IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 30  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Integral Attack with Bit-Based Division Property on Block Cipher LBC
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
LBC is a block cipher proposed by Kapalova et al. in 2023. The block size is 64-bit, the secret key size is 80-bit, and ... [more] IT2023-131 ISEC2023-130 WBS2023-119 RCC2023-113
pp.350-357
ICSS 2023-11-16
16:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Redefinition of pair-PNB and application to ChaCha differential linear analysis
Kai Izumi, Atsuko Miyaji (Osaka Univ.) ICSS2023-58
ChaCha is the stream cipher adopted in TLS1.3 and analyzing its security is important given its wide deployment. Differe... [more] ICSS2023-58
pp.49-56
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-24
17:40
Hokkaido Hokkaido Jichiro Kaikan Statistical Key Recovery Attack Against the Peregrine Lattice-Based Signature Scheme
Moeto Suzuki (Kyoto Univ.), Xiuhan Lin (Shandong Univ.), Shiduo Zhang (Tsinghua Univ.), Thomas Espitau (PQShield), Yang Yu (Tsinghua Univ.), Mehdi Tibouchi, Masayuki Abe (NTT) ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30
The Peregrine signature scheme, which is a high-speed variant of Falcon, is one of the candidates in the ongoing Korean ... [more] ISEC2023-30 SITE2023-24 BioX2023-33 HWS2023-30 ICSS2023-27 EMM2023-30
pp.105-112
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:00
Hokkaido Hokkaido Jichiro Kaikan Higher Order Differential Property of Block Cipher LBC-3
Naoki Shibayama, Yasutaka Igarashi (Tokyo Univ. of Science) ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47
LBC-3 is a block cipher proposed by Nyssanbayeva et al. in 2022. The block size is 64-bit, the secret key size is 80-bit... [more] ISEC2023-47 SITE2023-41 BioX2023-50 HWS2023-47 ICSS2023-44 EMM2023-47
pp.214-220
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
10:20
Hokkaido Hokkaido Jichiro Kaikan On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures
Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48
The design of multiple-branch-based designs, such as the low-latency pseudo-random function Orthros, holds the potential... [more] ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48
pp.221-228
ISEC 2023-05-17
15:55
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros (from CT-RSA 2023)
Kazuma Taka, Kosei Sakamoto (Hyogo Univ.), Tatsuya Ishikawa (WDB KOUGAKU Co.,Ltd.), Takanori Isobe (Hyogo Univ.) ISEC2023-12
As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis ca... [more] ISEC2023-12
p.65
ICSS, IPSJ-SPT 2023-03-13
17:10
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Improvement of Linear Approximations in Differential Linear Analysis of Stream Cipher ChaCha
Atsuki Nagai (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) ICSS2022-70
ChaCha, a stream cipher, is the successor to Salsa20, which is also a stream cipher, and is the only cipher adopted in T... [more] ICSS2022-70
pp.133-138
EMM, IT 2019-05-24
13:30
Hokkaido Asahikawa International Conference Hall Higher Order Differential Property of BIG Block Cipher
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2019-12 EMM2019-12
BIG is a block cipher with 128-bit block length and 128-bit key length proposed by Demeri et.al in 2019. The number of r... [more] IT2019-12 EMM2019-12
pp.61-66
IT, ISEC, WBS 2019-03-08
16:45
Tokyo University of Electro-Communications [Invited Talk] Exceptional Experiences of my Research Activities on Modern Cryptography
Kazuo Ohta (UEC) IT2018-115 ISEC2018-121 WBS2018-116
As a fellow receiving a prize commemorative lecture, I look back on 36-year research and education experiences on modern... [more] IT2018-115 ISEC2018-121 WBS2018-116
p.249
EMM, IT 2017-05-22
16:00
Yamagata Yamagata University(Yonezawa Campus) Higher Order Differential Property of Few
Naoki Shibayama (Japan Air Self-Defense Force), Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science) IT2017-7 EMM2017-7
Few is a 64-bit block cipher proposed by Manoj et.al in 2014. The designer evaluated its strength against differential c... [more] IT2017-7 EMM2017-7
pp.37-42
ISEC, WBS, IT 2017-03-09
10:25
Tokyo TOKAI University A Note on Key Dependency of Stream Cipher Grain v1
Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) IT2016-99 ISEC2016-89 WBS2016-75
Meet-in-the-middle (MITM) attack is a powerful cryptanalytic method for block ciphers. Several attacks for block ciphers... [more] IT2016-99 ISEC2016-89 WBS2016-75
pp.1-6
COMP, ISEC 2016-12-22
13:00
Hiroshima Hiroshima University [Invited Talk] Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015)
Taechan Kim (NTT) ISEC2016-84 COMP2016-45
In this invited talk, we introduce the paper, "Extended tower number field sieve: A new complexity for the medium prime ... [more] ISEC2016-84 COMP2016-45
p.75
ICSS, IPSJ-SPT 2016-03-04
13:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University A New Key Correlation in the Stream Cipher RC4
Daiki Michihiro (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/CREST) ICSS2015-65
The stream cipher RC4 has been analyzed by using various schemes since the algorithm was leaked
in 1994.In particular, ... [more]
ICSS2015-65
pp.111-116
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
11:05
Hokkaido San-Refure Hakodate New Higher Order Differential Property of Piccolo
Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34
Piccolo is a 64-bit block cipher proposed by Shibutani et.al in 2011. It has been reported that 8-/10-round Piccolo with... [more] ISEC2014-34 SITE2014-29 ICSS2014-38 EMM2014-34
pp.247-252
ICSS, IPSJ-SPT 2014-03-28
15:10
Okinawa Meio Univiersity Higher Order Differential Property of LBlock(II)
Naoki Shibayama (Japan Air Self-Defense Force), Toshinobu Kaneko (Tokyo Univ. of Science) ICSS2013-94
LBlock is a block cipher with 64-bit block length and 80-bit key length, which was proposed by Wu et.al in 2011.It has b... [more] ICSS2013-94
pp.237-242
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
15:40
Hokkaido   Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform
Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22
HyRAL is a 128-bit block cipher proposed by Hirata in 2010. It has been reported that 14-round HyRAL with 256-bit secret... [more] ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22
pp.67-74
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-19
11:05
Hokkaido   Cryptanalysis of Rainbow Signature -- Enrico, you should have hacked further --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41
Thomae et al. have proposed cryptanalysis of Rainbow, a multivariate public key signature system.
The methodology of so... [more]
ISEC2013-39 SITE2013-34 ICSS2013-44 EMM2013-41
pp.275-279
IT, ISEC, WBS 2012-03-01
15:45
Kanagawa   New Saturation Characteristics of HyRAL
Naoki Shibayama, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2011-54 ISEC2011-81 WBS2011-55
HyRAL is the 128-bit block cipher proposed by Hirata in 2010. It has been shown that 13-round with 256-bit secret key is... [more] IT2011-54 ISEC2011-81 WBS2011-55
pp.53-60
ISEC, LOIS 2011-11-14
10:25
Osaka Osaka Electro-Communication University A Lattice Attack against (u|u+v)ΣPKC
Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-35 LOIS2011-29
In 2010, Kasahara et al. proposed a knapsack cryptosystem secure against a low-density attack.
The cryptosystem were a... [more]
ISEC2011-35 LOIS2011-29
pp.7-12
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
10:55
Shizuoka Shizuoka University Security Evaluation of HyRAL against Saturation Cryptanalysis(II)
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18
In this paper, we focuse on the saturation attack on block cipher HyRAL that was proposed by Hirata in 2010.
It has bee... [more]
ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18
pp.103-109
 Results 1 - 20 of 30  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan