Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, SITE, LOIS |
2022-11-18 17:45 |
Online |
Online |
Aggregate Entity Authentication with Group Testing Shoichi Hirose (Univ. Fukui/Japan Datacom), Junji Shikata (Yokohama National Univ./Japan Datacom) ISEC2022-46 SITE2022-50 LOIS2022-30 |
Challenge-response entity authentication can be implemented with a MAC function. In such an entity authentication schem... [more] |
ISEC2022-46 SITE2022-50 LOIS2022-30 pp.100-106 |
ICSS, IPSJ-SPT |
2020-03-02 13:30 |
Okinawa |
Okinawa-Ken-Seinen-Kaikan (Cancelled but technical report was issued) |
Implementation of aggregate message authentication and its evaluation Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-96 |
[more] |
ICSS2019-96 pp.207-212 |
ICSS |
2019-11-13 16:45 |
Miyazaki |
MRT Terrace(Miyazaki) |
Study on evaluation system for aggregate message authentication and its application to IoT systems Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-67 |
Utilization of Internet of things (IoT) devices has widely spread, and suppressing the increasing amount of data due to ... [more] |
ICSS2019-67 pp.41-46 |
ICSS, IPSJ-SPT |
2019-03-07 14:45 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Implementation and evaluation of aggregate message authentication method Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU) ICSS2018-73 |
[more] |
ICSS2018-73 pp.29-33 |
IT, ISEC, WBS |
2019-03-08 09:00 |
Tokyo |
University of Electro-Communications |
History-Free Sequential Aggregate MAC without Pseudorandom Permutation Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.) IT2018-101 ISEC2018-107 WBS2018-102 |
Eikemeier et al. introduced and formalized sequential aggregate MAC in 2010. They also proposed a history-free scheme f... [more] |
IT2018-101 ISEC2018-107 WBS2018-102 pp.155-162 |
IT, ISEC, WBS |
2019-03-08 09:25 |
Tokyo |
University of Electro-Communications |
Authenticated Encryption Scheme Secure Against Side Channel Attack Shoichi Hirose (Univ. Fukui), Takeshi Sugawara (Univ. Electro-Communications), Yuichi Komano (Toshiba) IT2018-102 ISEC2018-108 WBS2018-103 |
In 2018, Guo, Pereira, Peters and Standaert formalized the security requirements for authenticated encryption with assoc... [more] |
IT2018-102 ISEC2018-108 WBS2018-103 pp.163-167 |
ISEC, LOIS, SITE |
2016-11-07 15:20 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
Sequential Hashing with Minimum Padding Shoichi Hirose (Fukui Univ.) ISEC2016-55 SITE2016-45 LOIS2016-33 |
[more] |
ISEC2016-55 SITE2016-45 LOIS2016-33 pp.27-32 |
IT, ISEC, WBS |
2016-03-10 14:05 |
Tokyo |
The University of Electro-Communications |
Message Preprocessing for MD Hash Functions Hidenori Kuwakado (Kansai Univ.), Shoichi Hirose (Univ. of Fukui) IT2015-115 ISEC2015-74 WBS2015-98 |
[more] |
IT2015-115 ISEC2015-74 WBS2015-98 pp.89-93 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 16:10 |
Hokkaido |
San-Refure Hakodate |
Forward-Secure Sequential Aggregate Message Authentication Revisited Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.) ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 |
The notion of forward-secure sequential aggregate message
authentication was introduced by Ma and Tsudik in 2007.
It i... [more] |
ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26 pp.163-170 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 15:15 |
Hokkaido |
|
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256 Jiageng Chen (JAIST), Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.), Atsuko Miyaji (JAIST) ISEC2013-19 SITE2013-14 ICSS2013-24 EMM2013-21 |
This paper presents the first collision attack on the double-block-length compression function presented at FSE 2006 ins... [more] |
ISEC2013-19 SITE2013-14 ICSS2013-24 EMM2013-21 pp.59-66 |
ISEC, LOIS |
2012-11-21 14:40 |
Shizuoka |
Shizuoka City Industry-University Exchange Center |
Lightweight Hashing Mode Using Lesamnta-LW Compression Function and MDP Domain Extension Asraf Akhimullah, Shoichi Hirose (Fukui Univ.), Emi Matsuyama (SAKAI ELCOM) ISEC2012-58 LOIS2012-33 |
This paper presents a block-cipher-based hashing scheme suitable for
resource constrained devices.
It uses the Lesamnt... [more] |
ISEC2012-58 LOIS2012-33 pp.9-14 |
IT, ISEC, WBS |
2012-03-01 15:20 |
Kanagawa |
|
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kobe Univ.) IT2011-53 ISEC2011-80 WBS2011-54 |
[more] |
IT2011-53 ISEC2011-80 WBS2011-54 pp.45-51 |
ISEC, LOIS |
2011-11-15 15:40 |
Osaka |
Osaka Electro-Communication University |
Content Authentication for Range Queries in Peer-to-Peer Networks Shoichi Hirose (Univ. of Fukui) ISEC2011-60 LOIS2011-54 |
In this article, we propose a distributed authenticated data structure for range queries, which is called distributed au... [more] |
ISEC2011-60 LOIS2011-54 pp.177-180 |
IT, ISEC, WBS |
2010-03-05 16:10 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Preimage Resistance of Hash Functions on the Dedicated Block Cipher Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) IT2009-115 ISEC2009-123 WBS2009-94 |
[more] |
IT2009-115 ISEC2009-123 WBS2009-94 pp.289-293 |
IT, ISEC, WBS |
2010-03-05 09:00 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A Note on Practical Key Derivation Functions Shoichi Hirose (Univ. of Fukui.) IT2009-130 ISEC2009-138 WBS2009-109 |
In this article, we first review key derivation functions by Krawczyk and in NIST SP 800-108. Then, we propose paralleli... [more] |
IT2009-130 ISEC2009-138 WBS2009-109 pp.381-384 |
IT, ISEC, WBS |
2010-03-05 09:25 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Collision Attack on DM Compression Function Using Reduced AES-256 Tetsuya Kobayashi, Shoichi Hirose (Univ. Fukui) IT2009-131 ISEC2009-139 WBS2009-110 |
In 2009, Khovratovich, Biryukov and Nikoli\'{c} presented a kind of
collision attack on the Davies-Meyer (DM) compressi... [more] |
IT2009-131 ISEC2009-139 WBS2009-110 pp.385-390 |
ISEC |
2009-09-25 14:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Constructing a Hash Function from a Weak Block Cipher in an Ideal Model Shoichi Hirose (Univ. of Fukui.), Hidenori Kuwakado (Kobe Univ.) ISEC2009-47 |
This paper discusses the provable security of block-cipher-based hash functions. It first introduces a new model called ... [more] |
ISEC2009-47 pp.51-58 |
WBS, IT, ISEC |
2009-03-10 13:00 |
Hokkaido |
Hakodate Mirai Univ. |
A Note on the Security of Cryptographic Hash Functions Shoichi Hirose (Univ. Fukui) IT2008-85 ISEC2008-143 WBS2008-98 |
This article discusses relationships between preimage resistance, second-preimage resistance and universal one-wayness o... [more] |
IT2008-85 ISEC2008-143 WBS2008-98 pp.267-271 |
WBS, IT, ISEC |
2009-03-10 13:25 |
Hokkaido |
Hakodate Mirai Univ. |
Formalizing Security of Hash Functions Against Length-Extension Attacks Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) IT2008-86 ISEC2008-144 WBS2008-99 |
Although the resistance of length-extension attacksas well as collision resistanceis an important factor for SHA-3,NIST'... [more] |
IT2008-86 ISEC2008-144 WBS2008-99 pp.273-276 |
ISEC, SITE, IPSJ-CSEC |
2008-07-25 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) ISEC2008-46 |
Applications of an iterated hash function such as HMAC require that the compression function of the hash function is a p... [more] |
ISEC2008-46 pp.81-86 |