Mitsugu Iwamoto
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j11]Risa Yashiro, Takeshi Sugawara, Mitsugu Iwamoto, Kazuo Sakiyama:
Q-Class Authentication System for Double Arbiter PUF. IEICE Transactions 101-A(1): 129-137 (2018) - [j10]Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata:
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography. IEEE Trans. Information Theory 64(1): 654-685 (2018) - 2017
- [c22]Takeshi Nakai, Satoshi Shirouchi, Mitsugu Iwamoto, Kazuo Ohta:
Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations. ICITS 2017: 153-165 - [i9]Kees A. Schouhamer Immink, Stan Baggen, Ferdaous Chaabane, Yanling Chen, Peter H. N. de With, Hela Gassara, Hamed Gharbi, Adel Ghazel, Khaled Grati, Naira M. Grigoryan, Ashot N. Harutyunyan, Masayuki Imanishi, Mitsugu Iwamoto, Ken-ichi Iwata, Hiroshi Kamabe, Brian M. Kurkoski, Shigeaki Kuzuoka, Patrick Langenhuizen, Jan Lewandowsky, Akiko Manada, Shigeki Miyake, Hiroyoshi Morita, Jun Muramatsu, Safa Najjar, Arnak V. Poghosyan, Fatma Rouissi, Yuta Sakai, Ulrich Tamm, Joost van der Putten, Fons van der Sommen, A. J. Han Vinck, Tadashi Wadayama, Dirk Wübben, Hirosuke Yamamoto:
Proceedings of Workshop AEW10: Concepts in Information Theory and Communications. CoRR abs/1707.08567 (2017) - 2016
- [c21]Kenichiro Hayasaka, Yutaka Kawai, Yoshihiro Koseki, Takato Hirano, Kazuo Ohta, Mitsugu Iwamoto:
Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption. CANS 2016: 350-364 - [c20]Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations. CANS 2016: 500-517 - [c19]Takato Hirano, Mitsuhiro Hattori, Yutaka Kawai, Nori Matsuda, Mitsugu Iwamoto, Kazuo Ohta, Yusuke Sakai, Tatsuji Munaka:
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes. IWSEC 2016: 91-110 - [c18]Risa Yashiro, Takanori Machida, Mitsugu Iwamoto, Kazuo Sakiyama:
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants. IWSEC 2016: 267-285 - 2015
- [j9]Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh, Naoya Torii:
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs. J. Cryptographic Engineering 5(3): 187-199 (2015) - [c17]Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, Kazuo Sakiyama:
Implementation of double arbiter PUF and its performance evaluation on FPGA. ASP-DAC 2015: 6-7 - [c16]Mitsugu Iwamoto, Junji Shikata:
Constructions of symmetric-key encryption with guessing secrecy. ISIT 2015: 725-729 - 2014
- [j8]Kazuo Sakiyama, Yang Li, Shigeto Gomisawa, Yu-ichi Hayashi, Mitsugu Iwamoto, Naofumi Homma, Takafumi Aoki, Kazuo Ohta:
Practical DFA Strategy for AES Under Limited-access Conditions. JIP 22(2): 142-151 (2014) - [c15]Kazuma Ohara, Yusuke Sakai, Fumiaki Yoshida, Mitsugu Iwamoto, Kazuo Ohta:
Privacy-preserving smart metering with verifiability for both billing and energy management. AsiaPKC@AsiaCCS 2014: 23-32 - [c14]Yu Sasaki, Yuuki Tokushige, Lei Wang, Mitsugu Iwamoto, Kazuo Ohta:
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl. CT-RSA 2014: 424-443 - [c13]Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto, Kazuo Sakiyama:
A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA. FedCSIS 2014: 871-878 - [c12]Takashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta:
Secure (M+1) st-Price Auction with Automatic Tie-Break. INTRUST 2014: 422-437 - [c11]
- [c10]Pichanee Lumyong, Mitsugu Iwamoto, Kazuo Ohta:
Cheating on a visual secret sharing scheme under a realistic scenario. ISITA 2014: 575-579 - [c9]Mitsugu Iwamoto, Tsukasa Omino, Yuichi Komano, Kazuo Ohta:
A new model of Client-Server Communications under information theoretic security. ITW 2014: 511-515 - [i8]Mitsugu Iwamoto, Junji Shikata:
Secret Sharing Schemes Based on Min-Entropies. CoRR abs/1401.5896 (2014) - [i7]Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata:
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography. CoRR abs/1410.1120 (2014) - 2013
- [j7]Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Masahiko Takenaka, Kouichi Itoh:
Variety enhancement of PUF responses using the locations of random outputting RS latches. J. Cryptographic Engineering 3(4): 197-211 (2013) - [c8]Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki:
Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful. ASIACRYPT (2) 2013: 504-523 - [c7]Mitsugu Iwamoto, Junji Shikata:
Information Theoretic Security for Encryption Based on Conditional Rényi Entropies. ICITS 2013: 103-121 - [c6]Yu Sasaki, Wataru Komatsubara, Yasuhide Sakai, Lei Wang, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL. SECRYPT 2013: 111-122 - [i6]Mitsugu Iwamoto, Junji Shikata:
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies. IACR Cryptology ePrint Archive 2013: 440 (2013) - [i5]Mitsugu Iwamoto, Thomas Peyrin, Yu Sasaki:
Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful. IACR Cryptology ePrint Archive 2013: 611 (2013) - 2012
- [j6]Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta:
Information-Theoretic Approach to Optimal Differential Fault Analysis. IEEE Trans. Information Forensics and Security 7(1): 109-120 (2012) - [j5]Mitsugu Iwamoto:
A Weak Security Notion for Visual Secret Sharing Schemes. IEEE Trans. Information Forensics and Security 7(2): 372-382 (2012) - [j4]Mitsugu Iwamoto, Hiroki Koga, Hirosuke Yamamoto:
Coding Theorems for a (2, 2)-Threshold Scheme With Detectability of Impersonation Attacks. IEEE Trans. Information Theory 58(9): 6194-6206 (2012) - [c5]Toshiki Nakasone, Yang Li, Yu Sasaki, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama:
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher. ICISC 2012: 395-409 - 2011
- [c4]Dai Yamamoto, Kazuo Sakiyama, Mitsugu Iwamoto, Kazuo Ohta, Takao Ochiai, Masahiko Takenaka, Kouichi Itoh:
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches. CHES 2011: 390-406 - [c3]Mitsugu Iwamoto, Kazuo Ohta:
Security notions for information theoretically secure encryptions. ISIT 2011: 1777-1781 - [i4]Mitsugu Iwamoto, Kazuo Ohta:
Security Notions for Information Theoretically Secure Encryptions. CoRR abs/1106.1731 (2011) - 2010
- [i3]Mitsugu Iwamoto, Hiroki Koga, Hirosuke Yamamoto:
Coding Theorems for Cheating-Detectable Secret Sharing Schemes with Two Shares. CoRR abs/1004.4530 (2010)
2000 – 2009
- 2009
- [c2]Mitsugu Iwamoto, Hirosuke Yamamoto, Hiroki Koga:
A coding theorem for cheating-detectable (2, 2)-threshold blockwise secret sharing schemes. ISIT 2009: 1308-1312 - 2007
- [j3]Mitsugu Iwamoto, Hirosuke Yamamoto, Hirohisa Ogawa:
Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures. IEICE Transactions 90-A(1): 101-112 (2007) - 2006
- [j2]Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta:
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares. IEICE Transactions 89-A(5): 1382-1395 (2006) - [j1]Mitsugu Iwamoto, Hirosuke Yamamoto:
Strongly secure ramp secret sharing schemes for general access structures. Inf. Process. Lett. 97(2): 52-57 (2006) - 2005
- [i2]Mitsugu Iwamoto, Hirosuke Yamamoto, Hirohisa Ogawa:
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures. CoRR abs/cs/0506064 (2005) - [i1]Mitsugu Iwamoto, Hirosuke Yamamoto:
Strongly secure ramp secret sharing schemes for general access structures. CoRR abs/cs/0506065 (2005) - 2002
- [c1]Masaaki Kondo, Mitsugu Iwamoto, Hiroshi Nakamura:
Cache Line Impact on 3D PDE Solvers. ISHPC 2002: 301-309
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-01-26 19:13 CET by the dblp team