IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 8 of 8  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS 2022-11-08
10:55
Hokkaido Hokkaido Jichiro Kaikan
(Primary: On-site, Secondary: Online)
An Efficient Method of Finding Flippable Bits for RAMBleed
Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-47
Rowhammer is an attack that repeatedly accesses the same row in DRAM (Dynamic Random Access Memory) to cause bit flippin... [more] ICSS2022-47
pp.55-60
ICTSSL, IN, NWS, IEE-SMF 2022-10-27
14:55
Nagano Shinshu University
(Primary: On-site, Secondary: Online)
Data Security Verification in Supply Chain
Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] ICTSSL2022-19
pp.12-17
IT, ISEC, RCC, WBS 2022-03-11
14:05
Online Online Rocca: Efficient AES-based Encryption Scheme for Beyond 5G
Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Yuto Nakano, Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101
In this paper, we present an AES-based authenticated-encryption with associated-data scheme nemed Rocca, with the purpos... [more] IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101
pp.249-255
IT, ISEC, RCC, WBS 2022-03-11
14:30
Online Online Implementation and Performance Evaluation of Rocca
Yuto Nakano (KDDI Research), Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102
In this paper, we implement an AES-based authenticated-encryption with associated-data scheme called name, proposed by S... [more] IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102
pp.256-261
ISEC, IT, WBS 2014-03-10
11:00
Aichi Nagoya Univ., Higashiyama Campus A Study on Correlation ElectroMagnetic Analysis against KCipher-2 implemented on a Microcontroller for ZigBee Devices
Hajime Uno, Sho Endo, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) IT2013-59 ISEC2013-88 WBS2013-48
This paper presents a correlation electromagnetic analysis against the stream cipher KCipher-2 software. Side-channel at... [more] IT2013-59 ISEC2013-88 WBS2013-48
pp.35-40
ISEC 2010-05-21
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Side-Channel Analysis and Countermeasures of Stream Cipher K2
Matt Henricksen, Wun-she Yap, Chee-hoo Yian (I2R), Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ISEC2010-2
In this paper we provide the first side-channel analysis of the K2 stream cipher. We apply timing attacks, power analysi... [more] ISEC2010-2
pp.5-10
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
11:10
Akita Akita University A Study on Stream-Cipher-Based Hash Functions
Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs) ISEC2009-29 SITE2009-21 ICSS2009-43
Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based h... [more] ISEC2009-29 SITE2009-21 ICSS2009-43
pp.153-159
ISEC, SITE, IPSJ-CSEC 2006-07-20
16:10
Okayama Okayama Univ. Inspection of sufficient conditions of MD5
Yuto Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.)
Sufficient conditions for finding the collision pairs of MD5 are about
600 conditions on internal variables, but the ne... [more]
ISEC2006-27 SITE2006-24
pp.133-139
 Results 1 - 8 of 8  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan