IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
LOIS, SITE, ISEC 2023-11-10
14:00
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
A Study on Side-Channel Attacks for Unrolled Implementation of Block Ciphers
Teppei Higashi, Rei Ueno, Naofumi Homma (Tohoku Univ) ISEC2023-69 SITE2023-63 LOIS2023-27
(To be available after the conference date) [more] ISEC2023-69 SITE2023-63 LOIS2023-27
pp.98-102
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:20
Hokkaido Hokkaido Jichiro Kaikan SAT-based Differential analysis of AEGIS Family
Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH) ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45
We evaluate the security of the AEGIS family which is authenticated encryption with an associated data scheme to achieve... [more] ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45
pp.202-207
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:20
Hokkaido Hokkaido Jichiro Kaikan On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures
Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48
The design of multiple-branch-based designs, such as the low-latency pseudo-random function Orthros, holds the potential... [more] ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48
pp.221-228
RCC, ISEC, IT, WBS 2023-03-15
15:45
Yamaguchi
(Primary: On-site, Secondary: Online)
New Differential Pair of Linear Differential Attack for Salsa
Kunjo Ri, Atsuko Miyaji (Handai) IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130
Salsa20 is a stream cipher designed by D.J.Bernstein in 2005, and research on its security is highly necessary in ensuri... [more] IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130
pp.412-418
SS, IPSJ-SE, KBSE [detail] 2022-07-29
14:55
Hokkaido Hokkaido-Jichiro-Kaikan (Sapporo)
(Primary: On-site, Secondary: Online)
Differential analysis between activity diagrams before/after modifications
Hayato Okamoto, Takayuki Omori, Atsushi Ohnishi (Ritsumeikan U.) SS2022-13 KBSE2022-23
In object-oriented software development, activity diagrams may be sometimes modified. Such modifications lead to trouble... [more] SS2022-13 KBSE2022-23
pp.73-78
ICSS, IPSJ-SPT 2022-03-08
14:00
Online Online ICSS2021-76 (To be available after the conference date) [more] ICSS2021-76
pp.105-110
WBS, IT, ISEC 2021-03-04
10:15
Online Online Analysis of a new linear bias in the input/output difference of Salsa20
Ryo Watanabe, Atsuko Miyaji (Osaka Univ.) IT2020-120 ISEC2020-50 WBS2020-39
Among cryptographic techniques, Salsa20, a stream cipher, is the predecessor of ChaCha20,
which was selected for TLS 1... [more]
IT2020-120 ISEC2020-50 WBS2020-39
pp.52-57
IT 2011-07-21
14:00
Okayama Okayama University Security evaluation of HyRAL against Boomerang Attack
Tomoya Inoue, Toshinobu Kaneko (TUS) IT2011-10
HyRAL is the block cipher proposed by Hirata in 2010.
In this paper, we study security evaluation of HyRAL against Boom... [more]
IT2011-10
pp.1-6
ISEC, IT, WBS 2011-03-04
09:25
Osaka Osaka University New Differential Fault Analysis on Trivium Based on Setup-Time Violations
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) IT2010-118 ISEC2010-122 WBS2010-97
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup–time violation... [more] IT2010-118 ISEC2010-122 WBS2010-97
pp.333-339
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
10:45
Akita Akita University On the strength evaluation of Lesamnta against differential cryptanalysis
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2009-28 SITE2009-20 ICSS2009-42
We focus on the cryptographic hash algorithm Lesamnta-256, which is one of the
candidates for the new hash algorithm S... [more]
ISEC2009-28 SITE2009-20 ICSS2009-42
pp.147-152
VLD 2009-03-12
09:40
Okinawa   The implementation of DES cryptographic circuit and the evaluation of DPA attack resistance using Domino-RSL technique
Kenji Kojima, Kazuki Okuyama, Yuki Makino, Takeshi Fujino (Ritsumeikandai Univ.) VLD2008-140
To achieve cryptographic circuit that has tamper resistance, it is necessary that we take a LSI design considered counte... [more] VLD2008-140
pp.83-88
VLD 2009-03-12
10:05
Okinawa   Differential Power Analysis of bit-value against cipher implementation on FPGA
Kazuki Okuyama, Kenji Kojima, Yuki Makino, Takeshi Fujino (Ritsumei Univ.) VLD2008-141
DPA side-channel attack is the encryption-key estimation method by the statistical analysis on circuit consumption power... [more] VLD2008-141
pp.89-94
WBS, IT, ISEC 2009-03-10
09:50
Hokkaido Hakodate Mirai Univ. Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (1)
Masahiro Sukegawa, Atsuko Miyaji (JAIST) IT2008-80 ISEC2008-138 WBS2008-93
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the
transitions of two permutations, $S$ and $S'$,... [more]
IT2008-80 ISEC2008-138 WBS2008-93
pp.231-237
ISEC 2007-12-19
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. How to design tables for power-analyses resistance of Table-network-based FPGA implementations of AES
Makoto Torikoshi, Yoshio Takahashi, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2007-114
Differential power analyses are statistical cryptanalytic methods to estimate the value of hidden cryptographic keys ins... [more] ISEC2007-114
pp.11-18
VLD, CPSY, RECONF, DC, IPSJ-SLDM, IPSJ-ARC
(Joint) [detail]
2007-11-20
11:20
Fukuoka Kitakyushu International Conference Center Proposal of domino-RSL circuit which is resistant to Differential Power Analysis attack on cryptographic circuit
Yoshinobu Toyoda, Kenta Kido, Yoshiaki Shitabayashi, Takeshi Fujino (Ritsumeikan Univ.) VLD2007-77 DC2007-32
Countermeasures against Side Channel Attack are necessary to achieve cryptographic circuit that has tamper resistance. M... [more] VLD2007-77 DC2007-32
pp.43-48
ISEC, SITE, IPSJ-CSEC 2007-07-20
09:55
Hokkaido Future University-Hakodate A Simple Countermeasure to DPA aginst FPGA Implementation of Cryptographic Device
Janghoon Song, Koki Abe (UEC) ISEC2007-45
Random Switching Logic is a countermeasure to DPA that removes the relation between data and power consumption by making... [more] ISEC2007-45
pp.1-8
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan