Daisuke Moriyama

Learn More
This paper presents the first formalization of partial key leakage security of a <i>two-pass</i> two-party authenticated key exchange (AKE) protocol on the extended Canetti-Krawczyk (eCK) security model. Our formalization, &#955;-leakage resilient eCK security, is a (stronger) generalization of the eCK security model with enhanced by the notion of(More)
We demonstrate a prototype implementation of a provably secure protocol that supports privacy-preserving mutual authentication between a server and a constrained device. Our proposed protocol is based on a physically unclonable function (PUF) and it is optimized for resource-constrained platforms. The reported results include a full protocol analysis, the(More)
RFID tags are getting their presence noticeable and are expected to become an important tool for e-commerce, logistics, point-ofsale transactions, and so on, representing “things” and “human holding things” in transactions. Since a huge amount of tags are expected to be needed to be attached to various “objects,” a low-cost tag manufacturing is necessary.(More)
Coenzyme Q10 (CoQ10) is essential for energy production and has become a popular supplement in recent years. In this study, CoQ10 productivity was improved in the fission yeast Schizosaccharomyces pombe. Ten CoQ biosynthetic genes were cloned and overexpressed in S. pombe. Strains expressing individual CoQ biosynthetic genes did not produce higher than a(More)
A witness to show the coexistence of multiple RFID tags is called grouping-proof and it is useful to handle a lot of commercial products in Internet of Things (IoT). Many of the existing grouping-proof protocols have a common problem that the RFID reader incrementally communicates with the RFID tags in the group and the round complexity is quite high. In(More)
The use of Physically Unclonable Functions (PUFs) in cryptographic protocols attracted an increased interest over recent years. Since sound security analysis requires a concise specification of the alleged properties of the PUF, there have been numerous trials to provide formal security models for PUFs. However, all these approaches have been tailored to(More)