|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2018-03-07 13:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
An analysis of the Guo-Johansson-Stankovski attack against QC-MDPC codes Yohei Maezawa, Tung Chou, Atsuko Miyaji (Osaka Univ,) ICSS2017-57 |
In ASIACRYPT 2016, the Guo-Johansson-Stankovski (GJS) attack appears as a key-recovery attack against code--based encryp... [more] |
ICSS2017-57 pp.37-42 |
ICSS, IPSJ-SPT |
2016-03-04 13:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A New Key Correlation in the Stream Cipher RC4 Daiki Michihiro (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/CREST) ICSS2015-65 |
The stream cipher RC4 has been analyzed by using various schemes since the algorithm was leaked
in 1994.In particular, ... [more] |
ICSS2015-65 pp.111-116 |
IT |
2010-07-22 14:05 |
Tokyo |
Kogakuin University |
Speeding Up of a WEP-Key Recovery attack using IP Packets Ryohei Okamoto, Yosuke Todo, Masakatu Morii (Kobe Univ.) IT2010-17 |
WEP is the security protocol in the wireless LAN, and its vulnerability is have been pointed out.
However, the attacke... [more] |
IT2010-17 pp.35-40 |
ISEC, LOIS |
2007-11-22 15:20 |
Hyogo |
Kobe University |
A Key Recovery Attack on WEP with Less Packets Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-109 OIS2007-81 |
E. Tews, R. Weinmann, and A. Pyshkin have recently shown a key recovery attack on WEP (called the PTW attack). The PTW a... [more] |
ISEC2007-109 OIS2007-81 pp.61-68 |
ISEC, SITE, IPSJ-CSEC |
2007-07-20 10:45 |
Hokkaido |
Future University-Hakodate |
A Study on the Tews-Weinmann-Pyshkin Attack against WEP Yuko Ozasa, Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-47 |
Tews, Weinmann, and Phshkin have shown a key recovery attack against WEP (the TWP attack), which is the modification of ... [more] |
ISEC2007-47 pp.17-21 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 16:35 |
Okayama |
Okayama Univ. |
Possibility of the Key Recovery Attack against Py Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
Biham and Seberry have submitted the stream cipher Py to the ECRYPT
Stream Cipher Project (eSTREAM).
In this paper, ... [more] |
ISEC2006-28 SITE2006-25 pp.141-148 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|