IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 31  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICD, HWS [detail] 2020-10-26
Online Online Design of Efficient AES Hardware with Immediately Fault Detection Capability
Yusuke Yagyu, Rei Ueno, Naofumi Homma (Tohoku Univ.) HWS2020-31 ICD2020-20
This paper presents an efficient AES encryption/decryption hardware architecture
with a fault detection scheme.
The pr... [more]
HWS2020-31 ICD2020-20
ISEC, IT, WBS 2020-03-11
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Security Evaluation of Differential Attacks against KCipher-2
Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] IT2019-108 ISEC2019-104 WBS2019-57
EA, EMM 2019-11-23
Ishikawa Kanazawa Institute of Technology [Invited Talk] Studies of Affective Engineering on Music and Character Voices in the Context of Multimedia Contents -- Construction of Scientific Design Methods to Produce Contents --
Masashi Yamada (KIT) EA2019-63 EMM2019-91
The author has been empirically studying on the multimedia contents, where videos combined with music and character voic... [more] EA2019-63 EMM2019-91
EMM, IT 2019-05-24
Hokkaido Asahikawa International Conference Hall Higher Order Differential Property of BIG Block Cipher
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2019-12 EMM2019-12
BIG is a block cipher with 128-bit block length and 128-bit key length proposed by Demeri in 2019. The number of r... [more] IT2019-12 EMM2019-12
IT, ISEC, WBS 2019-03-08
Tokyo University of Electro-Communications [Invited Talk] Exceptional Experiences of my Research Activities on Modern Cryptography
Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] IT2018-115 ISEC2018-121 WBS2018-116
EMM, IT 2017-05-22
Yamagata Yamagata University(Yonezawa Campus) Higher Order Differential Property of Few
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2017-7 EMM2017-7
Few is a 64-bit block cipher proposed by Manoj in 2014. The designer evaluated its strength against differential c... [more] IT2017-7 EMM2017-7
PRMU, BioX 2017-03-20
Aichi   [Invited Talk] Recent Technology Trends in Location Privacy
Takao Murakami (AIST) BioX2016-42 PRMU2016-205
With the widespread use of smart phones and in-car navigation systems, people are increasingly using LBS (Location-based... [more] BioX2016-42 PRMU2016-205
DC, SS 2016-10-27
Shiga Hikone Kinro-Fukushi Kaikan Bldg. Note on Data Aggregation on Smart Grid Communications Considering Fault Tolerance and Privacy
Ryota Ogasawara, Masayuki Arai (Nihon Univ.) SS2016-23 DC2016-25
In smart grid communications it is important to aggregate users' usage data while preserving privacy. In this paper we p... [more] SS2016-23 DC2016-25
ICSS, IPSJ-SPT 2016-03-04
Kyoto Academic Center for Computing and Media Studies, Kyoto University Higher-order differential attack on the round-reduced variants of the block cipher
Yusuke Takahashi, Yasutaka Igarashi, Toshinobu Kaneko (TUS) ICSS2015-73
Midori64 proposed by Banik et al. in 2015 is an SPN-type block cipher with 128-bit secret key. The designers have evalua... [more] ICSS2015-73
ISEC 2015-12-18
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Higher Order Differntial Attack and Integral Attack
Toshinobu Kaneko (TUS) ISEC2015-58
Higher order differential (HOD) attack and Integral attack are one of the general purpose attacks to common key block ci... [more] ISEC2015-58
ISEC 2015-05-15
Tokyo Kikai-Shinko-Kaikan Bldg. Truncated Differential Attack on Block Cipher PRINCE
Satoshi Setoguchi (Kagoshima Univ), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science), Seiji Fukushima, Tomohiro Hachino (Kagoshima Univ) ISEC2015-2
PRINCE is an SPN-type 64-bit block cipher with a 128-bit key in 2012 proposed by Borghoff et al. [1]. The number of roun... [more] ISEC2015-2
EMCJ, IEE-EMC 2014-12-19
Shizuoka Shizuoka Univ. Security Evaluation of CSSAL Countermeasure against Side-Channel Attacks Using Frequency Spectrum Analysis
Cancio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine (Gifu Univ.) EMCJ2014-82
Information leakage on cryptographic devices are possible because of the correlation between the processed data and its ... [more] EMCJ2014-82
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
Hokkaido San-Refure Hakodate New Higher Order Differential Property of Piccolo
Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34
Piccolo is a 64-bit block cipher proposed by Shibutani in 2011. It has been reported that 8-/10-round Piccolo with... [more] ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34
ICSS, IPSJ-SPT 2014-03-28
Okinawa Meio Univiersity Higher Order Differential Property of LBlock(II)
Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) ICSS2013-94
LBlock is a block cipher with 64-bit block length and 80-bit key length, which was proposed by Wu in 2011.It has b... [more] ICSS2013-94
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
Hokkaido   Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform
Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22
HyRAL is a 128-bit block cipher proposed by Hirata in 2010. It has been reported that 14-round HyRAL with 256-bit secret... [more] ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22
IT 2013-01-21
Tokyo Univ. of Electro-Communications A key recovery attack for CLEFIA using differential fault analysis by command bypassing
Hiroki Itou, Hideki Yoshikawa, Masahiro Kaminaga, Arimitsu Shikoda (Tohoku Gakuin Univ.) IT2012-53
Differential Fault Analysis(DFA) is one of the physical attack method for retrieving secret information from cipher-impl... [more] IT2012-53
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2012-07-20
Hokkaido   A New Solving Algorithm for Attack Equation of Higher Order Differential Attack on AES (II)
Yusuke Inoue, Akinobu Kitagawa, Toshinobu Kaneko (TUS) ISEC2012-31 SITE2012-27 ICSS2012-33 EMM2012-23
Ferguson et al. proposed 32-nd higher order differential attacks with partial sum method for 6 and 7 rounds AES. The met... [more] ISEC2012-31 SITE2012-27 ICSS2012-33 EMM2012-23
ISEC, IT, WBS 2011-03-04
Osaka Osaka University New Differential Fault Analysis on Trivium Based on Setup-Time Violations
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) IT2010-118 ISEC2010-122 WBS2010-97
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup–time violation... [more] IT2010-118 ISEC2010-122 WBS2010-97
ISEC, IT, WBS 2011-03-04
Osaka Osaka University Higher Order Differential Attack on HyRAL
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2010-119 ISEC2010-123 WBS2010-98
In this paper, we focuse on the higher order differential attack on block cipher HyRAL that was proposed by Hirata in 20... [more] IT2010-119 ISEC2010-123 WBS2010-98
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2009-07-03
Akita Akita University On the strength evaluation of Lesamnta against differential cryptanalysis
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2009-28 SITE2009-20 ICSS2009-42
We focus on the cryptographic hash algorithm Lesamnta-256, which is one of the
candidates for the new hash algorithm S... [more]
ISEC2009-28 SITE2009-20 ICSS2009-42
 Results 1 - 20 of 31  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan