Follow
Mitsugu Iwamoto
Title
Cited by
Cited by
Year
A new arbiter PUF for enhancing unpredictability on FPGA
T Machida, D Yamamoto, M Iwamoto, K Sakiyama
The Scientific World Journal 2015 (1), 864812, 2015
952015
Information-theoretic approach to optimal differential fault analysis
K Sakiyama, Y Li, M Iwamoto, K Ohta
IEEE Transactions on Information Forensics and Security 7 (1), 109-120, 2011
892011
Information theoretic security for encryption based on conditional Rényi entropies
M Iwamoto, J Shikata
Information Theoretic Security: 7th International Conference, ICITS 2013 …, 2014
822014
A new mode of operation for arbiter PUF to improve uniqueness on FPGA
T Machida, D Yamamoto, M Iwamoto, K Sakiyama
2014 Federated Conference on Computer Science and Information Systems, 871-878, 2014
802014
The Optimal n-out-of-n Visual Secret Sharing Scheme for Gray-Scale Images
M Iwamoto, H Yamamoto
IEICE transactions on fundamentals of electronics, communications and …, 2002
742002
Uniqueness enhancement of PUF responses based on the locations of random outputting RS latches
D Yamamoto, K Sakiyama, M Iwamoto, K Ohta, T Ochiai, M Takenaka, ...
Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011
712011
Implementation of double arbiter PUF and its performance evaluation on FPGA
T Machida, D Yamamoto, M Iwamoto, K Sakiyama
The 20th Asia and South Pacific Design Automation Conference, 6-7, 2015
642015
Quantum secret sharing schemes and reversibility of quantum operations
T Ogawa, A Sasaki, M Iwamoto, H Yamamoto
Physical Review A—Atomic, Molecular, and Optical Physics 72 (3), 032318, 2005
572005
Efficient card-based cryptographic protocols for millionaires’ problem utilizing private permutations
T Nakai, Y Tokushige, Y Misawa, M Iwamoto, K Ohta
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
542016
An analytic construction of the visual secret sharing scheme for color images
H Koga, M Iwamoto, H Yamamoto
IEICE transactions on fundamentals of electronics, communications and …, 2001
542001
Variety enhancement of PUF responses using the locations of random outputting RS latches
D Yamamoto, K Sakiyama, M Iwamoto, K Ohta, M Takenaka, K Itoh
Journal of Cryptographic Engineering 3 (4), 197-211, 2013
522013
Strongly secure ramp secret sharing schemes for general access structures
M Iwamoto, H Yamamoto
Information Processing Letters 97 (2), 52-57, 2006
512006
Optimal multiple assignments based on integer programming in secret sharing schemes with general access structures
M Iwamoto, H Yamamoto, H Ogawa
IEICE transactions on fundamentals of electronics, communications and …, 2007
452007
A weak security notion for visual secret sharing schemes
M Iwamoto
IEEE Transactions on Information Forensics and Security 7 (2), 372-382, 2011
432011
Deep-learning-based security evaluation on authentication systems using arbiter PUF and its variants
R Yashiro, T Machida, M Iwamoto, K Sakiyama
Advances in Information and Computer Security: 11th International Workshop …, 2016
392016
Limited-birthday distinguishers for hash functions: Collisions beyond the birthday bound can be meaningful
M Iwamoto, T Peyrin, Y Sasaki
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
392013
A construction method of visual secret sharing schemes for plural secret images
M Iwamoto, H Yamamoto
IEICE transactions on fundamentals of electronics, communications and …, 2003
352003
How to solve millionaires’ problem with two kinds of cards
T Nakai, Y Misawa, Y Tokushige, M Iwamoto, K Ohta
New Generation Computing 39, 73-96, 2021
342021
Card-based majority voting protocols with three inputs using three cards
Y Watanabe, Y Kuroki, S Suzuki, Y Koga, M Iwamoto, K Ohta
2018 International Symposium on Information Theory and Its Applications …, 2018
332018
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations
T Nakai, S Shirouchi, M Iwamoto, K Ohta
Information Theoretic Security: 10th International Conference, ICITS 2017 …, 2017
332017
The system can't perform the operation now. Try again later.
Articles 1–20