Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RECONF, VLD, CPSY, IPSJ-ARC, IPSJ-SLDM [detail] |
2022-01-25 09:30 |
Online |
Online |
GPU acceleration of algorithm for minimal distance approximate calculation between two objects Masumi Fukuta, Takakazu Kurokawa, Takashi Matsubara, Keisuke Iwai (NDA) VLD2021-62 CPSY2021-31 RECONF2021-70 |
(To be available after the conference date) [more] |
VLD2021-62 CPSY2021-31 RECONF2021-70 pp.73-77 |
EA, ASJ-H, EMM |
2020-11-20 09:00 |
Online |
Online |
[Poster Presentation]
Improving wavelet-synchrosqueezing transform with calculating angular frequency using time shift Akira Kakutani, Takashi Matsubara, Keisuke Iwai, Takakazu Kurokawa (NDA) EA2020-21 EMM2020-36 |
Time-frequency analysis is mainly used for analyzing acoustic signals. Short-time Fourier transform by Allen, et al. and... [more] |
EA2020-21 EMM2020-36 pp.1-5 |
IPSJ-SLDM, RECONF, VLD, CPSY, IPSJ-ARC [detail] |
2020-01-24 11:25 |
Kanagawa |
Raiosha, Hiyoshi Campus, Keio University |
Implementation of high speed rainbow table generation using Keccak hashing algorithm on CUDA Nguyen Dat Thuong, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA) VLD2019-84 CPSY2019-82 RECONF2019-74 |
This paper proposes the implementation of high speed rainbow table generation using Keccak hashing algorithm with the in... [more] |
VLD2019-84 CPSY2019-82 RECONF2019-74 pp.181-186 |
HWS (2nd) |
2019-12-06 16:00 |
Tokyo |
Asakusabashi Hulic Conference |
[Poster Presentation]
Correlation power analysis and its countermeasure for lightweight ciphers LED and SKINNY implemented in SAKURA-X FPGA Hayato Tanaka, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA) |
[more] |
|
EA, ASJ-H, ASJ-AA |
2018-07-24 13:00 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
Denoising Method for Underwater Acoustic Signals by Using Hough Transform Yoshihiro Taira, Takashi Matsubara, Keisuke Iwai, Takakazu Kurokawa (NDA) EA2018-11 |
Underwater acoustic signals are used in various fields such as marine environmental measurement, exploration of sea bott... [more] |
EA2018-11 pp.59-64 |
ISEC |
2016-09-02 14:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Implementation of security evaluation function on a Development Environment of Cryptography using GUI Toshihiro Nakamura, Keisuke Iwai, Takashi Matsubara, Takakazu Kurokawa (NDA) ISEC2016-46 |
Security evaluation on cryptography and cryptography development
are two sides of the same coin.
Security evaluation... [more] |
ISEC2016-46 pp.49-56 |
ISEC |
2016-05-19 10:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
IDS using Discrete Fourier Transform with window functions Yusuke Tsuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2016-2 |
An Intrusion Detection System (IDS) is countermeasure against network attack. There are mainly two types of detections; ... [more] |
ISEC2016-2 pp.5-11 |
IT, ISEC, WBS |
2016-03-10 13:40 |
Tokyo |
The University of Electro-Communications |
Collision-Free Rainbow Table Structure Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IT2015-114 ISEC2015-73 WBS2015-97 |
Rainbow table is a method to crack the password in high speed from hash values. Collision of password candidates occurs,... [more] |
IT2015-114 ISEC2015-73 WBS2015-97 pp.81-88 |
ISEC |
2015-12-18 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Evaluation of authenticated encryptions implemented on FPGA with high-level synthesis Makoto Kotegawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-55 |
Competition for Authenticated Encryption Security, Applicability, and Robustness (CAESAR) which is a development and eva... [more] |
ISEC2015-55 pp.9-16 |
ISEC |
2015-09-04 10:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement of RainbowCrack Reduction Function Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-26 |
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] |
ISEC2015-26 pp.9-14 |
ISEC |
2015-09-04 11:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
High speed implementation of Hash function on GPU Nguyen Dat Thuong, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-27 |
In order to protect the personal information and high confidential information, encryption technology and hash function ... [more] |
ISEC2015-27 pp.15-19 |
IA, ICSS |
2015-06-11 14:35 |
Fukuoka |
Kyushu Institute of Technology Univ. |
An Efficient Rainbow Table Compression Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IA2015-3 ICSS2015-3 |
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] |
IA2015-3 ICSS2015-3 pp.9-14 |
ISEC |
2014-09-05 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
GPU implementation of Ciphers using Schematic to Program Translator(SPT) Masashi Watanabe, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2014-52 |
With the spread of heterogeneous computing, accelerators such as GPU are widely used. However, it is not easy to develop... [more] |
ISEC2014-52 pp.35-42 |
CPSY, DC (Joint) |
2014-07-29 17:50 |
Niigata |
Toki Messe, Niigata |
Development of Cipher implementation tool using GUI Masashi Watanabe, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) CPSY2014-31 |
With the spread of heterogeneous computing, accelerators such as GPU are widely used. However, it
is not easy to write ... [more] |
CPSY2014-31 pp.125-129 |
ISEC |
2014-05-09 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study of IDS using Discrete Fourier Transform Enkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2014-4 |
Intrusion Detection System (IDS) detects an attack with an identifying pattern file which is known as called a signature... [more] |
ISEC2014-4 pp.21-27 |
ISEC |
2013-05-23 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Information theoretical analysis of side-channel attack (2) Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (National Defense Academy) ISEC2013-3 |
In the evaluation of side-channel resistance, it is argued how many observation of physical phenomena which is caused by... [more] |
ISEC2013-3 pp.15-22 |
DC, CPSY (Joint) |
2012-08-02 17:30 |
Tottori |
Torigin Bunka Kaikan |
Proposal of performance model for block ciphers using GPGPU Naoki Nishikawa, Keisuke Iwai, Takakazu Kurokawa (NDA) CPSY2012-16 |
In this paper, we present a prototype of performance model of block ciphers using GPGPU whose encryption latency is read... [more] |
CPSY2012-16 pp.43-48 |
VLD, CPSY, RECONF, IPSJ-SLDM [detail] |
2012-01-26 12:40 |
Kanagawa |
Hiyoshi Campus, Keio University |
Discussion of Performance Prediction Model for Symmetric Block Ciphers on CUDA Naoki Nishikawa, Keisuke Iwai, Takakazu Kurokawa (NDA) VLD2011-112 CPSY2011-75 RECONF2011-71 |
As the data protection with encryption becomes important day by day, the encryption processing using GPGPU has been noti... [more] |
VLD2011-112 CPSY2011-75 RECONF2011-71 pp.123-128 |
DC, CPSY (Joint) |
2011-07-29 11:10 |
Kagoshima |
|
Fast Implementations of Symmetric Block Ciphers on CUDA Naoki Nishikawa, Keisuke Iwai, Takakazu Kurokawa (NDA) CPSY2011-13 |
GPU as hardware with high-cost performance has been noticed from almost all research fields. As the result, implementati... [more] |
CPSY2011-13 pp.25-30 |
RECONF, VLD, CPSY, IPSJ-SLDM [detail] |
2011-01-18 10:20 |
Kanagawa |
Keio Univ (Hiyoshi Campus) |
Evaluation of switchable AES S-box circuit using dynamic and partial reconfiguration Naoko Yamada (Keio Univ.), Keisuke Iwai, Takakazu Kurokawa (NDA), Hideharu Amano (Keio Univ.) VLD2010-102 CPSY2010-57 RECONF2010-71 |
Recently, the threat of side channel attack to the hardware encryption circuits is increasing. In order
to cope with it... [more] |
VLD2010-102 CPSY2010-57 RECONF2010-71 pp.127-132 |