Published papers
Number of published data : 65
No. Classification Refereed paper Title Authorship Author Journal Volume/issue/page Publication date ISSN DOI URL
1 Paper
Yes
How to Solve Millionaires' Problem with Two Kinds of Cards
Joint
Takeshi Nakai, Yuto Misawa, Yuuki Tokushige, Mitsugu Iwamoto, and Kazuo Ohta
New Generation Computing
39/ 1, 73-96
2021/01/05



2 Paper
Yes
An IC-level countermeasure against laser fault injection attack by information leakage sensing based on laser-induced opto-electric bulk current density
Joint
K. Matsuda, S. Tada, M. Nagata, Y. Komano, Y. Li, T. Sugawara, M. Iwamoto, K. Ohta, K. Sakiyama, and N. Miura
Jpn. J. Appl. Phys. 59
59/ SG, SGGL02-1-SGGL02-12
2020/02/28

10.7567/1347-4065/ab65d3

3 Paper
Yes
Multi-Party Computation for Modular Exponentiation based on Replicated Secret Sharing
Joint
K. Ohara, Y. Watanabe, M. Iwamoto, and K. Ohta
IEICE Trans. on Fundamentals
E102.A/ 9, 1079-1090
2019/09/01



4 Paper
Yes
Single-Round Pattern Matching Key Generation Using Physically Unclonable Function
Joint
Y. Komano, K. Ohta, K. Sakiyama, M. Iwamoto, and I. Verbauwhede
Security and Communication Networks
2019/ 1719585
2019

https://doi.org/10.1155/2019/1719585

5 Paper
Yes
A Proactive Secret Image Sharing Scheme with Resistance to Machine Learning Based Steganalysis
Joint
A. Espejel-Trujillo, M. Iwamoto, and M. Nakano-Miyatake,
Multimedia Tools And Applications
77/ 12, 15161-15179
2018/06/01



6 Paper
Yes
Q-class Authentication System for Double Arbiter PUF
Joint
R. Yashiro, T. Sugawara, M. Iwamoto, and K. Sakiyama
IEICE Trans. Fundamentals
E101-A/ 1, 129-137
2018/01/01



7 Paper
Yes
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
Joint
 M. Iwamoto, K. Ohta, and J. Shikata
IEEE Transactions on Information Theory
64/ 1, 654-685
2018/01/01



8 Paper
Yes
A new method for enhancing variety and maintaining reliability of PUF responses and its evaluation on ASICs
Joint
D. Yamamoto, K. Sakiyama, M. Iwamoto, K. Ohta, M. Takenaka, K. Itoh, and N. Torii
Journal of Cryptographic Engineering
5/ 3, 187-199
2015



9 Paper
Yes
A New Arbiter PUF for Enhancing Unpredictability on FPGA
Joint
Takanori Machida, Dai Yamamoto, Mitsugu Iwamoto and Kazuo Sakiyama
The Scientific World Journal
2015, 864812-
2015

http://dx.doi.org/10.1155/2015/864812

10 Paper
Yes
Practical DFA Strategy for AES Under Limited-Access Conditions
Joint
K. Sakiyama, Y. Li, S. Gomisawa, Y. Hayashi, M. Iwamoto, N. Homma, T. Aoki, and K. Ohta,
Journal of Information Processing
55/ 2, 142-151
2014



11 Paper
Yes
クロック間衝突を漏洩モデルとする新たなサイドチャネル解析と並列実装AES暗号ハードウェアにおける弱い鍵
Joint
Toshiki Nakasone Yang Li, Mitsugu Iwamoto, Kazuo Ohta, and Kazuo Sakiyama
IEICE Trans. JA
J97-A/ 11, 695-703
2014/11



12 Tutorial
Yes
Threshold Based Visual Cryptography: A Tutorial Review

M. Nakano, E. Escamilla, H. Perez, and M. Iwamoto
Informacion Tecnologica
22/ 5, 107-120
2011



13 Paper
Yes
Variety enhancement of PUF responses using the locations of random outputting RS latches
Joint
D. Yamamoto, K. Sakiyama, M. Iwamoto, K. Ohta, M. Takenaka, and K. Itoh
Journal of Cryptographic Engineering
3/ 4, 197-211
2013



14 Paper
Yes
Information-Theoretic Approach to Optimal Differ- ential Fault Analysis
Joint
Kazuo Sakiyama, Yang Li, Mitsugu Iwamoto, Kazuo Ohta
IEEE Trans. on Information Forensics and Security
7/ 1, 109-120
2012/01



15 Paper
Yes
A weak security notion for visual secret sharing schemes
Only
Mitsugu Iwamoto
IEEE Trans. on Information Forensics and Security
7/ 2, 372-382
2012/02



16 Paper
Yes
A cheating prevention EVC scheme using watermarking techniques
Joint
A. E. Torujillo, M. N. Miyatake, M. Iwamoto, and H. P. Maena
Revista Facultad de Ingeniera, Univ. Antioquia
63, 30-42
2012/06



17 Paper
Yes
Coding theorems for a (2,2)-threshold scheme with detectability of impersonation attacks
Joint
M. Iwamoto, H. Koga, and H. Yamamoto
IEEE Trans. Information Theory
59/ 9, 6194-6206
2012/09



18 Paper
Yes
Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures
Joint
M. Iwamoto, H. Yamamoto, H. Ogawa
IEICE Transactions on Fundamentals
E90-A/ 1, 101-112
2007/01



19 Paper
Yes
Strongly secure ramp secret sharing schemes for general access structures
Joint
Mitsugu Iwamoto, Hirusoke Yamamoto
Information Processing Letters
97/ 2, 52-57
2006/01



20 Paper
Yes
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Only
Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta
IEICE Transactions on Fundamentals
E89-A/ 5, 387-402
2006/05



21 Paper
Yes
Quantum Secret Sharing Schemes and Reversibility of Quantum Oerations
Joint
Tomohiro Ogawa, Akira Sasaki, Mitsugu Iwamoto, Hirosuke Yamamoto
Physical Review A
72, 032318-
2005



22 International conference proceedings, etc.
Yes
How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs
Joint
Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta,
International Symposium on Information Theory and Its Applications (ISITA2020)
-/ -, 377-381
2020/10/24



23 International conference proceedings, etc.
Yes
A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule
Joint
Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto Kazuo Sakiyama, and Kazuo Ohta,
International Symposium on Information Theory and Its Applications (ISITA2020)
-/ -, 382-386
2020/10/24



24 International conference proceedings, etc.
Yes
Efficient Private PEZ Protocols for Symmetric Functions
Joint
Yoshiki Abe, Mitsugu Iwamoto, and Kazuo Ohta
Theory of Cryptography Conference
LNCS11891, 372-392
2019/12/01



25 International conference proceedings, etc.
Yes
Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes
Joint
R. Eriguchi, M. Iwamoto, and N. Kunihiro
IEEE International Symposium on Information Theory
3047-3051
2019/07



26 International conference proceedings, etc.
Yes
Card-Based Majority Voting Protocols with Three Inputs Using Three Cards
Joint
Yohei Watanabe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, and Kazuo Ohta
Proc. of International Symposium on Information Theory and Its Applications
218-222
2018/10/20

10.23919/ISITA.2018.8664324

27 International conference proceedings, etc.
Yes
Worst-case guessing secrecy is meaningful in secret sharing schemes
Only
M. Iwamoto
ICITS2017
workshop track
2017/12



28 International conference proceedings, etc.
Yes
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations
Joint
T. Nakai, S. Shirouchi, M. Iwamoto and K. Ohta
ICITS2017
LNCS 10681, 153-165
2017/11



29 International conference proceedings, etc.
Yes
Efficient Card-based Cryptographic Protocols for Millionaires’ Problem Utilizing Private Permutations
Joint
T. Nakai, Y. Misawa, Y. Tokushige, M. Iwamoto, and K. Ohta
CANS2016
350-364
2016/11



30 International conference proceedings, etc.
Yes
Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption
Joint
K. Hayasaka, Y. Kawai, Y. Koseki, T. Hirano, K. Ohta, and M. Iwamoto
CANS2016
500-517
2016/11



31 International conference proceedings, etc.
Yes
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes
Joint
T. Hirano, M. Hattori, Y. Kawai, N. Matsuda, M. Iwamoto, K. Ohta, Y. Sakai, and T. Munaka
IWSEC2016
LNCS 9836, 91-110
2016/09



32 International conference proceedings, etc.
Yes
Deep-Learning-Based Security Evaluation on Authentication Systems Using Arbiter PUF and Its Variants
Joint
R. Yashiro, T. Machida, M. Iwamoto, and K. Sakiyama
IWSEC2016
LNCS 9836, 267-285
2016/09



33 International conference proceedings, etc.
Yes
Application of Joux-Lucks Search Algorithm for Multi-Collisions to MicroMint
Joint
Y. Kamoshida, M. Iwamoto
IWSEC2016
poster session
2016/09



34 International conference proceedings, etc.
Yes
Implementation of Double Arbiter PUF and Its Performance Evaluation on FPGA
Joint
T. Machida, D. Yamamoto, M. Iwamoto, and K. Sakiyama
20th Asia and South Pacific Design Automation Conference (ASP-DAC 2015)
6-7
2015/01



35 International conference proceedings, etc.
Yes
Construction of symmetric-key encryption with guessing secrecy
Joint
M. Iwamoto and J. Shikata
IEEE International Symposium on Information Theory
725-729
2015/06



36 International conference proceedings, etc.
Yes
Comparison of Security on Coded Signs with Public/Private Code Book
Joint
Y. Misawa, Y. Tokushige, M. Iwamoto and K. Ohta
International Workshop on Information Security and Crytptograohy
poster session
2015/08



37 International conference proceedings, etc.
Yes
Toward Reducing Shuffling in Card-based Cryptographic Protocol for Millionaire Problem
Joint
T. Nakai, Y. Tokushige, M. Iwamoto and K. Ohta
International Workshop on Information Security and Crytptograohy
poster session
2015/08



38 International conference proceedings, etc.
Yes
An Automated Evaluation Tool for Improved Rebound Attack: New ShiftBytes Parameters for Grøstl
Joint
Y. Sasaki, Y. Tokushige, L. Wang, M. Iwamoto, and K. Ohta,
CT-RSA2014
LNCS 8366, 424-443
2014/02



39 International conference proceedings, etc.
Yes
Privacy-Preserving Smart Metering with Verifiability for Both Billing and Energy Management
Joint
K. Ohara, Y. Sakai, F. Yoshida, M. Iwamoto, and K. Ohta

23-32
2014/06



40 International conference proceedings, etc.
Yes
Secret Sharing Schemes Based on Min-entropies
Joint
M.Iwamoto and J.Shikata
IEEE International Symposium on Information Theory
401-405
2014/07



41 International conference proceedings, etc.
Yes
A New Mode of Operation for Arbiter PUF to Improve Uniqueness on FPGA
Joint
T.Machida, D.Yamamoto, M.Iwamoto, and K.Sakiyama
1st Workshop on Emerging Aspects in Information Security (EAIS'14)
877-884
2014/09



42 International conference proceedings, etc.
Yes
Cheating on a Visual Secret Sharing Scheme under a Realistic Scenario
Joint
P. Lumyong, M. Iwamoto, and K. Ohta
International symposium on information theory and its applications (ISITA)
546-550
2014/10



43 International conference proceedings, etc.
Yes
A New Model of Client--Server Communications under Information Theoretic Security
Joint
M. Iwamoto, T. Omino, Y. Komano, and K. Ohta
IEEE Information Thoery Workshop 2014
512-516
2014/11



44 International conference proceedings, etc.
Yes
Secure (M + 1)st-Price Auction with Automatic Tie-Break (to appear)
Joint
T. Nishide, M. Iwamoto, A. Iwasaki, and K. Ohta,
InTrust2014
LNCS 9473, 422-436
2014/12



45 International conference proceedings, etc.
Yes
Meet-in-the-Middle Preimage Attacks Revisited: New Results on MD5 and HAVAL
Joint
Y. Sasaki, W. Komatsubara, Y. Sakai, L. Wang, M. Iwamoto, K Sakiyama and K. Ohta
SECRYPT
111-122
2013/07



46 International conference proceedings, etc.
Yes
A New Model of Modeling Attacks against Arbiter PUF on FPGA
Joint
T. Machida, T. Nakasone, M. Iwamoto, and K. Sakiyama
International Workshop on Information Security and Crytptograohy
poster session
2013



47 International conference proceedings, etc.
Yes
Information theoretic security for encryption based on conditional Rényi entropies
Joint
M.Iwamoto and J.Shikata
International Conference on Information Theoretic Security (ICITS)
LNSC8317, 101-121
2013/11



48 International conference proceedings, etc.
Yes
Limited-birthday distinguishers for hash functions---collisions beyond the birthday bound can be meaningful
Joint
M.Iwamoto, T.Peyrin, and Y.Sasaki
ASIACRYPT2013
LNCS8269, 505-523
2013/12



49 International conference proceedings, etc.
Yes
A t-resilient Unconditionally Secure First-Price Auction Protocol
Joint
K.Ohara, Y.Sakai, M.Iwamoto, and K.Ohta
International Workshop on Information Security and Crytptograohy
poster session
2012/11



50 International conference proceedings, etc.
Yes
Key-Dependent Weakness of AES-Based Ciphers Under Clockwise Collision Distinguisher
Joint
T. Nakasone, Y. Li, Y. Sasaki, M. Iwamoto, K. Ohta, and K. Sakiyama
Proc. of International Conference on Information Security and Cryptography
LNCS7839, 395-409
2012/12



51 International conference proceedings, etc.
Yes
Unique- ness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
Joint
D. Yamamoto, K. Sakiyama, M. Iwamoto, K. Ohta, T. Ochiai, M. Takenaka, and K. Itoh
Proceedings of CHES2011
LNCS6197, 391-406
2011/10



52 International conference proceedings, etc.
Yes
Security Notions for Information Theoretically Secure Encrynotions
Joint
Mitsugu Iwamoto, Kazuo Ohta
IEEE International Symposium on Information Theory
1743-1747
2011/08



53 International conference proceedings, etc.
Yes
Variations of Information Theoretic Security Notions
Joint
M. Iwamoto and K. Ohta
Asian-Europian Workshop on Information Theory (AEW)
73-77
2011/07



54 International conference proceedings, etc.
Yes
Security Notions for Information Theoretically Secure Encryptions
Joint
M. Iwamoto and K. Ohta
IEEE International Symposium on Information Theory
1743-1747
2011/07



55 International conference proceedings, etc.
Yes
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches
Joint
D.Yamamoto, K.Sakiyama, M.Iwamoto, K.Ohta, T.Ochiai, M.Takenaka, and K.Itoh

LNCS6917, 396-406
2011/10



56 International conference proceedings, etc.
Yes
Visual Secret Sharing Schemes for Multiple Secret Images Including Shifting Operation of Shares
Joint
A. Espejel-Trujillo, M. Nakano-Miyatake, M. Iwamoto
Proc. of 6th International Conference on Electrical Engineering, Computing Science and Automatic Control
??-??
2009/11



57 International conference proceedings, etc.
Yes
Coding Theorems for a (2,2)-Threshold Scheme Secure against Impersonation by an Opponent
Joint
H. Koga, M. Iwamoto, H. Yamamoto
IEEE Information Thoery Workshop 2009
188-192
2009/10



58 International conference proceedings, etc.
Yes
A Coding Theorem for Cheating-Detectable (2, 2)-Threshold Blockwise Secret Sharing Schemes
Joint
Mitsugu Iwamoto, Hirosuke Yamamoto, Hiroki Koga
IEEE International Symposium on Information Theory
1308-1312
2009/06



59 International conference proceedings, etc.
Yes
Weakly Secure Visual Secret Sharing Schemes
Only
Mitsugu Iwamoto
International symposium on information theory and its applications (ISITA)
42-47
2008/12



60 International conference proceedings, etc.
No
A Remark on Visual Secret Sharing Schemes Allowing the Rotation of Shares
Joint
M. Iwamoto, L. Wang, K. Yoneyama, N. Kunihiro, K. Ohta
5th Asia-Europe workshop on information theory
37-42
2006/10



61 International conference proceedings, etc.
Yes
Strongly secure ramp secret sharing schemes
Joint
Mitsugu Iwamoto, Hirosuke Yamamoto
IEEE International Symposium on Information Theory
1221-1225
2005/09



62 International conference proceedings, etc.
Yes
Optimal Multiple Assignments based on Integer Programming in Secret Sharing Schemes
Joint
Mitsugu Iwmaoto, Hirosuke Yamamoto, Hirohisa Ogawa
Proc. of IEEE International Symposium on Information Theory
16-16
2004/06



63 International conference proceedings, etc.
Yes
Quantum Secret Sharing Schemes and Reversibility of Quantum Operations
Joint
Tomohiro Ogawa, Akira Sasaki, Mitsugu Iwamoto, Hirosuke Yamamoto
Proceeding of international symposium on information theory and its applications
1440-1445
2004/10



64 International conference proceedings, etc.
Yes
A construction method of visual secret sharing scheme with plural secret images
Joint
Mitsugu Iwamoto, Hirouske Yamamoto
Proc. of IEEE international symposium on information theory
283-283
2003



65 International conference proceedings, etc.
Yes
Cache line impact on 3D PDE solvers
Joint
Masaaki Kondo, Mitsugu Iwamoto, Hiroshi Nakamura
ISHPC 2002, Springer Verlag (LNCS 2327)
LNCS 2327, 301-309
2001