Folgen
Mitsugu Iwamoto
Titel
Zitiert von
Zitiert von
Jahr
A new arbiter PUF for enhancing unpredictability on FPGA
T Machida, D Yamamoto, M Iwamoto, K Sakiyama
The Scientific World Journal 2015 (1), 864812, 2015
892015
Information-theoretic approach to optimal differential fault analysis
K Sakiyama, Y Li, M Iwamoto, K Ohta
IEEE Transactions on Information Forensics and Security 7 (1), 109-120, 2011
892011
A new mode of operation for arbiter PUF to improve uniqueness on FPGA
T Machida, D Yamamoto, M Iwamoto, K Sakiyama
2014 Federated Conference on Computer Science and Information Systems, 871-878, 2014
792014
Information theoretic security for encryption based on conditional Rényi entropies
M Iwamoto, J Shikata
Information Theoretic Security: 7th International Conference, ICITS 2013 …, 2014
772014
The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images
M Iwamoto, H Yamamoto
IEICE transactions on fundamentals of electronics, communications and …, 2002
742002
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches
D Yamamoto, K Sakiyama, M Iwamoto, K Ohta, T Ochiai, M Takenaka, ...
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
702011
Implementation of double arbiter PUF and its performance evaluation on FPGA
T Machida, D Yamamoto, M Iwamoto, K Sakiyama
The 20th Asia and South Pacific Design Automation Conference, 6-7, 2015
632015
Quantum secret sharing schemes and reversibility of quantum operations
T Ogawa, A Sasaki, M Iwamoto, H Yamamoto
Physical review A 72 (3), 032318, 2005
562005
An analytic construction of the visual secret sharing scheme for color images
H Koga, M Iwamoto, H Yamamoto
IEICE transactions on fundamentals of electronics, communications and …, 2001
532001
Strongly secure ramp secret sharing schemes for general access structures
M Iwamoto, H Yamamoto
Information Processing Letters 97 (2), 52-57, 2006
512006
Variety enhancement of PUF responses using the locations of random outputting RS latches
D Yamamoto, K Sakiyama, M Iwamoto, K Ohta, M Takenaka, K Itoh
Journal of Cryptographic Engineering 3 (4), 197-211, 2013
502013
Efficient card-based cryptographic protocols for millionaires’ problem utilizing private permutations
T Nakai, Y Tokushige, Y Misawa, M Iwamoto, K Ohta
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
442016
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
M Iwamoto, H Yamamoto, H Ogawa
IEICE transactions on fundamentals of electronics, communications and …, 2007
442007
A weak security notion for visual secret sharing schemes
M Iwamoto
IEEE Transactions on Information Forensics and Security 7 (2), 372-382, 2011
422011
Deep-learning-based security evaluation on authentication systems using arbiter PUF and its variants
R Yashiro, T Machida, M Iwamoto, K Sakiyama
Advances in Information and Computer Security: 11th International Workshop …, 2016
392016
Limited-birthday distinguishers for hash functions: Collisions beyond the birthday bound can be meaningful
M Iwamoto, T Peyrin, Y Sasaki
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
382013
A construction method of visual secret sharing schemes for plural secret images
M Iwamoto, H Yamamoto
IEICE transactions on fundamentals of electronics, communications and …, 2003
342003
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations
T Nakai, S Shirouchi, M Iwamoto, K Ohta
Information Theoretic Security: 10th International Conference, ICITS 2017 …, 2017
322017
Privacy-preserving smart metering with verifiability for both billing and energy management
K Ohara, Y Sakai, F Yoshida, M Iwamoto, K Ohta
Proceedings of the 2nd ACM workshop on ASIA public-key cryptography, 23-32, 2014
312014
Card-based majority voting protocols with three inputs using three cards
Y Watanabe, Y Kuroki, S Suzuki, Y Koga, M Iwamoto, K Ohta
2018 International Symposium on Information Theory and Its Applications …, 2018
302018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20