IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 40 of 79 [Previous]  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
HWS 2021-04-12
13:30
Tokyo Tokyo University/Online
(Primary: On-site, Secondary: Online)
[Invited Talk] PFB: Lightweight Authenticated Encryption Mode of Operation for Tweakable Block Ciphers
Yusuke Naito (Mitsubishi Electric Corp.), Takeshi Sugawara (UEC) HWS2021-6
This invited abstract is based on the paper by the same authors. Choosing a small block size is the common design strate... [more] HWS2021-6
p.26
WBS, IT, ISEC 2021-03-04
09:25
Online Online Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers
Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.) IT2020-118 ISEC2020-48 WBS2020-37
A secure block cipher can be obtained from tweakable block ciphers (TBCs). In this paper, by using a TBC with $n$-bit bl... [more] IT2020-118 ISEC2020-48 WBS2020-37
pp.37-44
HWS, VLD [detail] 2021-03-04
13:25
Online Online A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design
Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] VLD2020-83 HWS2020-58
pp.85-90
HWS, VLD [detail] 2021-03-04
15:20
Online Online Power Analysis Attack on a Unrolled Midori128 and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2020-87 HWS2020-62
The lightweight block cipher Midori has been proposed as a cryptographic algorithm for low-power operation, which is imp... [more] VLD2020-87 HWS2020-62
pp.108-113
ICD, HWS [detail] 2020-10-26
15:45
Online Online Low-Latency Countermeasure Circuit Oriented Hardware Trojan and its Evaluation
Shu Takemoto, Yoshiya Ikezaki, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) HWS2020-37 ICD2020-26
Outsourcing and the use of IP are the mainstream in the design and manufacturing of system LSIs. On the other hand, the ... [more] HWS2020-37 ICD2020-26
pp.71-76
NS, IN
(Joint)
2020-03-06
11:00
Okinawa Royal Hotel Okinawa Zanpa-Misaki
(Cancelled but technical report was issued)
IOTA-Based Access Control Framework for the Internet of Things
Ruka Nakanishi, Yuanyu Zhang, Masahiro Sasabe, Shoji Kasahara (NAIST) NS2019-230
With the rapid dissemination of the Internet of Things (IoT), the number of resources deployed in IoT systems such as d... [more] NS2019-230
pp.295-300
EMM, IT 2019-05-24
13:30
Hokkaido Asahikawa International Conference Hall Higher Order Differential Property of BIG Block Cipher
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2019-12 EMM2019-12
BIG is a block cipher with 128-bit block length and 128-bit key length proposed by Demeri et.al in 2019. The number of r... [more] IT2019-12 EMM2019-12
pp.61-66
IT, ISEC, WBS 2019-03-08
16:45
Tokyo University of Electro-Communications [Invited Talk] Exceptional Experiences of my Research Activities on Modern Cryptography
Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] IT2018-115 ISEC2018-121 WBS2018-116
p.249
HWS, VLD 2019-03-01
16:20
Okinawa Okinawa Ken Seinen Kaikan Low-Cost Power Analysis Countermeasures for Unrolled Architecture Implementation PRINCE
Shu Takemoto, Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2018-134 HWS2018-97
Lightweight block ciphers, which can be implemented with low cost, are suitable for improving the safety of small device... [more] VLD2018-134 HWS2018-97
pp.243-248
ISEC 2018-09-07
11:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC (from CRYPTO 2018)
Kan Yasuda (NTT) ISEC2018-55
In this talk we explain the content of “Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC... [more] ISEC2018-55
p.27
ISEC 2018-05-16
16:30
Tokyo Ookayama Campus, Tokyo Institute of Technology [Invited Talk] New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers
Takanori Isobe (Univ. of Hyogo), Kyoji Shibutani (Nagoya Univ.) ISEC2018-11
In this invited talk, we introduce our paper presented in international cryptographic conference ASIACRYPT 2017 held on ... [more] ISEC2018-11
p.61
NLP 2018-04-26
14:10
Kumamoto Kumaoto Univ. A Study on Security Enhancement of 64-Bit Block Cipher Systems with Ring Structure
Toshihiro Ichiki, Akio Tsuneda (Kumamoto Univ.) NLP2018-7
In a modern society, safety is required when exchanging information. In order to secure its safety, we are taking measur... [more] NLP2018-7
pp.31-34
EMM, IT 2017-05-22
16:00
Yamagata Yamagata University(Yonezawa Campus) Higher Order Differential Property of Few
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2017-7 EMM2017-7
Few is a 64-bit block cipher proposed by Manoj et.al in 2014. The designer evaluated its strength against differential c... [more] IT2017-7 EMM2017-7
pp.37-42
ISEC, WBS, IT 2017-03-09
11:25
Tokyo TOKAI University [Invited Talk] Recent Advances in Whitebox Cryptgraphy -- Efficient and Robust Constructions and New Attacks --
Takanori Isobe (Sony Global M&O Corp.) IT2016-102 ISEC2016-92 WBS2016-78
Whitebox cryptography is a technique to protect software implementations of cryptographic algorithms
in untrusted envir... [more]
IT2016-102 ISEC2016-92 WBS2016-78
p.23
ISEC, WBS, IT 2017-03-09
13:35
Tokyo TOKAI University A consideration of Meet-in-the-middle Attack for Multiple Encryption Algorithm
Yohei Maezawa, Munetoshi Iwakiri (NDA) IT2016-103 ISEC2016-93 WBS2016-79
It is known that the security strength can be lower than the total key length used for multiple encryption with meet-in-... [more] IT2016-103 ISEC2016-93 WBS2016-79
pp.25-31
NLP 2016-12-12
15:50
Aichi Chukyo Univ. Fault Analysis for Midori
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) NLP2016-90
Lightweight block ciphers, which can be utilized in low power and small area, have attracted attention in the security o... [more] NLP2016-90
pp.33-38
CAS, NLP 2016-10-28
10:20
Tokyo   Power Analysis Attack for Midori
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) CAS2016-53 NLP2016-79
Recently, lightweight block ciphers, which can be implemented on small area and low energy, have attracted attention. Mi... [more] CAS2016-53 NLP2016-79
pp.79-84
ICSS, IPSJ-SPT 2016-03-04
15:10
Kyoto Academic Center for Computing and Media Studies, Kyoto University Verification of Division Property and High-Order Differential Characteristic of Lightweight Blockcipher Piccolo
Takuya Kubo, Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science) ICSS2015-72
Integral property has been generalized and rede ned by the division property that was proposed by Todo of NTT in EUROCRY... [more] ICSS2015-72
pp.153-158
ICSS, IPSJ-SPT 2016-03-04
15:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Higher-order differential attack on the round-reduced variants of the block cipher
Yusuke Takahashi, Yasutaka Igarashi, Toshinobu Kaneko (TUS) ICSS2015-73
Midori64 proposed by Banik et al. in 2015 is an SPN-type block cipher with 128-bit secret key. The designers have evalua... [more] ICSS2015-73
pp.159-164
VLD 2016-03-01
10:30
Okinawa Okinawa Seinen Kaikan Electromagnetic Analysis Attack for Simeck and Simon
Yusuke Nozaki, Masaya Yoshikawa (Meijo Univ.) VLD2015-121
The risk of attack against IoT devices has been increased. Since IoT devices require constraint of area and power consum... [more] VLD2015-121
pp.61-66
 Results 21 - 40 of 79 [Previous]  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan