IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 34 of 34 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2010-05-21
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Side-Channel Analysis and Countermeasures of Stream Cipher K2
Matt Henricksen, Wun-she Yap, Chee-hoo Yian (I2R), Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ISEC2010-2
In this paper we provide the first side-channel analysis of the K2 stream cipher. We apply timing attacks, power analysi... [more] ISEC2010-2
pp.5-10
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
11:10
Akita Akita University A Study on Stream-Cipher-Based Hash Functions
Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs) ISEC2009-29 SITE2009-21 ICSS2009-43
Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based h... [more] ISEC2009-29 SITE2009-21 ICSS2009-43
pp.153-159
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
16:10
Akita Akita University Software Protection Mechanism Using Tamper-Proof Module
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2009-38 SITE2009-30 ICSS2009-52
 [more] ISEC2009-38 SITE2009-30 ICSS2009-52
pp.213-219
ISEC, SITE, IPSJ-CSEC 2008-07-25
16:35
Fukuoka Fukuoka Institute of System LSI Design Industry Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.) ISEC2008-58
 [more] ISEC2008-58
pp.169-176
ISEC 2008-05-16
11:10
Tokyo Kikai-Shinko-Kaikan Bldg. Coalition Resistant Ternary Subset Difference Method
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) ISEC2008-5
 [more] ISEC2008-5
pp.31-38
ISEC 2007-09-07
09:00
Tokyo Kikai-Shinko-Kaikan Bldg. An Extension of Fast Threshold Schemes Using XOR Operations (1)
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-74
 [more] ISEC2007-74
pp.1-8
ISEC 2007-09-07
09:25
Tokyo Kikai-Shinko-Kaikan Bldg. An Extension of Fast Threshold Schemes Using XOR Operations (2)
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-75
 [more] ISEC2007-75
pp.9-15
ISEC 2007-05-18
11:00
Tokyo Kikai-Shinko-Kaikan Bldg. A Fast (4,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations, and Its Extension to (k,n)-Threshold Schemes
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-4
 [more] ISEC2007-4
pp.23-30
ISEC, SITE, IPSJ-CSEC 2006-07-21
15:20
Okayama Okayama Univ. Key-Management Scheme for Secure Multicast based on Network Topology
Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.)
 [more] ISEC2006-57
pp.131-135
WBS, IT, ISEC 2006-03-17
15:50
Aichi Nagoya Univ. Design of a Stream Cipher using Efficient Clock Control
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai (Kyushu Univ.)
Various clock-controlled stream ciphers and attacks have been described in papers. However, few word-oriented algorithms... [more] IT2005-109 ISEC2005-166 WBS2005-123
pp.85-90
ISEC 2005-12-16
11:30
Tokyo Kikai-Shinko-Kaikan Bldg. On Effectiveness of Clock Control in a Clock-Controlled Stream Cipher
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs), Kouichi Sakurai (Kyushu Univ.)
In this paper, we examine effectiveness for clock control in stream ciphers with the aim of protecting against distingui... [more] ISEC2005-112
pp.11-16
IT, WBS, ISEC 2005-03-18
15:55
Kyoto Kyoto Univ. Implementation of a Security Protocol Analyzer based on Provable Security
Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.)
In this paper, we present a security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies... [more] IT2004-54 ISEC2004-110 WBS2004-169
pp.25-30
ISEC 2004-09-17
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. Study of Security Protocol Analyzer Considering Provable Security
Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.)
In this paper, we design
a security protocol analyzer to verify cryptographic security protocols. Our analyzer checks ... [more]
ISEC2004-67
pp.1-8
ISEC, IPSJ-CSEC 2004-07-21
14:05
Tokushima Tokushima Univ. Analysis and Evaluation of Guess-and-Determine Attacks on Clock Controlled Stream Ciphers
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.)
Guess-and-Determine attacks have recently been proposed for the effective analysis of word-oriented stream ciphers.
In... [more]
ISEC2004-49
pp.53-60
 Results 21 - 34 of 34 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan