Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 - 2024-03-14 |
Osaka |
Osaka Univ. (Suita Campus) |
Integral Attack with Bit-Based Division Property on Block Cipher LBC Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 |
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] |
IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113 pp.350-357 |
ICSS |
2023-11-16 16:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Redefinition of pair-PNB and application to ChaCha differential linear analysis Kai Izumi, Atsuko Miyaji (Osaka Univ.) ICSS2023-58 |
ChaCha is the stream cipher adopted in TLS1.3 and analyzing its security is important given its wide deployment. Differe... [more] |
ICSS2023-58 pp.49-56 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-24 17:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Statistical Key Recovery Attack Against the Peregrine Lattice-Based Signature Scheme Moeto Suzuki (Kyoto Univ.), Xiuhan Lin (Shandong Univ.), Shiduo Zhang (Tsinghua Univ.), Thomas Espitau (PQShield), Yang Yu (Tsinghua Univ.), Mehdi Tibouchi, Masayuki Abe (NTT) ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30 |
The Peregrine signature scheme, which is a high-speed variant of Falcon, is one of the candidates in the ongoing Korean ... [more] |
ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30 pp.105-112 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Higher Order Differential Property of Block Cipher LBC-3 Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47 |
LBC-3 is a block cipher proposed by Nyssanbayeva et al. in 2022. The block size is 64-bit, the secret key size is 80-bit... [more] |
ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47 pp.214-220 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 |
The design of multiple-branch-based designs, such as the low-latency pseudo-random function Orthros, holds the potential... [more] |
ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 pp.221-228 |
ISEC |
2023-05-17 15:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros (from CT-RSA 2023) Kazuma Taka, Kosei Sakamoto (Hyogo Univ.), Tatsuya Ishikawa (WDB KOUGAKU Co.,Ltd.), Takanori Isobe (Hyogo Univ.) ISEC2023-12 |
As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis ca... [more] |
ISEC2023-12 p.65 |
ICSS, IPSJ-SPT |
2023-03-13 17:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Improvement of Linear Approximations in Differential Linear Analysis of Stream Cipher ChaCha Atsuki Nagai (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) ICSS2022-70 |
ChaCha, a stream cipher, is the successor to Salsa20, which is also a stream cipher, and is the only cipher adopted in T... [more] |
ICSS2022-70 pp.133-138 |
EMM, IT |
2019-05-24 13:30 |
Hokkaido |
Asahikawa International Conference Hall |
Higher Order Differential Property of BIG Block Cipher Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2019-12 EMM2019-12 |
BIG is a block cipher with 128-bit block length and 128-bit key length proposed by Demeri et.al in 2019. The number of r... [more] |
IT2019-12 EMM2019-12 pp.61-66 |
IT, ISEC, WBS |
2019-03-08 16:45 |
Tokyo |
University of Electro-Communications |
[Invited Talk]
Exceptional Experiences of my Research Activities on Modern Cryptography Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116 |
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] |
IT2018-115 ISEC2018-121 WBS2018-116 p.249 |
EMM, IT |
2017-05-22 16:00 |
Yamagata |
Yamagata University(Yonezawa Campus) |
Higher Order Differential Property of Few Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2017-7 EMM2017-7 |
Few is a 64-bit block cipher proposed by Manoj et.al in 2014. The designer evaluated its strength against differential c... [more] |
IT2017-7 EMM2017-7 pp.37-42 |
ISEC, WBS, IT |
2017-03-09 10:25 |
Tokyo |
TOKAI University |
A Note on Key Dependency of Stream Cipher Grain v1 Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) IT2016-99 ISEC2016-89 WBS2016-75 |
Meet-in-the-middle (MITM) attack is a powerful cryptanalytic method for block ciphers. Several attacks for block ciphers... [more] |
IT2016-99 ISEC2016-89 WBS2016-75 pp.1-6 |
COMP, ISEC |
2016-12-22 13:00 |
Hiroshima |
Hiroshima University |
[Invited Talk]
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015) Taechan Kim (NTT) ISEC2016-84 COMP2016-45 |
In this invited talk, we introduce the paper, "Extended tower number field sieve: A new complexity for the medium prime ... [more] |
ISEC2016-84 COMP2016-45 p.75 |
ICSS, IPSJ-SPT |
2016-03-04 13:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A New Key Correlation in the Stream Cipher RC4 Daiki Michihiro (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/CREST) ICSS2015-65 |
The stream cipher RC4 has been analyzed by using various schemes since the algorithm was leaked
in 1994.In particular, ... [more] |
ICSS2015-65 pp.111-116 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-04 11:05 |
Hokkaido |
San-Refure Hakodate |
New Higher Order Differential Property of Piccolo Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34 |
Piccolo is a 64-bit block cipher proposed by Shibutani et.al in 2011. It has been reported that 8-/10-round Piccolo with... [more] |
ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34 pp.247-252 |
ICSS, IPSJ-SPT |
2014-03-28 15:10 |
Okinawa |
Meio Univiersity |
Higher Order Differential Property of LBlock(II) Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) ICSS2013-94 |
LBlock is a block cipher with 64-bit block length and 80-bit key length, which was proposed by Wu et.al in 2011.It has b... [more] |
ICSS2013-94 pp.237-242 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 15:40 |
Hokkaido |
|
Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22 |
HyRAL is a 128-bit block cipher proposed by Hirata in 2010. It has been reported that 14-round HyRAL with 256-bit secret... [more] |
ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22 pp.67-74 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 11:05 |
Hokkaido |
|
Cryptanalysis of Rainbow Signature
-- Enrico, you should have hacked further -- Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41 |
Thomae et al. have proposed cryptanalysis of Rainbow, a multivariate public key signature system.
The methodology of so... [more] |
ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41 pp.275-279 |
IT, ISEC, WBS |
2012-03-01 15:45 |
Kanagawa |
|
New Saturation Characteristics of HyRAL Naoki Shibayama, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2011-54 ISEC2011-81 WBS2011-55 |
HyRAL is the 128-bit block cipher proposed by Hirata in 2010. It has been shown that 13-round with 256-bit secret key is... [more] |
IT2011-54 ISEC2011-81 WBS2011-55 pp.53-60 |
ISEC, LOIS |
2011-11-14 10:25 |
Osaka |
Osaka Electro-Communication University |
A Lattice Attack against (u|u+v)ΣPKC Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-35 LOIS2011-29 |
In 2010, Kasahara et al. proposed a knapsack cryptosystem secure against a low-density attack.
The cryptosystem were a... [more] |
ISEC2011-35 LOIS2011-29 pp.7-12 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 10:55 |
Shizuoka |
Shizuoka University |
Security Evaluation of HyRAL against Saturation Cryptanalysis(II) Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18 |
In this paper, we focuse on the saturation attack on block cipher HyRAL that was proposed by Hirata in 2010.
It has bee... [more] |
ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18 pp.103-109 |