IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 41 - 45 of 45 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, IPSJ-CSEC 2007-07-20
09:55
Hokkaido Future University-Hakodate A Simple Countermeasure to DPA aginst FPGA Implementation of Cryptographic Device
Janghoon Song, Koki Abe (UEC) ISEC2007-45
Random Switching Logic is a countermeasure to DPA that removes the relation between data and power consumption by making... [more] ISEC2007-45
pp.1-8
ISEC 2006-09-13
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Side Channel Attacks against HMACs with Design for Hash Functions
Katsuyuki Okeya (Hitachi)
HMAC is one of the most famous keyed hash functions, and widely utilized. In order to design secure hash functions, we o... [more] ISEC2006-79
pp.53-60
WBS, IT, ISEC 2006-03-16
11:35
Aichi Nagoya Univ. A High-Resolution Waveform Analysis Based on Phase-Only Correlation and Its Application to Side-Channel Attacks
Yuichi Imai, Naofumi Homma, Sei Nagashima, Takafumi Aoki (Tohoku Univ.), Akashi Satoh (IBM Japan)
This paper presents a high-resolution waveform alignment method using a Phase-Only Correlation (POC) technique and its a... [more] IT2005-81 ISEC2005-138 WBS2005-95
pp.97-103
ISEC, LOIS 2005-11-15
14:05
Fukuoka Kitakyushu Science and Research Park On Reference Positions and Bits in Differential Power Analysis Attack against DES
Yousuke Kakuishi, Akihiko Sasaki, Koki Abe (UEC)
Differential power analysis (DPA) is a kind of side channel attacks which enables attackers to estimate secret informati... [more] ISEC2005-106 OIS2005-69
pp.51-56
ISEC, IPSJ-CSEC, SITE 2005-07-22
17:25
Iwate Iwate Prefectural University Improving the security of S boxes in DES using Genetic Algorithm
Atsushi Koyama, Yasuyuki Murakami (OECU)
As for the Feistel cipher, it is known that the security of DES depends on the strength of S-box. DES is broken with the... [more] ISEC2005-64
pp.149-154
 Results 41 - 45 of 45 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan