Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
LOIS, SITE, ISEC |
2023-11-10 14:00 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
A Study on Side-Channel Attacks for Unrolled Implementation of Block Ciphers Teppei Higashi, Rei Ueno, Naofumi Homma (Tohoku Univ) ISEC2023-69 SITE2023-63 LOIS2023-27 |
(To be available after the conference date) [more] |
ISEC2023-69 SITE2023-63 LOIS2023-27 pp.98-102 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
SAT-based Differential analysis of AEGIS Family Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH) ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 |
We evaluate the security of the AEGIS family which is authenticated encryption with an associated data scheme to achieve... [more] |
ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 pp.202-207 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 |
The design of multiple-branch-based designs, such as the low-latency pseudo-random function Orthros, holds the potential... [more] |
ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 pp.221-228 |
RCC, ISEC, IT, WBS |
2023-03-15 15:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
New Differential Pair of Linear Differential Attack for Salsa Kunjo Ri, Atsuko Miyaji (Handai) IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130 |
Salsa20 is a stream cipher designed by D.J.Bernstein in 2005, and research on its security is highly necessary in ensuri... [more] |
IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130 pp.412-418 |
SS, IPSJ-SE, KBSE [detail] |
2022-07-29 14:55 |
Hokkaido |
Hokkaido-Jichiro-Kaikan (Sapporo) (Primary: On-site, Secondary: Online) |
Differential analysis between activity diagrams before/after modifications Hayato Okamoto, Takayuki Omori, Atsushi Ohnishi (Ritsumeikan U.) SS2022-13 KBSE2022-23 |
In object-oriented software development, activity diagrams may be sometimes modified. Such modifications lead to trouble... [more] |
SS2022-13 KBSE2022-23 pp.73-78 |
ICSS, IPSJ-SPT |
2022-03-08 14:00 |
Online |
Online |
ICSS2021-76 |
(To be available after the conference date) [more] |
ICSS2021-76 pp.105-110 |
WBS, IT, ISEC |
2021-03-04 10:15 |
Online |
Online |
Analysis of a new linear bias in the input/output difference of Salsa20 Ryo Watanabe, Atsuko Miyaji (Osaka Univ.) IT2020-120 ISEC2020-50 WBS2020-39 |
Among cryptographic techniques, Salsa20, a stream cipher, is the predecessor of ChaCha20,
which was selected for TLS 1... [more] |
IT2020-120 ISEC2020-50 WBS2020-39 pp.52-57 |
IT |
2011-07-21 14:00 |
Okayama |
Okayama University |
Security evaluation of HyRAL against Boomerang Attack Tomoya Inoue, Toshinobu Kaneko (TUS) IT2011-10 |
HyRAL is the block cipher proposed by Hirata in 2010.
In this paper, we study security evaluation of HyRAL against Boom... [more] |
IT2011-10 pp.1-6 |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
New Differential Fault Analysis on Trivium Based on Setup-Time Violations Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) IT2010-118 ISEC2010-122 WBS2010-97 |
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup–time violation... [more] |
IT2010-118 ISEC2010-122 WBS2010-97 pp.333-339 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 10:45 |
Akita |
Akita University |
On the strength evaluation of Lesamnta against differential cryptanalysis Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2009-28 SITE2009-20 ICSS2009-42 |
We focus on the cryptographic hash algorithm Lesamnta-256, which is one of the
candidates for the new hash algorithm S... [more] |
ISEC2009-28 SITE2009-20 ICSS2009-42 pp.147-152 |
VLD |
2009-03-12 09:40 |
Okinawa |
|
The implementation of DES cryptographic circuit and the evaluation of DPA attack resistance using Domino-RSL technique Kenji Kojima, Kazuki Okuyama, Yuki Makino, Takeshi Fujino (Ritsumeikandai Univ.) VLD2008-140 |
To achieve cryptographic circuit that has tamper resistance, it is necessary that we take a LSI design considered counte... [more] |
VLD2008-140 pp.83-88 |
VLD |
2009-03-12 10:05 |
Okinawa |
|
Differential Power Analysis of bit-value against cipher implementation on FPGA Kazuki Okuyama, Kenji Kojima, Yuki Makino, Takeshi Fujino (Ritsumei Univ.) VLD2008-141 |
DPA side-channel attack is the encryption-key estimation method by the statistical analysis on circuit consumption power... [more] |
VLD2008-141 pp.89-94 |
WBS, IT, ISEC |
2009-03-10 09:50 |
Hokkaido |
Hakodate Mirai Univ. |
Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (1) Masahiro Sukegawa, Atsuko Miyaji (JAIST) IT2008-80 ISEC2008-138 WBS2008-93 |
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the
transitions of two permutations, $S$ and $S'$,... [more] |
IT2008-80 ISEC2008-138 WBS2008-93 pp.231-237 |
ISEC |
2007-12-19 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
How to design tables for power-analyses resistance of Table-network-based FPGA implementations of AES Makoto Torikoshi, Yoshio Takahashi, Tsutomu Matsumoto (Yokohama National Univ.) ISEC2007-114 |
Differential power analyses are statistical cryptanalytic methods to estimate the value of hidden cryptographic keys ins... [more] |
ISEC2007-114 pp.11-18 |
VLD, CPSY, RECONF, DC, IPSJ-SLDM, IPSJ-ARC (Joint) [detail] |
2007-11-20 11:20 |
Fukuoka |
Kitakyushu International Conference Center |
Proposal of domino-RSL circuit which is resistant to Differential Power Analysis attack on cryptographic circuit Yoshinobu Toyoda, Kenta Kido, Yoshiaki Shitabayashi, Takeshi Fujino (Ritsumeikan Univ.) VLD2007-77 DC2007-32 |
Countermeasures against Side Channel Attack are necessary to achieve cryptographic circuit that has tamper resistance. M... [more] |
VLD2007-77 DC2007-32 pp.43-48 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 09:55 |
Hokkaido |
Future University-Hakodate |
A Simple Countermeasure to DPA aginst FPGA Implementation of Cryptographic Device Janghoon Song, Koki Abe (UEC) ISEC2007-45 |
Random Switching Logic is a countermeasure to DPA that removes the relation between data and power consumption by making... [more] |
ISEC2007-45 pp.1-8 |