No. |
種別 |
査読の有無 |
標題 |
単著・共著区分 |
著者 |
誌名 |
巻号頁 |
出版日 |
ISSN |
DOI |
URL |
1 |
一般論文
|
有
|
How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
|
共著
|
Y. Watanabe, T. Nakai, K. Ohara, T. Nojima, Y. Liu, M. Iwamoto, and K. Ohta
|
IEICE Trans. on Fundamentals
|
E105.A/ -, ---
|
2022/06/01
|
|
|
|
2 |
一般論文
|
有
|
Efficient Card-Based Majority Voting Protocols
|
共著
|
Yoshiki Abe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Yohei Watanabe, Mitsugu Iwamoto, and Kazuo Ohta
|
New Generation Computing
|
40/ -, ---
|
2022/03/23
|
|
10.1007/s00354-022-00161-7
|
|
3 |
一般論文
|
有
|
Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations
|
共著
|
T. Nakai, S. Shirouchi, Y. Tokushige, M. Iwamoto, and K. Ohta
|
New Generation Computing
|
40/ -, ---
|
2022/02/08
|
|
10.1007/s00354-022-00153-7
|
|
4 |
一般論文
|
有
|
How to Solve Millionaires' Problem with Two Kinds of Cards
|
共著
|
Takeshi Nakai, Yuto Misawa, Yuuki Tokushige, Mitsugu Iwamoto, and Kazuo Ohta
|
New Generation Computing
|
39/ 1, 73-96
|
2021/01/05
|
|
|
|
5 |
一般論文
|
有
|
An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density
|
共著
|
K. Matsuda, S. Tada, M. Nagata, Y. Komano, Y. Li, T. Sugawara, M. Iwamoto, K. Ohta, K. Sakiyama, and N. Miura
|
Jpn. J. Appl. Phys. 59
|
59/ SG, SGGL02-1-SGGL02-12
|
2020/02/28
|
|
10.7567/1347-4065/ab65d3
|
|
6 |
一般論文
|
有
|
Multi-Party Computation for Modular Exponentiation based on Replicated Secret Sharing
|
共著
|
K. Ohara, Y. Watanabe, M. Iwamoto, and K. Ohta
|
IEICE Trans. on Fundamentals
|
E102.A/ 9, 1079-1090
|
2019/09/01
|
|
|
|
7 |
一般論文
|
有
|
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function
|
共著
|
Y. Komano, K. Ohta, K. Sakiyama, M. Iwamoto, and I. Verbauwhede
|
Security and Communication Networks
|
2019/ 1719585
|
2019
|
|
https://doi.org/10.1155/2019/1719585
|
|
8 |
一般論文
|
有
|
A Proactive Secret Image Sharing Scheme with Resistance to Machine Learning Based Steganalysis
|
共著
|
A. Espejel-Trujillo, M. Iwamoto, and M. Nakano-Miyatake
|
Multimedia Tools And Applications
|
77/ 12, 15161-15179
|
2018/06/01
|
|
|
|
9 |
一般論文
|
有
|
Q-class Authentication System for Double Arbiter PUF
|
共著
|
R. Yashiro, T. Sugawara, M. Iwamoto, and K. Sakiyama
|
IEICE Trans. Fundamentals
|
E101-A/ 1, 129-137
|
2018/01/01
|
|
|
|
10 |
一般論文
|
有
|
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
|
共著
|
M. Iwamoto, K. Ohta, and J. Shikata
|
IEEE Transactions on Information Theory
|
64/ 1, 654-685
|
2018/01/01
|
|
|
|
11 |
一般論文
|
有
|
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs
|
共著
|
D. Yamamoto, K. Sakiyama, M. Iwamoto, K. Ohta, M. Takenaka, K. Itoh, and N. Torii
|
Journal of Cryptographic Engineering
|
5/ 3, 187-199
|
2015
|
|
|
|
12 |
一般論文
|
有
|
A New Arbiter PUF for Enhancing Unpredictability on FPGA
|
共著
|
Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto and Kazuo Sakiyama
|
The Scientific World Journal
|
2015, 864812-
|
2015
|
|
http://dx.doi.org/10.1155/2015/864812
|
|
13 |
一般論文
|
有
|
Practical DFA Strategy for AES Under Limited-Access Conditions
|
共著
|
K. Sakiyama, Y. Li, S. Gomisawa, Y. Hayashi, M. Iwamoto,
N. Homma, T. Aoki, and K. Ohta,
|
Journal of Information Processing
|
55/ 2, 142-151
|
2014
|
|
|
|
14 |
一般論文
|
有
|
クロック間衝突を漏洩モデルとする新たなサイドチャネル解析と並列実装AES暗号ハードウェアにおける弱い鍵
|
共著
|
中曽根俊貴,李陽,岩本貢,太田和夫,崎山一男
|
電子情報通信学会論文誌A
|
J97-A/ 11, 695-703
|
2014/11
|
|
|
|
15 |
解説
|
有
|
Threshold Based Visual Cryptography: A Tutorial Review
|
|
M. Nakano, E. Escamilla, H. Perez, and M. Iwamoto
|
Informacion Tecnologica
|
22/ 5, 107-120
|
2011
|
|
|
|
16 |
一般論文
|
有
|
Variety enhancement of PUF responses using the locations of random outputting RS latches
|
共著
|
D. Yamamoto, K. Sakiyama, M. Iwamoto, K. Ohta, M. Takenaka, and K. Itoh
|
Journal of Cryptographic Engineering
|
3/ 4, 197-211
|
2013
|
|
|
|
17 |
一般論文
|
有
|
Information-Theoretic Approach to Optimal Differ- ential Fault Analysis
|
共著
|
Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta
|
IEEE Trans. on Information Forensics and Security
|
7/ 1, 109-120
|
2012/01
|
|
|
|
18 |
一般論文
|
有
|
A weak security notion for visual secret sharing schemes
|
単著
|
Mitsugu Iwamoto
|
IEEE Trans. on Information Forensics and Security
|
7/ 2, 372-382
|
2012/02
|
|
|
|
19 |
一般論文
|
有
|
A cheating prevention EVC scheme using watermarking techniques
|
共著
|
A. E. Torujillo, M. N. Miyatake, M. Iwamoto, and H. P. Maena
|
Revista Facultad de Ingeniera, Univ. Antioquia
|
63, 30-42
|
2012/06
|
|
|
|
20 |
一般論文
|
有
|
Coding theorems for a (2,2)-threshold scheme with
detectability of impersonation attacks
|
共著
|
M. Iwamoto, H. Koga, and H. Yamamoto
|
IEEE Trans. Information Theory
|
59/ 9, 6194-6206
|
2012/09
|
|
|
|
21 |
一般論文
|
有
|
Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures
|
共著
|
M. Iwamoto, H. Yamamoto, H. Ogawa
|
IEICE Transactions on Fundamentals
|
E90-A/ 1, 101-112
|
2007/01
|
|
|
|
22 |
一般論文
|
有
|
Strongly secure ramp secret sharing schemes for general access structures
|
共著
|
岩本貢,山本博資
|
Information Processing Letters
|
97/ 2, 52-57
|
2006/01
|
|
|
|
23 |
一般論文
|
有
|
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
|
単著
|
岩本貢,王磊,米山一樹,國廣昇,太田和夫
|
IEICE Transactions on Fundamentals
|
E89-A/ 5, 387-402
|
2006/05
|
|
|
|
24 |
一般論文
|
有
|
Quantum Secret Sharing Schemes and Reversibility of Quantum Oerations
|
共著
|
小川朋宏,佐々木朗,岩本貢,山本博資
|
Physical Review A
|
72, 032318-
|
2005
|
|
|
|
25 |
一般論文
|
有
|
A construction method of visual secret sharing schemes for plural secret images
|
共著
|
M. Iwamoto and H. Yamamoto
|
IEICE Trans. Fundamentals
|
E86-A/ 10, 2577-2588
|
2003/10/01
|
|
|
|
26 |
一般論文
|
有
|
The optimal n-out-of-n visual secret sharing scheme for gray-scale images
|
共著
|
M. Iwamoto and H. Yamamoto
|
IEICE Trans. Fundamentals
|
E85-A/ 10, 2238-2247
|
2002/10/01
|
|
|
|
27 |
一般論文
|
有
|
An analytic construction of the visual secret sharing scheme for color images
|
共著
|
H. Koga, M. Iwamoto and H. Yamamoto
|
IEICE Trans. Fundamentals
|
E84-A/ 1, 262-272
|
2001/01/01
|
|
|
|
28 |
国際会議プロシーディングス等
|
有
|
Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage
|
共著
|
Y. Watanabe, K. Ohara, M. Iwamoto, and K. Ohta
|
ACM CODASPY 2022
|
-/ -, 312-323
|
2022/04/24
|
|
10.1145/3508398.3511521
|
|
29 |
国際会議プロシーディングス等
|
有
|
How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs
|
共著
|
Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta,
|
International Symposium on Information Theory and Its Applications (ISITA2020)
|
-/ -, 377-381
|
2020/10/24
|
|
|
|
30 |
国際会議プロシーディングス等
|
有
|
A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule
|
共著
|
Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto Kazuo Sakiyama, and Kazuo Ohta,
|
International Symposium on Information Theory and Its Applications (ISITA2020)
|
-/ -, 382-386
|
2020/10/24
|
|
|
|
31 |
国際会議プロシーディングス等
|
有
|
Efficient Private PEZ Protocols for Symmetric Functions
|
共著
|
Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta
|
Theory of Cryptography Conference
|
LNCS11891, 372-392
|
2019/12/01
|
|
|
|
32 |
国際会議プロシーディングス等
|
有
|
Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes
|
共著
|
R. Eriguchi, M. Iwamoto, and N. Kunihiro
|
IEEE International Symposium on Information Theory
|
3047-3051
|
2019/07
|
|
|
|
33 |
国際会議プロシーディングス等
|
有
|
An Abstraction Model for 1-bit Probing Attack on Block Ciphers
|
共著
|
An Abstraction Model for 1-bit Probing Attack on Block Ciphers
|
International Conference on Computer and Communication Systems
|
-/ -, 502-506
|
2019
|
|
|
|
34 |
国際会議プロシーディングス等
|
有
|
Card-Based Majority Voting Protocols with Three Inputs Using Three Cards
|
共著
|
Yohei Watanabe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, and Kazuo Ohta
|
Proc. of International Symposium on Information Theory and Its Applications
|
218-222
|
2018/10/20
|
|
10.23919/ISITA.2018.8664324
|
|
35 |
国際会議プロシーディングス等
|
有
|
Worst-case guessing secrecy is meaningful in secret sharing schemes
|
単著
|
M. Iwamoto
|
ICITS2017
|
workshop track
|
2017/12
|
|
|
|
36 |
国際会議プロシーディングス等
|
有
|
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations
|
共著
|
T. Nakai, S. Shirouchi, M. Iwamoto and K. Ohta
|
ICITS2017
|
LNCS 10681, 153-165
|
2017/11
|
|
|
|
37 |
国際会議プロシーディングス等
|
有
|
Efficient Card-based Cryptographic Protocols for Millionaires’ Problem Utilizing Private Permutations
|
共著
|
T. Nakai, Y. Misawa, Y. Tokushige, M. Iwamoto, and K. Ohta
|
CANS2016
|
350-364
|
2016/11
|
|
|
|
38 |
国際会議プロシーディングス等
|
有
|
Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption
|
共著
|
K. Hayasaka, Y. Kawai, Y. Koseki, T. Hirano, K. Ohta, and M. Iwamoto
|
CANS2016
|
500-517
|
2016/11
|
|
|
|
39 |
国際会議プロシーディングス等
|
有
|
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes
|
共著
|
T. Hirano, M. Hattori, Y. Kawai, N. Matsuda, M. Iwamoto, K. Ohta, Y. Sakai, and T. Munaka
|
IWSEC2016
|
LNCS 9836, 91-110
|
2016/09
|
|
|
|
40 |
国際会議プロシーディングス等
|
有
|
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants
|
共著
|
R. Yashiro, T. Machida, M. Iwamoto, and K. Sakiyama
|
IWSEC2016
|
LNCS 9836, 267-285
|
2016/09
|
|
|
|
41 |
国際会議プロシーディングス等
|
有
|
Application of Joux-Lucks Search Algorithm for Multi-Collisions to MicroMint
|
共著
|
Y. Kamoshida, M. Iwamoto
|
IWSEC2016
|
poster session
|
2016/09
|
|
|
|
42 |
国際会議プロシーディングス等
|
有
|
Implementation of Double Arbiter PUF and Its Performance Evaluation on FPGA
|
共著
|
T. Machida, D. Yamamoto, M. Iwamoto, and K. Sakiyama
|
20th Asia and South Pacific Design Automation Conference (ASP-DAC 2015)
|
6-7
|
2015/01
|
|
|
|
43 |
国際会議プロシーディングス等
|
有
|
Construction of symmetric-key encryption with guessing secrecy
|
共著
|
M. Iwamoto and J. Shikata
|
IEEE International Symposium on Information Theory
|
725-729
|
2015/06
|
|
|
|
44 |
国際会議プロシーディングス等
|
有
|
Comparison of Security on Coded Signs with Public/Private Code Book
|
共著
|
Y. Misawa, Y. Tokushige, M. Iwamoto and K. Ohta
|
International Workshop on Information Security and Crytptograohy
|
poster session
|
2015/08
|
|
|
|
45 |
国際会議プロシーディングス等
|
有
|
Toward Reducing Shuffling in Card-based Cryptographic Protocol for Millionaire Problem
|
共著
|
T. Nakai, Y. Tokushige, M. Iwamoto and K. Ohta
|
International Workshop on Information Security and Crytptograohy
|
poster session
|
2015/08
|
|
|
|
46 |
国際会議プロシーディングス等
|
有
|
An Automated Evaluation Tool for Improved Rebound Attack: New ShiftBytes Parameters for Grøstl
|
共著
|
Y. Sasaki, Y. Tokushige, L. Wang, M. Iwamoto, and K. Ohta,
|
CT-RSA2014
|
LNCS 8366, 424-443
|
2014/02
|
|
|
|
47 |
国際会議プロシーディングス等
|
有
|
Privacy-Preserving Smart Metering with Verifiability for Both Billing and Energy Management
|
共著
|
K. Ohara, Y. Sakai, F. Yoshida, M. Iwamoto, and K. Ohta
|
|
23-32
|
2014/06
|
|
|
|
48 |
国際会議プロシーディングス等
|
有
|
Secret Sharing Schemes Based on Min-entropies
|
共著
|
M.Iwamoto and J.Shikata
|
IEEE International Symposium on Information Theory
|
401-405
|
2014/07
|
|
|
|
49 |
国際会議プロシーディングス等
|
有
|
A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA
|
共著
|
T.Machida, D.Yamamoto, M.Iwamoto, and K.Sakiyama
|
1st Workshop on Emerging Aspects in Information Security (EAIS'14)
|
877-884
|
2014/09
|
|
|
|
50 |
国際会議プロシーディングス等
|
有
|
Cheating on a Visual Secret Sharing Scheme under a Realistic Scenario
|
共著
|
P. Lumyong, M. Iwamoto, and K. Ohta
|
International symposium on information theory and its applications (ISITA)
|
546-550
|
2014/10
|
|
|
|
51 |
国際会議プロシーディングス等
|
有
|
A New Model of Client--Server Communications under Information Theoretic Security
|
共著
|
M. Iwamoto, T. Omino, Y. Komano, and K. Ohta
|
IEEE Information Thoery Workshop 2014
|
512-516
|
2014/11
|
|
|
|
52 |
国際会議プロシーディングス等
|
有
|
Secure (M + 1)st-Price Auction with Automatic Tie-Break (to appear)
|
共著
|
T. Nishide, M. Iwamoto, A. Iwasaki, and K. Ohta,
|
InTrust2014
|
LNCS 9473, 422-436
|
2014/12
|
|
|
|
53 |
国際会議プロシーディングス等
|
有
|
Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL
|
共著
|
Y. Sasaki, W. Komatsubara, Y. Sakai, L. Wang, M. Iwamoto, K Sakiyama and K. Ohta
|
SECRYPT
|
111-122
|
2013/07
|
|
|
|
54 |
国際会議プロシーディングス等
|
有
|
A New Model of Modeling Attacks against Arbiter PUF on FPGA
|
共著
|
T. Machida, T. Nakasone, M. Iwamoto, and K. Sakiyama
|
International Workshop on Information Security and Crytptograohy
|
poster session
|
2013
|
|
|
|
55 |
国際会議プロシーディングス等
|
有
|
Information theoretic security for encryption based on conditional Rényi entropies
|
共著
|
M.Iwamoto and J.Shikata
|
International Conference on Information Theoretic Security (ICITS)
|
LNSC8317, 101-121
|
2013/11
|
|
|
|
56 |
国際会議プロシーディングス等
|
有
|
Limited-birthday distinguishers for hash functions---collisions beyond the birthday bound can be meaningful
|
共著
|
M.Iwamoto, T.Peyrin, and Y.Sasaki
|
ASIACRYPT2013
|
LNCS8269, 505-523
|
2013/12
|
|
|
|
57 |
国際会議プロシーディングス等
|
有
|
A t-resilient Unconditionally Secure First-Price Auction Protocol
|
共著
|
K.Ohara, Y.Sakai, M.Iwamoto, and K.Ohta
|
International Workshop on Information Security and Crytptograohy
|
poster session
|
2012/11
|
|
|
|
58 |
国際会議プロシーディングス等
|
有
|
Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher
|
共著
|
T. Nakasone, Y. Li, Y. Sasaki, M. Iwamoto, K. Ohta, and K. Sakiyama
|
Proc. of International Conference on Information Security and Cryptography
|
LNCS7839, 395-409
|
2012/12
|
|
|
|
59 |
国際会議プロシーディングス等
|
有
|
Unique- ness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
|
共著
|
D. Yamamoto, K. Sakiyama, M. Iwamoto, K. Ohta, T. Ochiai, M. Takenaka, and K. Itoh
|
Proceedings of CHES2011
|
LNCS6197, 391-406
|
2011/10
|
|
|
|
60 |
国際会議プロシーディングス等
|
有
|
Security Notions for Information Theoretically Secure Encrynotions
|
共著
|
Mitsugu Iwamoto, Kazuo Ohta
|
IEEE International Symposium on Information Theory
|
1743-1747
|
2011/08
|
|
|
|
61 |
国際会議プロシーディングス等
|
有
|
Variations of Information Theoretic Security Notions
|
共著
|
M. Iwamoto and K. Ohta
|
Asian-Europian Workshop on Information Theory (AEW)
|
73-77
|
2011/07
|
|
|
|
62 |
国際会議プロシーディングス等
|
有
|
Security Notions for Information Theoretically Secure Encryptions
|
共著
|
M. Iwamoto and K. Ohta
|
IEEE International Symposium on Information Theory
|
1743-1747
|
2011/07
|
|
|
|
63 |
国際会議プロシーディングス等
|
有
|
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
|
共著
|
D.Yamamoto, K.Sakiyama, M.Iwamoto, K.Ohta, T.Ochiai, M.Takenaka, and K.Itoh
|
|
LNCS6917, 396-406
|
2011/10
|
|
|
|
64 |
国際会議プロシーディングス等
|
有
|
Visual Secret Sharing Schemes for Multiple Secret Images Including Shifting Operation of Shares
|
共著
|
A. Espejel-Trujillo, M. Nakano-Miyatake, M. Iwamoto
|
Proc. of 6th International Conference on Electrical Engineering, Computing Science and Automatic Control
|
??-??
|
2009/11
|
|
|
|
65 |
国際会議プロシーディングス等
|
有
|
Coding Theorems for a (2,2)-Threshold Scheme Secure against Impersonation by an Opponent
|
共著
|
H. Koga, M. Iwamoto, H. Yamamoto
|
IEEE Information Thoery Workshop 2009
|
188-192
|
2009/10
|
|
|
|
66 |
国際会議プロシーディングス等
|
有
|
A Coding Theorem for Cheating-Detectable (2, 2)-Threshold Blockwise Secret Sharing Schemes
|
共著
|
Mitsugu Iwamoto, Hirosuke Yamamoto, Hiroki Koga
|
IEEE International Symposium on Information Theory
|
1308-1312
|
2009/06
|
|
|
|
67 |
国際会議プロシーディングス等
|
有
|
Weakly Secure Visual Secret Sharing Schemes
|
単著
|
Mitsugu Iwamoto
|
International symposium on information theory and its applications (ISITA)
|
42-47
|
2008/12
|
|
|
|
68 |
国際会議プロシーディングス等
|
無
|
A Remark on Visual Secret Sharing Schemes Allowing the Rotation of Shares
|
共著
|
M. Iwamoto, L. Wang, K. Yoneyama, N. Kunihiro, K. Ohta
|
5th Asia-Europe workshop on information theory
|
37-42
|
2006/10
|
|
|
|
69 |
国際会議プロシーディングス等
|
有
|
Strongly secure ramp secret sharing schemes
|
共著
|
Mitsugu Iwamoto, Hirosuke Yamamoto
|
IEEE International Symposium on Information Theory
|
1221-1225
|
2005/09
|
|
|
|
70 |
国際会議プロシーディングス等
|
有
|
Optimal Multiple Assignments based on Integer Programming in Secret Sharing Schemes
|
共著
|
Mitsugu Iwmaoto, Hirosuke Yamamoto, Hirohisa Ogawa
|
Proc. of IEEE International Symposium on Information Theory
|
16-16
|
2004/06
|
|
|
|
71 |
国際会議プロシーディングス等
|
有
|
Quantum Secret Sharing Schemes and Reversibility of Quantum Operations
|
共著
|
Tomohiro Ogawa, Akira Sasaki, Mitsugu Iwamoto, Hirosuke Yamamoto
|
Proceeding of international symposium on information theory and its applications
|
1440-1445
|
2004/10
|
|
|
|
72 |
国際会議プロシーディングス等
|
有
|
A construction method of visual secret sharing scheme with plural secret images
|
共著
|
Mitsugu Iwamoto, Hirouske Yamamoto
|
Proc. of IEEE international symposium on information theory
|
283-283
|
2003
|
|
|
|
73 |
国際会議プロシーディングス等
|
有
|
Cache line impact on 3D PDE solvers
|
共著
|
Masaaki Kondo, Mitsugu Iwamoto, Hiroshi Nakamura
|
ISHPC 2002, Springer Verlag (LNCS 2327)
|
LNCS 2327, 301-309
|
2001
|
|
|
|