IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 30 of 30 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IT, WBS 2011-03-04
09:50
Osaka Osaka University Higher Order Differential Attack on HyRAL
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2010-119 ISEC2010-123 WBS2010-98
In this paper, we focuse on the higher order differential attack on block cipher HyRAL that was proposed by Hirata in 20... [more] IT2010-119 ISEC2010-123 WBS2010-98
pp.341-347
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
10:45
Akita Akita University On the strength evaluation of Lesamnta against differential cryptanalysis
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2009-28 SITE2009-20 ICSS2009-42
We focus on the cryptographic hash algorithm Lesamnta-256, which is one of the
candidates for the new hash algorithm S... [more]
ISEC2009-28 SITE2009-20 ICSS2009-42
pp.147-152
WBS, IT, ISEC 2009-03-10
11:15
Hokkaido Hakodate Mirai Univ. Bit Slice Cryptanalysis of Simplified K2 Stream Cipher
Takashi Ohshima, Munetoshi Iwakiri (National Defense Academy) IT2008-83 ISEC2008-141 WBS2008-96
K2 is a stream cipher based on 32 bits LFSR, outputs 64 bits random number sequences with 128 bits secret key at every p... [more] IT2008-83 ISEC2008-141 WBS2008-96
pp.253-258
ISEC, SITE, IPSJ-CSEC 2008-07-24
13:25
Fukuoka Fukuoka Institute of System LSI Design Industry On the security of Piece In Hand Matrix Multivariate Public Key Cryptosystems -- MPKC systems proposed in SCIS'07 --
Toshinobu Kaneko, Yasutaka Igarashi, Daisuke Ito, Kiyoshi Hayakawa (Tokyo Univ. of Sci.) ISEC2008-17 SITE2008-11
MOCHIGOMA (Piece in Hand) system is an encryption algorithm proposed by
Tujii et al. in 2003, for enhancing the securi... [more]
ISEC2008-17 SITE2008-11
pp.9-14
ISEC 2008-05-16
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. New Impossible Differentials of CLEFIA
Etsuko Tsujihara (YDK), Maki Shigeri (NEC Software Hokuriku), Tomoyasu Suzaki (NEC), Takeshi Kawabata (NEC Software Hokuriku), Yukiyasu Tsunoo (NEC) ISEC2008-3
This paper reports impossible differential cryptanalysis on the 128-bit block cipher CLEFIA that was proposed in 2007. T... [more] ISEC2008-3
pp.15-22
ISEC, IT, WBS 2008-02-29
08:55
Tokyo   Security evaluation of Enocoro-128 ver.1.1 against resynchronization attack
Kei Konosu, Kenichiro Muto, Hiroki Furuichi (TUS), Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) IT2007-50 ISEC2007-147 WBS2007-81
Enocoro is a pseudorandom number generator for a stream cipher proposed by Hitachi,Ltd at ISEC in September, 2007.
In... [more]
IT2007-50 ISEC2007-147 WBS2007-81
pp.7-13
ISEC, LOIS 2007-11-22
15:20
Hyogo Kobe University A Key Recovery Attack on WEP with Less Packets
Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-109 OIS2007-81
E. Tews, R. Weinmann, and A. Pyshkin have recently shown a key recovery attack on WEP (called the PTW attack). The PTW a... [more] ISEC2007-109 OIS2007-81
pp.61-68
SANE 2006-04-11
16:30
Overseas Xidian Univ., Xi'an, China Cryptanalysis of A Threshold Signature Scheme for Group Communications without a Shared Distribution Center
Pang Liaojun (Xidian Univ.), Li Huixian (Dalian Univ. of Tech.), Wang Yumin (Xidian Univ.) SANE2006-43
Recently, Chang, Yang and Hwang proposed a threshold signature scheme for group communications without a shared distribu... [more] SANE2006-43
pp.235-238
IT 2005-07-21
13:30
Osaka Osaka Prefecture Univ. [Invited Talk] Recent Attacks on Symmetric ciphers
Toshinobu Kaneko (Tokyo Univ. of Science)
CRYPTREC list, which is the e-government recommended ciphers list, was published in February 2003, There are 31 cryptogr... [more] IT2005-36
pp.1-8
ISEC, IPSJ-CSEC 2004-07-21
13:15
Tokushima Tokushima Univ. A Note on Probabilistic Internal-State Reconstruction Method to Stream Ciphers with Time-variant Tables
Toshihiro Ohigashi (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
Internal-state reconstruction method is a method for reconstructing the internal state of stream ciphers with time-varia... [more] ISEC2004-47
pp.41-48
 Results 21 - 30 of 30 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan