Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
VLD, HWS, ICD |
2024-03-01 10:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
Pseudo-random Number Generator Design Robust against Fault Injection Attacks Sota Kado, Mingyu Yang, Yuko Hara (Tokyo Tech) VLD2023-123 HWS2023-83 ICD2023-112 |
Fault Injection Attacks (FIA) using physical methods are a significant threat for embedded devices to process various ap... [more] |
VLD2023-123 HWS2023-83 ICD2023-112 pp.125-130 |
DC |
2023-02-28 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg (Primary: On-site, Secondary: Online) |
A Seed Generation Method for Multiple Random Pattern Resistant Transition Faults for BIST Yangling Xu, Rei Miura, Toshinori Hosokawa (Nihon Univ), Masayoshi Yoshimura (KSU) DC2022-89 |
With shrinking feature sizes, growing clock frequencies, and decreasing power supply voltage, modern very large integrat... [more] |
DC2022-89 pp.39-44 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 14:50 |
Online |
Online |
Distributed Random Number Generation Method on Smart Contracts Kentaro Sako (Waseda Univ), Shin'ichiro Matsuo (Georgetown Univ), Tatsuya Mori (Waseda Univ) ISEC2022-25 SITE2022-29 BioX2022-50 HWS2022-25 ICSS2022-33 EMM2022-33 |
We propose N-choice game (NCG), a decentralized pseudo-random number generation method that can be executed on smart con... [more] |
ISEC2022-25 SITE2022-29 BioX2022-50 HWS2022-25 ICSS2022-33 EMM2022-33 pp.104-109 |
COMP, ISEC |
2016-12-21 13:40 |
Hiroshima |
Hiroshima University |
[Invited Talk]
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results Jean Paul Degabriele, Kenneth Paterson (RHUL), Jacob Schuldt (AIST), Joanne Woodage (RHUL) ISEC2016-75 COMP2016-36 |
In this talk, we continue the foundational work on backdoored pseudorandom generators (PRGs) initiated by Dodis et al., ... [more] |
ISEC2016-75 COMP2016-36 p.27 |
SCE |
2015-08-05 10:50 |
Kanagawa |
Yokohama National Univ. |
Evaluation of operation margin of superconducting random number generator system composed of 2types random number generator Hiromichi Sugata, Yuki Yamanashi, Nobuyuki Yoshikawa (Yokohama National Univ) SCE2015-18 |
Physical random number receiving attention to improve safety of cryptography. However, the generation rate of physical r... [more] |
SCE2015-18 pp.59-62 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 11:05 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Chosen Initial Vector Attack against Pseudorandom Number Generator QP-DYN Kenichi Arai, Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science) ISEC2015-11 SITE2015-9 ICSS2015-21 EMM2015-19 |
QP--DYN is a new pseudorandom number generator (PRNG) proposed by Ohya and Accardi.
In 2014, Iriyama and Ohya introduce... [more] |
ISEC2015-11 SITE2015-9 ICSS2015-21 EMM2015-19 pp.15-21 |
ICSS |
2015-03-04 09:50 |
Okinawa |
Meio Univiersity |
A study on the safety of the pseudo-random number generator in RFID Hiroyuki Sato (JAIST), Atsuko Miyaji (JAIST/JST CREST), Chunhua Su (JAIST) ICSS2014-75 |
One of the ways of verifing that whether pseudo-random number generator (PRNG) meets the security requirements or not is... [more] |
ICSS2014-75 pp.73-78 |
NLP |
2012-11-19 14:20 |
Miyagi |
Ishinomaki Senshu University |
Study on Testing for Randomness of Pseudo-Random Number Sequence with NIST SP800-22 rev.1a Hitoaki Yoshida, Takeshi Murakami (Iwate Univ.), Satoshi Kawamura (Ishinomaki Senshu Univ.) NLP2012-78 |
NIST Special Publication 800-22, Statistical Test Suite for Random and Pseudo-random Number Generators for Cryptographic... [more] |
NLP2012-78 pp.13-18 |
IT, ISEC, WBS |
2010-03-05 15:20 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
On key recovery for Enocoro with weak key in related-key attack scenario Yasutaka Igarashi, Kazuto Okamoto, Toshinobu Kaneko (Tokyo Univ. of Science) IT2009-113 ISEC2009-121 WBS2009-92 |
Enocoro is a hardware-oriented pseudorandom number generator (PRNG), whose structure is similar to the PRNG named PANAMA... [more] |
IT2009-113 ISEC2009-121 WBS2009-92 pp.275-280 |
WBS, IT, ISEC |
2009-03-09 16:20 |
Hokkaido |
Hakodate Mirai Univ. |
Analysis of Fast Correlation Attack Using Dynamically Constructed Parity Checks Youji Fukuta (Aichi Univ. of Edu.), Yoshiaki Shiraishi (Nagoya Inst. of Tech.), Masami Mohri (Gifu Univ.), Masakatu Morii (Kobe Univ.) IT2008-53 ISEC2008-111 WBS2008-66 |
Stream cipher is one of primitive classes in symmetric key ciphers where plaintext symbols are combined with pseudo rand... [more] |
IT2008-53 ISEC2008-111 WBS2008-66 pp.57-64 |
ISEC, LOIS |
2005-11-15 11:35 |
Fukuoka |
Kitakyushu Science and Research Park |
Some Results of Brute Force Attack for a Random Seed and Security Evaluation of Pseudo Random Number Generator using Logistic-Mapping Takeru Miyazaki (The Univ. of Kitakyushu), Shunsuke Araki (Kyushu Inst. of Tech.), Satoshi Uehara (The Univ. of Kitakyushu), Kyoki Imamura (Kyushu Inst. of Tech.) |
Security of Pseudo Random Number Generators(PRNGs), which means no one except valid user can
specify unknown outputs fr... [more] |
ISEC2005-103 OIS2005-66 pp.29-33 |
NLP |
2005-07-25 14:20 |
Hokkaido |
Future Univ.-Hakodate |
Pseudo Random Number Generator Based on Chaos
-- Relationship Between Lyapunov Exponent and Randomness -- Shin-ichi Akiyama (FUN), Satoshi Kawamura (Ishinomaki Senshu Univ.), Mamoru Miura (FUN) |
This paper deals with a pseudo random number generator using chaos neural network. The relationship between lyapunov exp... [more] |
NLP2005-32 pp.23-25 |
NLP |
2004-05-18 13:25 |
Miyagi |
Tohoku Univ. |
* Satoshi Kawamura (Ishinomaki Senshu Univ.), Hitoaki Yoshida (Iwate Univ.), Mamoru Miura (Future Univ. Hakodate) |
In this paper, we proposed a pseudo random number generators (PRNG) using the chaos neural network (CNN). In the propose... [more] |
NLP2004-6 pp.29-34 |