|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2011-03-04 09:50 |
Osaka |
Osaka University |
Higher Order Differential Attack on HyRAL Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2010-119 ISEC2010-123 WBS2010-98 |
In this paper, we focuse on the higher order differential attack on block cipher HyRAL that was proposed by Hirata in 20... [more] |
IT2010-119 ISEC2010-123 WBS2010-98 pp.341-347 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 10:45 |
Akita |
Akita University |
On the strength evaluation of Lesamnta against differential cryptanalysis Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2009-28 SITE2009-20 ICSS2009-42 |
We focus on the cryptographic hash algorithm Lesamnta-256, which is one of the
candidates for the new hash algorithm S... [more] |
ISEC2009-28 SITE2009-20 ICSS2009-42 pp.147-152 |
WBS, IT, ISEC |
2009-03-10 11:15 |
Hokkaido |
Hakodate Mirai Univ. |
Bit Slice Cryptanalysis of Simplified K2 Stream Cipher Takashi Ohshima, Munetoshi Iwakiri (National Defense Academy) IT2008-83 ISEC2008-141 WBS2008-96 |
K2 is a stream cipher based on 32 bits LFSR, outputs 64 bits random number sequences with 128 bits secret key at every p... [more] |
IT2008-83 ISEC2008-141 WBS2008-96 pp.253-258 |
ISEC, SITE, IPSJ-CSEC |
2008-07-24 13:25 |
Fukuoka |
Fukuoka Institute of System LSI Design Industry |
On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems
-- MPKC systems proposed in SCIS'07 -- Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.) ISEC2008-17 SITE2008-11 |
MOCHIGOMA (Piece in Hand) system is an encryption algorithm proposed by
Tujii et al. in 2003, for enhancing the securi... [more] |
ISEC2008-17 SITE2008-11 pp.9-14 |
ISEC |
2008-05-16 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
New Impossible Differentials of CLEFIA Etsuko Tsujihara (YDK), Maki Shigeri (NEC Software Hokuriku), Tomoyasu Suzaki (NEC), Takeshi Kawabata (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC) ISEC2008-3 |
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007. T... [more] |
ISEC2008-3 pp.15-22 |
ISEC, IT, WBS |
2008-02-29 08:55 |
Tokyo |
|
Security evaluation of Enocoro-128 ver.1.1 against resynchronization attack Kei Konosu, Kenichiro Muto, Hiroki Furuichi (TUS), Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) IT2007-50 ISEC2007-147 WBS2007-81 |
Enocoro is a pseudorandom number generator for a stream cipher proposed by Hitachi,Ltd at ISEC in September, 2007.
In... [more] |
IT2007-50 ISEC2007-147 WBS2007-81 pp.7-13 |
ISEC, LOIS |
2007-11-22 15:20 |
Hyogo |
Kobe University |
A Key Recovery Attack on WEP with Less Packets Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-109 OIS2007-81 |
E. Tews, R. Weinmann, and A. Pyshkin have recently shown a key recovery attack on WEP (called the PTW attack). The PTW a... [more] |
ISEC2007-109 OIS2007-81 pp.61-68 |
SANE |
2006-04-11 16:30 |
Overseas |
Xidian Univ., Xi'an, China |
Cryptanalysis of A Threshold Signature Scheme for Group Communications without a Shared Distribution Center Pang Liaojun (Xidian Univ.), Li Huixian (Dalian Univ. of Tech.), Wang Yumin (Xidian Univ.) SANE2006-43 |
Recently, Chang, Yang and Hwang proposed a threshold signature scheme for group communications without a shared distribu... [more] |
SANE2006-43 pp.235-238 |
IT |
2005-07-21 13:30 |
Osaka |
Osaka Prefecture Univ. |
[Invited Talk]
Recent Attacks on Symmetric ciphers Toshinobu Kaneko (Tokyo Univ. of Science) |
CRYPTREC list, which is the e-government recommended ciphers list, was published in February 2003, There are 31 cryptogr... [more] |
IT2005-36 pp.1-8 |
ISEC, IPSJ-CSEC |
2004-07-21 13:15 |
Tokushima |
Tokushima Univ. |
A Note on Probabilistic Internal-State Reconstruction Method to Stream Ciphers with Time-variant Tables Toshihiro Ohigashi (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima) |
Internal-state reconstruction method is a method for reconstructing the internal state of stream ciphers with time-varia... [more] |
ISEC2004-47 pp.41-48 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|