|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS |
2022-11-08 10:55 |
Hokkaido |
Hokkaido Jichiro Kaikan (Primary: On-site, Secondary: Online) |
An Efficient Method of Finding Flippable Bits for RAMBleed Haruka Okuda (Kobe Univ.), Makoto Takita (Univ. of Hyogo), Kazuhide Fukushima, Yuto Nakano (KDDI Research, Inc.), Yoshiaki Shiraishi, Masakatu Morii (Kobe Univ.) ICSS2022-47 |
Rowhammer is an attack that repeatedly accesses the same row in DRAM (Dynamic Random Access Memory) to cause bit flippin... [more] |
ICSS2022-47 pp.55-60 |
ICTSSL, IN, NWS, IEE-SMF |
2022-10-27 14:55 |
Nagano |
Shinshu University (Primary: On-site, Secondary: Online) |
Data Security Verification in Supply Chain Keizo Sugiyama, Yuto Nakano, Yasuaki Kobayashi, Toru Nakamura, Haruki Ota, Takao Kojima, Yutaka Miyake, Shinsaku Kiyomoto (KDDI Research) ICTSSL2022-19 |
Highly sensitive data such as inspection data, design data, program module are often handled in a supply chain. As speci... [more] |
ICTSSL2022-19 pp.12-17 |
IT, ISEC, RCC, WBS |
2022-03-11 14:05 |
Online |
Online |
Rocca: Efficient AES-based Encryption Scheme for Beyond 5G Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Yuto Nakano, Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101 |
In this paper, we present an AES-based authenticated-encryption with associated-data scheme nemed Rocca, with the purpos... [more] |
IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101 pp.249-255 |
IT, ISEC, RCC, WBS |
2022-03-11 14:30 |
Online |
Online |
Implementation and Performance Evaluation of Rocca Yuto Nakano (KDDI Research), Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102 |
In this paper, we implement an AES-based authenticated-encryption with associated-data scheme called name, proposed by S... [more] |
IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102 pp.256-261 |
PRMU, IPSJ-CVIM, MVE [detail] |
2016-01-22 15:35 |
Osaka |
|
A Note on the Computational Complexity Reduction Method of the Optimal Prediction under Bayes Criterion in Semi-Supervised Learning Yuto Nakano, Shota Saito, Toshiyasu Matsushima (Waseda Univ.) PRMU2015-130 MVE2015-52 |
In this paper, we deal with a prediction problem of the semi-supervised learning based on the statistical decision theor... [more] |
PRMU2015-130 MVE2015-52 pp.275-280 |
ISEC, IT, WBS |
2014-03-10 11:00 |
Aichi |
Nagoya Univ., Higashiyama Campus |
A Study on Correlation ElectroMagnetic Analysis against KCipher-2 implemented on a Microcontroller for ZigBee Devices Hajime Uno, Sho Endo, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Yuto Nakano, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Lab.) IT2013-59 ISEC2013-88 WBS2013-48 |
This paper presents a correlation electromagnetic analysis against the stream cipher KCipher-2 software. Side-channel at... [more] |
IT2013-59 ISEC2013-88 WBS2013-48 pp.35-40 |
ISEC |
2010-05-21 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Side-Channel Analysis and Countermeasures of Stream Cipher K2 Matt Henricksen, Wun-she Yap, Chee-hoo Yian (I2R), Yuto Nakano, Kazuhide Fukushima, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI Labs.) ISEC2010-2 |
In this paper we provide the first side-channel analysis of the K2 stream cipher. We apply timing attacks, power analysi... [more] |
ISEC2010-2 pp.5-10 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 11:10 |
Akita |
Akita University |
A Study on Stream-Cipher-Based Hash Functions Yuto Nakano, Jun Kurihara, Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs) ISEC2009-29 SITE2009-21 ICSS2009-43 |
Hash functions using stream ciphers as components perform fast on a variety of platforms. However, stream-cipher-based h... [more] |
ISEC2009-29 SITE2009-21 ICSS2009-43 pp.153-159 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 16:10 |
Okayama |
Okayama Univ. |
Inspection of sufficient conditions of MD5 Yuto Nakano, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
Sufficient conditions for finding the collision pairs of MD5 are about
600 conditions on internal variables, but the ne... [more] |
ISEC2006-27 SITE2006-24 pp.133-139 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|