IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2023-03-15
16:10
Yamaguchi
(Primary: On-site, Secondary: Online)
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Using Sub-Block Dividing
Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) IT2022-134 ISEC2022-113 WBS2022-131 RCC2022-131
Type-2 Generalized Feistel Structures (GFSs) are a well-known structure for constructing secure block ciphers. At Indocr... [more] IT2022-134 ISEC2022-113 WBS2022-131 RCC2022-131
pp.419-426
ISEC, SITE, LOIS 2022-11-18
14:55
Online Online Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Consisting of Multiple SP Layers F-function
Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) ISEC2022-36 SITE2022-40 LOIS2022-20
Type-2 Generalized Feistel Structure (GFS) is known as a way to construct a secure block cipher. It is a $dm$-bit ($d ge... [more] ISEC2022-36 SITE2022-40 LOIS2022-20
pp.32-38
HWS, VLD [detail] 2021-03-04
13:50
Online Online Design and Evaluation of Efficient AES S-box Hardware with Optimization of Linear Mappings
Ayano Nakashima, Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2020-84 HWS2020-59
This paper presents a new AES S-Box hardware design based on the optimization of linear mappings by combining multiplica... [more] VLD2020-84 HWS2020-59
pp.91-96
ISEC, IT, WBS 2020-03-11
09:30
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Security Evaluation of Differential Attacks against KCipher-2
Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] IT2019-108 ISEC2019-104 WBS2019-57
pp.121-126
NLP 2018-04-26
17:15
Kumamoto Kumaoto Univ. Design of accelerating circuit for S-box based on a discretized chaotic map
Daisaburo Yoshioka (Sojo Univ.) NLP2018-13
(To be available after the conference date) [more] NLP2018-13
pp.59-63
EMCJ, IEE-EMC 2014-12-19
16:05
Shizuoka Shizuoka Univ. Security Evaluation of CSSAL Countermeasure against Side-Channel Attacks Using Frequency Spectrum Analysis
Cancio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine (Gifu Univ.) EMCJ2014-82
Information leakage on cryptographic devices are possible because of the correlation between the processed data and its ... [more] EMCJ2014-82
pp.75-80
CAS, NLP 2013-09-27
11:15
Gifu Satellite Campus, Gifu University [Invited Talk] CSSAL: Charge Sharing Symmetric Adiabatic Logic -- Case Study of Logic Circuit Design and Cryptographic Circuit Design --
Yasuhiro Takahashi, Cancio Monteiro, Toshikazu Sekine (Gifu Univ.) CAS2013-49 NLP2013-61
This paper reports basic circuit structures, design examples and applications of adiabatic logic, called charge sharing ... [more] CAS2013-49 NLP2013-61
pp.71-75
EMCJ, IEE-EMC 2012-12-14
15:55
Gifu Gifu Univ. Survey on Secure Adiabatic Logic for Countermeasure against Side-Channel Attacks
Cancio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine (Gifu Univ.) EMCJ2012-100
Side-channel attacks to reveal the secret information on cryptographic device has been extensively studied. One of such ... [more] EMCJ2012-100
pp.95-100
RECONF, VLD, CPSY, IPSJ-SLDM [detail] 2011-01-18
10:20
Kanagawa Keio Univ (Hiyoshi Campus) Evaluation of switchable AES S-box circuit using dynamic and partial reconfiguration
Naoko Yamada (Keio Univ.), Keisuke Iwai, Takakazu Kurokawa (NDA), Hideharu Amano (Keio Univ.) VLD2010-102 CPSY2010-57 RECONF2010-71
Recently, the threat of side channel attack to the hardware encryption circuits is increasing. In order
to cope with it... [more]
VLD2010-102 CPSY2010-57 RECONF2010-71
pp.127-132
ISEC 2009-12-16
13:00
Tokyo Kikai-Shinko-Kaikan Bldg. The feedback period length of Bijective function
Toru Ito (NETCOMSEC) ISEC2009-71
Using the pseudo-random series for the period length of the series if they have not been well studied. The bijective fun... [more] ISEC2009-71
pp.1-6
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan