Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2023-03-15 16:10 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Using Sub-Block Dividing Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) IT2022-134 ISEC2022-113 WBS2022-131 RCC2022-131 |
Type-2 Generalized Feistel Structures (GFSs) are a well-known structure for constructing secure block ciphers. At Indocr... [more] |
IT2022-134 ISEC2022-113 WBS2022-131 RCC2022-131 pp.419-426 |
ISEC, SITE, LOIS |
2022-11-18 14:55 |
Online |
Online |
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Consisting of Multiple SP Layers F-function Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) ISEC2022-36 SITE2022-40 LOIS2022-20 |
Type-2 Generalized Feistel Structure (GFS) is known as a way to construct a secure block cipher. It is a $dm$-bit ($d ge... [more] |
ISEC2022-36 SITE2022-40 LOIS2022-20 pp.32-38 |
HWS, VLD [detail] |
2021-03-04 13:50 |
Online |
Online |
Design and Evaluation of Efficient AES S-box Hardware with Optimization of Linear Mappings Ayano Nakashima, Rei Ueno, Naofumi Homma (Tohoku Univ.) VLD2020-84 HWS2020-59 |
This paper presents a new AES S-Box hardware design based on the optimization of linear mappings by combining multiplica... [more] |
VLD2020-84 HWS2020-59 pp.91-96 |
ISEC, IT, WBS |
2020-03-11 09:30 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Security Evaluation of Differential Attacks against KCipher-2 Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57 |
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] |
IT2019-108 ISEC2019-104 WBS2019-57 pp.121-126 |
NLP |
2018-04-26 17:15 |
Kumamoto |
Kumaoto Univ. |
Design of accelerating circuit for S-box based on a discretized chaotic map Daisaburo Yoshioka (Sojo Univ.) NLP2018-13 |
(To be available after the conference date) [more] |
NLP2018-13 pp.59-63 |
EMCJ, IEE-EMC |
2014-12-19 16:05 |
Shizuoka |
Shizuoka Univ. |
Security Evaluation of CSSAL Countermeasure against Side-Channel Attacks Using Frequency Spectrum Analysis Cancio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine (Gifu Univ.) EMCJ2014-82 |
Information leakage on cryptographic devices are possible because of the correlation between the processed data and its ... [more] |
EMCJ2014-82 pp.75-80 |
CAS, NLP |
2013-09-27 11:15 |
Gifu |
Satellite Campus, Gifu University |
[Invited Talk]
CSSAL: Charge Sharing Symmetric Adiabatic Logic
-- Case Study of Logic Circuit Design and Cryptographic Circuit Design -- Yasuhiro Takahashi, Cancio Monteiro, Toshikazu Sekine (Gifu Univ.) CAS2013-49 NLP2013-61 |
This paper reports basic circuit structures, design examples and applications of adiabatic logic, called charge sharing ... [more] |
CAS2013-49 NLP2013-61 pp.71-75 |
EMCJ, IEE-EMC |
2012-12-14 15:55 |
Gifu |
Gifu Univ. |
Survey on Secure Adiabatic Logic for Countermeasure against Side-Channel Attacks Cancio Monteiro, Yasuhiro Takahashi, Toshikazu Sekine (Gifu Univ.) EMCJ2012-100 |
Side-channel attacks to reveal the secret information on cryptographic device has been extensively studied. One of such ... [more] |
EMCJ2012-100 pp.95-100 |
RECONF, VLD, CPSY, IPSJ-SLDM [detail] |
2011-01-18 10:20 |
Kanagawa |
Keio Univ (Hiyoshi Campus) |
Evaluation of switchable AES S-box circuit using dynamic and partial reconfiguration Naoko Yamada (Keio Univ.), Keisuke Iwai, Takakazu Kurokawa (NDA), Hideharu Amano (Keio Univ.) VLD2010-102 CPSY2010-57 RECONF2010-71 |
Recently, the threat of side channel attack to the hardware encryption circuits is increasing. In order
to cope with it... [more] |
VLD2010-102 CPSY2010-57 RECONF2010-71 pp.127-132 |
ISEC |
2009-12-16 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
The feedback period length of Bijective function Toru Ito (NETCOMSEC) ISEC2009-71 |
Using the pseudo-random series for the period length of the series if they have not been well studied. The bijective fun... [more] |
ISEC2009-71 pp.1-6 |