|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2010-05-21 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Side-Channel Analysis and Countermeasures of Stream Cipher K2 Matt Henricksen, Wun-she Yap, Chee-hoo Yian (I2R), Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ISEC2010-2 |
In this paper we provide the first side-channel analysis of the K2 stream cipher. We apply timing attacks, power analysi... [more] |
ISEC2010-2 pp.5-10 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 11:10 |
Akita |
Akita University |
A Study on Stream-Cipher-Based Hash Functions Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs) ISEC2009-29 SITE2009-21 ICSS2009-43 |
Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based h... [more] |
ISEC2009-29 SITE2009-21 ICSS2009-43 pp.153-159 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 16:10 |
Akita |
Akita University |
Software Protection Mechanism Using Tamper-Proof Module Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2009-38 SITE2009-30 ICSS2009-52 |
[more] |
ISEC2009-38 SITE2009-30 ICSS2009-52 pp.213-219 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 16:35 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Illegal Copy Detection Framework for CAD Tools based on Watermarks Embedded in VHDL Codes Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai, Hiroto Yasuura (Kyushu Univ.) ISEC2008-58 |
[more] |
ISEC2008-58 pp.169-176 |
ISEC |
2008-05-16 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Coalition Resistant Ternary Subset Difference Method Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) ISEC2008-5 |
[more] |
ISEC2008-5 pp.31-38 |
ISEC |
2007-09-07 09:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Extension of Fast Threshold Schemes Using XOR Operations (1) Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-74 |
[more] |
ISEC2007-74 pp.1-8 |
ISEC |
2007-09-07 09:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Extension of Fast Threshold Schemes Using XOR Operations (2) Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-75 |
[more] |
ISEC2007-75 pp.9-15 |
ISEC |
2007-05-18 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Fast (4,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations, and Its Extension to (k,n)-Threshold Schemes Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.) ISEC2007-4 |
[more] |
ISEC2007-4 pp.23-30 |
ISEC, SITE, IPSJ-CSEC |
2006-07-21 15:20 |
Okayama |
Okayama Univ. |
Key-Management Scheme for Secure Multicast based on Network Topology Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Lab.), Kouichi Sakurai (Kyushu Univ.) |
[more] |
ISEC2006-57 pp.131-135 |
WBS, IT, ISEC |
2006-03-17 15:50 |
Aichi |
Nagoya Univ. |
Design of a Stream Cipher using Efficient Clock Control Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai (Kyushu Univ.) |
Various clock-controlled stream ciphers and attacks have been described in papers. However, few word-oriented algorithms... [more] |
IT2005-109 ISEC2005-166 WBS2005-123 pp.85-90 |
ISEC |
2005-12-16 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On Effectiveness of Clock Control in a Clock-Controlled Stream Cipher Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs), Kouichi Sakurai (Kyushu Univ.) |
In this paper, we examine effectiveness for clock control in stream ciphers with the aim of protecting against distingui... [more] |
ISEC2005-112 pp.11-16 |
IT, WBS, ISEC |
2005-03-18 15:55 |
Kyoto |
Kyoto Univ. |
Implementation of a Security Protocol Analyzer based on Provable Security Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.) |
In this paper, we present a security protocol analyzer to verify cryptographic security protocols. Our analyzer verifies... [more] |
IT2004-54 ISEC2004-110 WBS2004-169 pp.25-30 |
ISEC |
2004-09-17 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Study of Security Protocol Analyzer Considering Provable Security Shinsaku Kiyomoto, Haruki Ota, Toshiaki Tanaka (KDDI Labs.) |
In this paper, we design
a security protocol analyzer to verify cryptographic security protocols. Our analyzer checks ... [more] |
ISEC2004-67 pp.1-8 |
ISEC, IPSJ-CSEC |
2004-07-21 14:05 |
Tokushima |
Tokushima Univ. |
Analysis and Evaluation of Guess-and-Determine Attacks on Clock Controlled Stream Ciphers Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.), Kouichi Sakurai (Kyushu Univ.) |
Guess-and-Determine attacks have recently been proposed for the effective analysis of word-oriented stream ciphers.
In... [more] |
ISEC2004-49 pp.53-60 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|