論文
公開件数:73件
No. 種別 査読の有無 標題 単著・共著区分 著者 誌名 巻号頁 出版日 ISSN DOI URL
1 一般論文

How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
共著
Y. Watanabe, T. Nakai, K. Ohara, T. Nojima, Y. Liu, M. Iwamoto, and K. Ohta
IEICE Trans. on Fundamentals
E105.A/ -, ---
2022/06/01



2 一般論文

Efficient Card-Based Majority Voting Protocols
共著
Yoshiki Abe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Yohei Watanabe, Mitsugu Iwamoto, and Kazuo Ohta
New Generation Computing
40/ -, ---
2022/03/23

10.1007/s00354-022-00161-7

3 一般論文

Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations
共著
T. Nakai, S. Shirouchi, Y. Tokushige, M. Iwamoto, and K. Ohta
New Generation Computing
40/ -, ---
2022/02/08

10.1007/s00354-022-00153-7

4 一般論文

How to Solve Millionaires' Problem with Two Kinds of Cards
共著
Takeshi Nakai, Yuto Misawa, Yuuki Tokushige, Mitsugu Iwamoto, and Kazuo Ohta
New Generation Computing
39/ 1, 73-96
2021/01/05



5 一般論文

An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density
共著
K. Matsuda, S. Tada, M. Nagata, Y. Komano, Y. Li, T. Sugawara, M. Iwamoto, K. Ohta, K. Sakiyama, and N. Miura
Jpn. J. Appl. Phys. 59
59/ SG, SGGL02-1-SGGL02-12
2020/02/28

10.7567/1347-4065/ab65d3

6 一般論文

Multi-Party Computation for Modular Exponentiation based on Replicated Secret Sharing
共著
K. Ohara, Y. Watanabe, M. Iwamoto, and K. Ohta
IEICE Trans. on Fundamentals
E102.A/ 9, 1079-1090
2019/09/01



7 一般論文

Single-Round Pattern Matching Key Generation Using Physically Unclonable Function
共著
Y. Komano, K. Ohta, K. Sakiyama, M. Iwamoto, and I. Verbauwhede
Security and Communication Networks
2019/ 1719585
2019

https://doi.org/10.1155/2019/1719585

8 一般論文

A Proactive Secret Image Sharing Scheme with Resistance to Machine Learning Based Steganalysis
共著
A. Espejel-Trujillo, M. Iwamoto, and M. Nakano-Miyatake
Multimedia Tools And Applications
77/ 12, 15161-15179
2018/06/01



9 一般論文

Q-class Authentication System for Double Arbiter PUF
共著
 R. Yashiro, T. Sugawara, M. Iwamoto, and K. Sakiyama
IEICE Trans. Fundamentals
E101-A/ 1, 129-137
2018/01/01



10 一般論文

Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
共著
 M. Iwamoto, K. Ohta, and J. Shikata
IEEE Transactions on Information Theory
64/ 1, 654-685
2018/01/01



11 一般論文

A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs
共著
D. Yamamoto, K. Sakiyama, M. Iwamoto, K. Ohta, M. Takenaka, K. Itoh, and N. Torii
Journal of Cryptographic Engineering
5/ 3, 187-199
2015



12 一般論文

A New Arbiter PUF for Enhancing Unpredictability on FPGA
共著
Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto and Kazuo Sakiyama
The Scientific World Journal
2015, 864812-
2015

http://dx.doi.org/10.1155/2015/864812

13 一般論文

Practical DFA Strategy for AES Under Limited-Access Conditions
共著
K. Sakiyama, Y. Li, S. Gomisawa, Y. Hayashi, M. Iwamoto, N. Homma, T. Aoki, and K. Ohta,
Journal of Information Processing
55/ 2, 142-151
2014



14 一般論文

クロック間衝突を漏洩モデルとする新たなサイドチャネル解析と並列実装AES暗号ハードウェアにおける弱い鍵
共著
中曽根俊貴,李陽,岩本貢,太田和夫,崎山一男
電子情報通信学会論文誌A
J97-A/ 11, 695-703
2014/11



15 解説

Threshold Based Visual Cryptography: A Tutorial Review

M. Nakano, E. Escamilla, H. Perez, and M. Iwamoto
Informacion Tecnologica
22/ 5, 107-120
2011



16 一般論文

Variety enhancement of PUF responses using the locations of random outputting RS latches
共著
D. Yamamoto, K. Sakiyama, M. Iwamoto, K. Ohta, M. Takenaka, and K. Itoh
Journal of Cryptographic Engineering
3/ 4, 197-211
2013



17 一般論文

Information-Theoretic Approach to Optimal Differ- ential Fault Analysis
共著
Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta
IEEE Trans. on Information Forensics and Security
7/ 1, 109-120
2012/01



18 一般論文

A weak security notion for visual secret sharing schemes
単著
Mitsugu Iwamoto
IEEE Trans. on Information Forensics and Security
7/ 2, 372-382
2012/02



19 一般論文

A cheating prevention EVC scheme using watermarking techniques
共著
A. E. Torujillo, M. N. Miyatake, M. Iwamoto, and H. P. Maena
Revista Facultad de Ingeniera, Univ. Antioquia
63, 30-42
2012/06



20 一般論文

Coding theorems for a (2,2)-threshold scheme with detectability of impersonation attacks
共著
M. Iwamoto, H. Koga, and H. Yamamoto
IEEE Trans. Information Theory
59/ 9, 6194-6206
2012/09



21 一般論文

Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures
共著
M. Iwamoto, H. Yamamoto, H. Ogawa
IEICE Transactions on Fundamentals
E90-A/ 1, 101-112
2007/01



22 一般論文

Strongly secure ramp secret sharing schemes for general access structures
共著
岩本貢,山本博資
Information Processing Letters
97/ 2, 52-57
2006/01



23 一般論文

Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
単著
岩本貢,王磊,米山一樹,國廣昇,太田和夫
IEICE Transactions on Fundamentals
E89-A/ 5, 387-402
2006/05



24 一般論文

Quantum Secret Sharing Schemes and Reversibility of Quantum Oerations
共著
小川朋宏,佐々木朗,岩本貢,山本博資
Physical Review A
72, 032318-
2005



25 一般論文

A construction method of visual secret sharing schemes for plural secret images
共著
M. Iwamoto and H. Yamamoto
IEICE Trans. Fundamentals
E86-A/ 10, 2577-2588
2003/10/01



26 一般論文

The optimal n-out-of-n visual secret sharing scheme for gray-scale images
共著
M. Iwamoto and H. Yamamoto
IEICE Trans. Fundamentals
E85-A/ 10, 2238-2247
2002/10/01



27 一般論文

An analytic construction of the visual secret sharing scheme for color images
共著
H. Koga, M. Iwamoto and H. Yamamoto
IEICE Trans. Fundamentals
E84-A/ 1, 262-272
2001/01/01



28 国際会議プロシーディングス等

Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage
共著
Y. Watanabe, K. Ohara, M. Iwamoto, and K. Ohta
ACM CODASPY 2022
-/ -, 312-323
2022/04/24

10.1145/3508398.3511521

29 国際会議プロシーディングス等

How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs
共著
Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta,
International Symposium on Information Theory and Its Applications (ISITA2020)
-/ -, 377-381
2020/10/24



30 国際会議プロシーディングス等

A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule
共著
Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto Kazuo Sakiyama, and Kazuo Ohta,
International Symposium on Information Theory and Its Applications (ISITA2020)
-/ -, 382-386
2020/10/24



31 国際会議プロシーディングス等

Efficient Private PEZ Protocols for Symmetric Functions
共著
Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta
Theory of Cryptography Conference
LNCS11891, 372-392
2019/12/01



32 国際会議プロシーディングス等

Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes
共著
R. Eriguchi, M. Iwamoto, and N. Kunihiro
IEEE International Symposium on Information Theory
3047-3051
2019/07



33 国際会議プロシーディングス等

An Abstraction Model for 1-bit Probing Attack on Block Ciphers
共著
An Abstraction Model for 1-bit Probing Attack on Block Ciphers
International Conference on Computer and Communication Systems
-/ -, 502-506
2019



34 国際会議プロシーディングス等

Card-Based Majority Voting Protocols with Three Inputs Using Three Cards
共著
Yohei Watanabe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, and Kazuo Ohta
Proc. of International Symposium on Information Theory and Its Applications
218-222
2018/10/20

10.23919/ISITA.2018.8664324

35 国際会議プロシーディングス等

Worst-case guessing secrecy is meaningful in secret sharing schemes
単著
M. Iwamoto
ICITS2017
workshop track
2017/12



36 国際会議プロシーディングス等

Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations
共著
T. Nakai, S. Shirouchi, M. Iwamoto and K. Ohta
ICITS2017
LNCS 10681, 153-165
2017/11



37 国際会議プロシーディングス等

Efficient Card-based Cryptographic Protocols for Millionaires’ Problem Utilizing Private Permutations
共著
T. Nakai, Y. Misawa, Y. Tokushige, M. Iwamoto, and K. Ohta
CANS2016
350-364
2016/11



38 国際会議プロシーディングス等

Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption
共著
K. Hayasaka, Y. Kawai, Y. Koseki, T. Hirano, K. Ohta, and M. Iwamoto
CANS2016
500-517
2016/11



39 国際会議プロシーディングス等

Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes
共著
T. Hirano, M. Hattori, Y. Kawai, N. Matsuda, M. Iwamoto, K. Ohta, Y. Sakai, and T. Munaka
IWSEC2016
LNCS 9836, 91-110
2016/09



40 国際会議プロシーディングス等

Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants
共著
R. Yashiro, T. Machida, M. Iwamoto, and K. Sakiyama
IWSEC2016
LNCS 9836, 267-285
2016/09



41 国際会議プロシーディングス等

Application of Joux-Lucks Search Algorithm for Multi-Collisions to MicroMint
共著
Y. Kamoshida, M. Iwamoto
IWSEC2016
poster session
2016/09



42 国際会議プロシーディングス等

Implementation of Double Arbiter PUF and Its Performance Evaluation on FPGA
共著
T. Machida, D. Yamamoto, M. Iwamoto, and K. Sakiyama
20th Asia and South Pacific Design Automation Conference (ASP-DAC 2015)
6-7
2015/01



43 国際会議プロシーディングス等

Construction of symmetric-key encryption with guessing secrecy
共著
M. Iwamoto and J. Shikata
IEEE International Symposium on Information Theory
725-729
2015/06



44 国際会議プロシーディングス等

Comparison of Security on Coded Signs with Public/Private Code Book
共著
Y. Misawa, Y. Tokushige, M. Iwamoto and K. Ohta
International Workshop on Information Security and Crytptograohy
poster session
2015/08



45 国際会議プロシーディングス等

Toward Reducing Shuffling in Card-based Cryptographic Protocol for Millionaire Problem
共著
T. Nakai, Y. Tokushige, M. Iwamoto and K. Ohta
International Workshop on Information Security and Crytptograohy
poster session
2015/08



46 国際会議プロシーディングス等

An Automated Evaluation Tool for Improved Rebound Attack: New ShiftBytes Parameters for Grøstl
共著
Y. Sasaki, Y. Tokushige, L. Wang, M. Iwamoto, and K. Ohta,
CT-RSA2014
LNCS 8366, 424-443
2014/02



47 国際会議プロシーディングス等

Privacy-Preserving Smart Metering with Verifiability for Both Billing and Energy Management
共著
K. Ohara, Y. Sakai, F. Yoshida, M. Iwamoto, and K. Ohta

23-32
2014/06



48 国際会議プロシーディングス等

Secret Sharing Schemes Based on Min-entropies
共著
M.Iwamoto and J.Shikata
IEEE International Symposium on Information Theory
401-405
2014/07



49 国際会議プロシーディングス等

A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA
共著
T.Machida, D.Yamamoto, M.Iwamoto, and K.Sakiyama
1st Workshop on Emerging Aspects in Information Security (EAIS'14)
877-884
2014/09



50 国際会議プロシーディングス等

Cheating on a Visual Secret Sharing Scheme under a Realistic Scenario
共著
P. Lumyong, M. Iwamoto, and K. Ohta
International symposium on information theory and its applications (ISITA)
546-550
2014/10



51 国際会議プロシーディングス等

A New Model of Client--Server Communications under Information Theoretic Security
共著
M. Iwamoto, T. Omino, Y. Komano, and K. Ohta
IEEE Information Thoery Workshop 2014
512-516
2014/11



52 国際会議プロシーディングス等

Secure (M + 1)st-Price Auction with Automatic Tie-Break (to appear)
共著
T. Nishide, M. Iwamoto, A. Iwasaki, and K. Ohta,
InTrust2014
LNCS 9473, 422-436
2014/12



53 国際会議プロシーディングス等

Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL
共著
Y. Sasaki, W. Komatsubara, Y. Sakai, L. Wang, M. Iwamoto, K Sakiyama and K. Ohta
SECRYPT
111-122
2013/07



54 国際会議プロシーディングス等

A New Model of Modeling Attacks against Arbiter PUF on FPGA
共著
T. Machida, T. Nakasone, M. Iwamoto, and K. Sakiyama
International Workshop on Information Security and Crytptograohy
poster session
2013



55 国際会議プロシーディングス等

Information theoretic security for encryption based on conditional Rényi entropies
共著
M.Iwamoto and J.Shikata
International Conference on Information Theoretic Security (ICITS)
LNSC8317, 101-121
2013/11



56 国際会議プロシーディングス等

Limited-birthday distinguishers for hash functions---collisions beyond the birthday bound can be meaningful
共著
M.Iwamoto, T.Peyrin, and Y.Sasaki
ASIACRYPT2013
LNCS8269, 505-523
2013/12



57 国際会議プロシーディングス等

A t-resilient Unconditionally Secure First-Price Auction Protocol
共著
K.Ohara, Y.Sakai, M.Iwamoto, and K.Ohta
International Workshop on Information Security and Crytptograohy
poster session
2012/11



58 国際会議プロシーディングス等

Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher
共著
T. Nakasone, Y. Li, Y. Sasaki, M. Iwamoto, K. Ohta, and K. Sakiyama
Proc. of International Conference on Information Security and Cryptography
LNCS7839, 395-409
2012/12



59 国際会議プロシーディングス等

Unique- ness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
共著
D. Yamamoto, K. Sakiyama, M. Iwamoto, K. Ohta, T. Ochiai, M. Takenaka, and K. Itoh
Proceedings of CHES2011
LNCS6197, 391-406
2011/10



60 国際会議プロシーディングス等

Security Notions for Information Theoretically Secure Encrynotions
共著
Mitsugu Iwamoto, Kazuo Ohta
IEEE International Symposium on Information Theory
1743-1747
2011/08



61 国際会議プロシーディングス等

Variations of Information Theoretic Security Notions
共著
M. Iwamoto and K. Ohta
Asian-Europian Workshop on Information Theory (AEW)
73-77
2011/07



62 国際会議プロシーディングス等

Security Notions for Information Theoretically Secure Encryptions
共著
M. Iwamoto and K. Ohta
IEEE International Symposium on Information Theory
1743-1747
2011/07



63 国際会議プロシーディングス等

Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
共著
D.Yamamoto, K.Sakiyama, M.Iwamoto, K.Ohta, T.Ochiai, M.Takenaka, and K.Itoh

LNCS6917, 396-406
2011/10



64 国際会議プロシーディングス等

Visual Secret Sharing Schemes for Multiple Secret Images Including Shifting Operation of Shares
共著
A. Espejel-Trujillo, M. Nakano-Miyatake, M. Iwamoto
Proc. of 6th International Conference on Electrical Engineering, Computing Science and Automatic Control
??-??
2009/11



65 国際会議プロシーディングス等

Coding Theorems for a (2,2)-Threshold Scheme Secure against Impersonation by an Opponent
共著
H. Koga, M. Iwamoto, H. Yamamoto
IEEE Information Thoery Workshop 2009
188-192
2009/10



66 国際会議プロシーディングス等

A Coding Theorem for Cheating-Detectable (2, 2)-Threshold Blockwise Secret Sharing Schemes
共著
Mitsugu Iwamoto, Hirosuke Yamamoto, Hiroki Koga
IEEE International Symposium on Information Theory
1308-1312
2009/06



67 国際会議プロシーディングス等

Weakly Secure Visual Secret Sharing Schemes
単著
Mitsugu Iwamoto
International symposium on information theory and its applications (ISITA)
42-47
2008/12



68 国際会議プロシーディングス等

A Remark on Visual Secret Sharing Schemes Allowing the Rotation of Shares
共著
M. Iwamoto, L. Wang, K. Yoneyama, N. Kunihiro, K. Ohta
5th Asia-Europe workshop on information theory
37-42
2006/10



69 国際会議プロシーディングス等

Strongly secure ramp secret sharing schemes
共著
Mitsugu Iwamoto, Hirosuke Yamamoto
IEEE International Symposium on Information Theory
1221-1225
2005/09



70 国際会議プロシーディングス等

Optimal Multiple Assignments based on Integer Programming in Secret Sharing Schemes
共著
Mitsugu Iwmaoto, Hirosuke Yamamoto, Hirohisa Ogawa
Proc. of IEEE International Symposium on Information Theory
16-16
2004/06



71 国際会議プロシーディングス等

Quantum Secret Sharing Schemes and Reversibility of Quantum Operations
共著
Tomohiro Ogawa, Akira Sasaki, Mitsugu Iwamoto, Hirosuke Yamamoto
Proceeding of international symposium on information theory and its applications
1440-1445
2004/10



72 国際会議プロシーディングス等

A construction method of visual secret sharing scheme with plural secret images
共著
Mitsugu Iwamoto, Hirouske Yamamoto
Proc. of IEEE international symposium on information theory
283-283
2003



73 国際会議プロシーディングス等

Cache line impact on 3D PDE solvers
共著
Masaaki Kondo, Mitsugu Iwamoto, Hiroshi Nakamura
ISHPC 2002, Springer Verlag (LNCS 2327)
LNCS 2327, 301-309
2001