IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 7 of 7  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2018-03-07
13:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes
Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) ICSS2017-57
In ASIACRYPT 2016, the Guo-Johansson-Stankovski (GJS) attack appears as a key-recovery attack against code--based encryp... [more] ICSS2017-57
pp.37-42
ICSS, IPSJ-SPT 2016-03-04
13:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University A New Key Correlation in the Stream Cipher RC4
Daiki Michihiro (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/CREST) ICSS2015-65
The stream cipher RC4 has been analyzed by using various schemes since the algorithm was leaked
in 1994.In particular, ... [more]
ICSS2015-65
pp.111-116
ICSS 2015-03-04
10:50
Okinawa Meio Univiersity New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA
Daiki Michihiro (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryoma Ito (JAIST) ICSS2014-85
The first three bytes of the RC4 key in WPA are derived from the public parameter IV, and also the attacker can obtain t... [more] ICSS2014-85
pp.133-138
IT 2010-07-22
14:05
Tokyo Kogakuin University Speeding Up of a WEP-Key Recovery attack using IP Packets
Ryohei Okamoto, Yosuke Todo, Masakatu Morii (Kobe Univ.) IT2010-17
WEP is the security protocol in the wireless LAN, and its vulnerability is have been pointed out.
However, the attacke... [more]
IT2010-17
pp.35-40
ISEC, LOIS 2007-11-22
15:20
Hyogo Kobe University A Key Recovery Attack on WEP with Less Packets
Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-109 OIS2007-81
E. Tews, R. Weinmann, and A. Pyshkin have recently shown a key recovery attack on WEP (called the PTW attack). The PTW a... [more] ISEC2007-109 OIS2007-81
pp.61-68
ISEC, SITE, IPSJ-CSEC 2007-07-20
10:45
Hokkaido Future University-Hakodate A Study on the Tews-Weinmann-Pyshkin Attack against WEP
Yuko Ozasa, Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-47
Tews, Weinmann, and Phshkin have shown a key recovery attack against WEP (the TWP attack), which is the modification of ... [more] ISEC2007-47
pp.17-21
ISEC, SITE, IPSJ-CSEC 2006-07-20
16:35
Okayama Okayama Univ. Possibility of the Key Recovery Attack against Py
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
Biham and Seberry have submitted the stream cipher Py to the ECRYPT
Stream Cipher Project (eSTREAM).
In this paper, ... [more]
ISEC2006-28 SITE2006-25
pp.141-148
 Results 1 - 7 of 7  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan