Follow
Mitsugu Iwamoto
Title
Cited by
Cited by
Year
Information-theoretic approach to optimal differential fault analysis
K Sakiyama, Y Li, M Iwamoto, K Ohta
IEEE Transactions on Information Forensics and Security 7 (1), 109-120, 2011
812011
Information theoretic security for encryption based on conditional Rényi entropies
M Iwamoto, J Shikata
International Conference on Information Theoretic Security, 103-121, 2013
732013
The optimal n-out-of-n visual secret sharing scheme for gray-scale images
M Iwamoto, H Yamamoto
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2002
722002
A new mode of operation for arbiter PUF to improve uniqueness on FPGA
T Machida, D Yamamoto, M Iwamoto, K Sakiyama
2014 Federated Conference on Computer Science and Information Systems, 871-878, 2014
682014
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches
D Yamamoto, K Sakiyama, M Iwamoto, K Ohta, T Ochiai, M Takenaka, ...
International Workshop on Cryptographic Hardware and Embedded Systems, 390-406, 2011
602011
A new arbiter PUF for enhancing unpredictability on FPGA
T Machida, D Yamamoto, M Iwamoto, K Sakiyama
The Scientific World Journal 2015, 2015
592015
An analytic construction of the visual secret sharing scheme for color images
H Koga, M Iwamoto, H Yamamoto
IEICE transactions on fundamentals of electronics, communications and …, 2001
542001
Implementation of double arbiter PUF and its performance evaluation on FPGA
T Machida, D Yamamoto, M Iwamoto, K Sakiyama
The 20th Asia and South Pacific Design Automation Conference, 6-7, 2015
532015
Quantum secret sharing schemes and reversibility of quantum operations
T Ogawa, A Sasaki, M Iwamoto, H Yamamoto
Physical review A 72 (3), 032318, 2005
532005
Strongly secure ramp secret sharing schemes for general access structures
M Iwamoto, H Yamamoto
Information Processing Letters 97 (2), 52-57, 2006
432006
Variety enhancement of PUF responses using the locations of random outputting RS latches
D Yamamoto, K Sakiyama, M Iwamoto, K Ohta, M Takenaka, K Itoh
Journal of Cryptographic Engineering 3 (4), 197-211, 2013
402013
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
M Iwamoto, H Yamamoto, H Ogawa
IEICE transactions on fundamentals of electronics, communications and …, 2007
392007
Efficient card-based cryptographic protocols for millionaires’ problem utilizing private permutations
T Nakai, Y Tokushige, Y Misawa, M Iwamoto, K Ohta
International Conference on Cryptology and Network Security, 500-517, 2016
362016
Deep-learning-based security evaluation on authentication systems using arbiter PUF and its variants
R Yashiro, T Machida, M Iwamoto, K Sakiyama
International Workshop on Security, 267-285, 2016
342016
A weak security notion for visual secret sharing schemes
M Iwamoto
IEEE Transactions on Information Forensics and Security 7 (2), 372-382, 2011
332011
A construction method of visual secret sharing schemes for plural secret images
M Iwamoto, H Yamamoto
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2003
332003
Limited-birthday distinguishers for hash functions
M Iwamoto, T Peyrin, Y Sasaki
International Conference on the Theory and Application of Cryptology and …, 2013
312013
Privacy-preserving smart metering with verifiability for both billing and energy management
K Ohara, Y Sakai, F Yoshida, M Iwamoto, K Ohta
Proceedings of the 2nd ACM workshop on ASIA public-key cryptography, 23-32, 2014
282014
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations
T Nakai, S Shirouchi, M Iwamoto, K Ohta
International Conference on Information Theoretic Security, 153-165, 2017
272017
Advances in Cryptology--ASIACRYPT 2013: 19th International Conference on the Theory and Application of Cryptology and Information, Bengaluru, India, December 1-5, 2013 …
K Sako, P Sarkar
Springer, 2013
262013
The system can't perform the operation now. Try again later.
Articles 1–20