabling Technologies:
      Infrastructure for Collaborative Enterprise (WETICE 2001), June(2001), 177-182.

    145. `` New explicit conditions of elliptic curve traces for FR-reductions",
      (with Masaki Nakabayashi and Shunzo Takano),
      IEICE Trans., Fundamentals. vol. E84-A, No.5(2001), 1234-1243.

    146. ``Characterization of Elliptic Curve Traces under FR-reduction",
      (Masaki Nakabayashi and Shunzo Takano),
      International conference on information security and cryptology-Proceedings
      of ICISC 2000, Lecture Notes in Computer Science, 2015(2001), Springer-Verlag, 90-108.

    147. ``Linkable E-cash Scheme with User's Anonymity", (with A. Koide and M. Tada),
      International Symposium on Information Theory and Its
      Applications-Proceedings of ISITA2000, Vol. 2, 505-508.

    148. ``An anonymous auction protocol with a single non-trusted center using binary trees with the reference number",
      (with K. Omote), Information security workshop-Proceedings of ISW 2000,
      Lecture Notes in Computer Science, 1975(2000), Springer-Verlag, 108-120.

    149. ``Anonymous Communication with Elementary Cyclic Routes",
      (with S. Kitazawa, S. Nagano, and M. Soshi),
      IPSJ Trans, vol. 41, No.8(2000), 2148-2160, (in Japanese).

    150. ``The Secure Renewal of Cryptosystems in the Open Network Architecture",
      (with M. Soshi and T.Yamada),
      IPSJ Trans, vol. 41, No.8(2000), 2102-2109, (in Japanese).

    151. ``Efficient Construction of Elliptic Curves over Optimal Extension Field",
      (with Y. Futa), IPSJ Trans., vol. 41, No.8(2000), 2092-2101.

    152. ``A multisignature scheme with message flexibility, order flexibility and order verifiability",
      (with S. Mitomi), Information security and privacy-Proceedings of ACISP 2000,
      Lecture Notes in Computer Science, 1841(2000), Springer-Verlag, 298-312.

    153. ``Efficient elliptic curve exponentiaion using mixed coordinates",
      Advances in Cryptology-Proceedings of ASIACRYPT'98,
      Lecture Notes in Computer Science, 1514(1998), Springer-Verlag, 51-65.

    154. ``Efficient elliptic curve exponentiaion",
      Advances in Cryptology-Proceedings of ICICS'97,
      Lecture Notes in Computer Science, 1334(1997), Springer-Verlag, 282-290.

    155. ``Another countermeasure to forgeries over message recovery signature"
      IEICE Trans., Fundamentals. vol. E80-A, No.11(1997), 2192-2200.

    156. ``A message recovery signature scheme equivalent to DSA over elliptic curves",
      Advances in Cryptology-Proceedings of ASIACRYPT'96,
      Lecture Notes in Computer Science, 1163(1996), Springer-Verlag, 1-14.

    157. ``On secure and fast elliptic curve cryptosystems over Fp",
      IEICE Trans., Fundamentals. vol. E77-A, No.4(1994), 630-635.

    158. ``Elliptic curves suitable for cryptosystems",
      IEICE Trans., Fundamentals. vol. E77-A, No.1(1994), 98-105.

    159. 「数論アルゴリズムとその応用」,
      情報処理学会,1993.

    160. ``Isogenous Elliptic Curve Cryptosystems",
      Finite Field Conference Abstracts, Aug.(1993), 35-36.

    161. ``Elliptic curve cryptosystems immune to any reduction into the discrete logarithm problem",
      IEICE Trans., Fundamentals. vol. E76-A, No.1(1993), 50-54.

    162. ``Elliptic curves over Fp suitable for cryptosystems",
      Advances in Cryptology-Proceedings of AUSCRYPT'92,
      Lecture Notes in Computer Science, 718(1993), Springer-Verlag, 479-491.

    163. ``On ordinary elliptic curve cryptosystems",
      Advances in Cryptology-Proceedings of ASIACRYPT'91,
      Lecture Notes in Computer Science, 739(1993), Springer-Verlag, 460-469.