Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
HWS |
2021-04-12 13:30 |
Tokyo |
Tokyo University/Online (Primary: On-site, Secondary: Online) |
[Invited Talk]
PFB: Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers Yusuke Naito (Mitsubishi Electric Corp.), Takeshi Sugawara (UEC) HWS2021-6 |
This invited abstract is based on the paper by the same authors. Choosing a small block size is the common design strate... [more] |
HWS2021-6 p.26 |
WBS, IT, ISEC |
2021-03-04 09:25 |
Online |
Online |
Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.) IT2020-118 ISEC2020-48 WBS2020-37 |
A secure block cipher can be obtained from tweakable block ciphers (TBCs). In this paper, by using a TBC with $n$-bit bl... [more] |
IT2020-118 ISEC2020-48 WBS2020-37 pp.37-44 |
HWS, VLD [detail] |
2021-03-04 13:25 |
Online |
Online |
A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58 |
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] |
VLD2020-83 HWS2020-58 pp.85-90 |
HWS, VLD [detail] |
2021-03-04 15:20 |
Online |
Online |
Power Analysis Attack on a Unrolled Midori128 and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62 |
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] |
VLD2020-87 HWS2020-62 pp.108-113 |
ICD, HWS [detail] |
2020-10-26 15:45 |
Online |
Online |
Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26 |
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] |
HWS2020-37 ICD2020-26 pp.71-76 |
NS, IN (Joint) |
2020-03-06 11:00 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
IOTA-Based Access Control Framework for the Internet of Things Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara (NAIST) NS2019-230 |
With the rapid dissemination of the Internet of Things (IoT), the number of resources deployed in IoT systems such as d... [more] |
NS2019-230 pp.295-300 |
EMM, IT |
2019-05-24 13:30 |
Hokkaido |
Asahikawa International Conference Hall |
Higher Order Differential Property of BIG Block Cipher Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2019-12 EMM2019-12 |
BIG is a block cipher with 128-bit block length and 128-bit key length proposed by Demeri et.al in 2019. The number of r... [more] |
IT2019-12 EMM2019-12 pp.61-66 |
IT, ISEC, WBS |
2019-03-08 16:45 |
Tokyo |
University of Electro-Communications |
[Invited Talk]
Exceptional Experiences of my Research Activities on Modern Cryptography Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116 |
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] |
IT2018-115 ISEC2018-121 WBS2018-116 p.249 |
HWS, VLD |
2019-03-01 16:20 |
Okinawa |
Okinawa Ken Seinen Kaikan |
Low-Cost Power Analysis Countermeasures for Unrolled Architecture Implementation PRINCE Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-134 HWS2018-97 |
Lightweight block ciphers, which can be implemented with low cost, are suitable for improving the safety of small device... [more] |
VLD2018-134 HWS2018-97 pp.243-248 |
ISEC |
2018-09-07 11:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC (from CRYPTO 2018) Kan Yasuda (NTT) ISEC2018-55 |
In this talk we explain the content of “Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC... [more] |
ISEC2018-55 p.27 |
ISEC |
2018-05-16 16:30 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
[Invited Talk]
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers Takanori Isobe (Univ. of Hyogo), Kyoji Shibutani (Nagoya Univ.) ISEC2018-11 |
In this invited talk, we introduce our paper presented in international cryptographic conference ASIACRYPT 2017 held on ... [more] |
ISEC2018-11 p.61 |
NLP |
2018-04-26 14:10 |
Kumamoto |
Kumaoto Univ. |
A Study on Security Enhancement of 64-Bit Block Cipher Systems with Ring Structure Toshihiro Ichiki, Akio Tsuneda (Kumamoto Univ.) NLP2018-7 |
In a modern society, safety is required when exchanging information. In order to secure its safety, we are taking measur... [more] |
NLP2018-7 pp.31-34 |
EMM, IT |
2017-05-22 16:00 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Higher Order Differential Property of Few Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2017-7 EMM2017-7 |
Few is a 64-bit block cipher proposed by Manoj et.al in 2014. The designer evaluated its strength against differential c... [more] |
IT2017-7 EMM2017-7 pp.37-42 |
ISEC, WBS, IT |
2017-03-09 11:25 |
Tokyo |
TOKAI University |
[Invited Talk]
Recent Advances in Whitebox Cryptgraphy
-- Efficient and Robust Constructions and New Attacks -- Takanori Isobe (Sony Global M&O Corp.) IT2016-102 ISEC2016-92 WBS2016-78 |
Whitebox cryptography is a technique to protect software implementations of cryptographic algorithms
in untrusted envir... [more] |
IT2016-102 ISEC2016-92 WBS2016-78 p.23 |
ISEC, WBS, IT |
2017-03-09 13:35 |
Tokyo |
TOKAI University |
A consideration of Meet-in-the-middle Attack for Multiple Encryption Algorithm Yohei Maezawa, Munetoshi Iwakiri (NDA) IT2016-103 ISEC2016-93 WBS2016-79 |
It is known that the security strength can be lower than the total key length used for multiple encryption with meet-in-... [more] |
IT2016-103 ISEC2016-93 WBS2016-79 pp.25-31 |
NLP |
2016-12-12 15:50 |
Aichi |
Chukyo Univ. |
Fault Analysis for Midori Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NLP2016-90 |
Lightweight block ciphers, which can be utilized in low power and small area, have attracted attention in the security o... [more] |
NLP2016-90 pp.33-38 |
CAS, NLP |
2016-10-28 10:20 |
Tokyo |
|
Power Analysis Attack for Midori Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2016-53 NLP2016-79 |
Recently, lightweight block ciphers, which can be implemented on small area and low energy, have attracted attention. Mi... [more] |
CAS2016-53 NLP2016-79 pp.79-84 |
ICSS, IPSJ-SPT |
2016-03-04 15:10 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Verification of Division Property and High-Order Differential Characteristic of Lightweight Blockcipher Piccolo Takuya Kubo, Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science) ICSS2015-72 |
Integral property has been generalized and redened by the division property that was proposed by Todo of NTT in EUROCRY... [more] |
ICSS2015-72 pp.153-158 |
ICSS, IPSJ-SPT |
2016-03-04 15:40 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
Higher-order differential attack on the round-reduced variants of the block cipher Yusuke Takahashi, Yasutaka Igarashi, Toshinobu Kaneko (TUS) ICSS2015-73 |
Midori64 proposed by Banik et al. in 2015 is an SPN-type block cipher with 128-bit secret key. The designers have evalua... [more] |
ICSS2015-73 pp.159-164 |
VLD |
2016-03-01 10:30 |
Okinawa |
Okinawa Seinen Kaikan |
Electromagnetic Analysis Attack for Simeck and Simon Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2015-121 |
The risk of attack against IoT devices has been increased. Since IoT devices require constraint of area and power consum... [more] |
VLD2015-121 pp.61-66 |