IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 69  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-22
12:10
Okinawa OIST
(Primary: On-site, Secondary: Online)
Extension of the linear approximation for stream cipher ChaCha
Yurie Okada, Atsuko Miyaji (OU) ICSS2023-95
(To be available after the conference date) [more] ICSS2023-95
pp.188-193
ICSS 2023-11-16
16:25
Ishikawa IT Business Plaza Musashi and Online
(Primary: On-site, Secondary: Online)
Redefinition of pair-PNB and application to ChaCha differential linear analysis
Kai Izumi, Atsuko Miyaji (Osaka Univ.) ICSS2023-58
ChaCha is the stream cipher adopted in TLS1.3 and analyzing its security is important given its wide deployment. Differe... [more] ICSS2023-58
pp.49-56
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:00
Hokkaido Hokkaido Jichiro Kaikan Side-Channel Attacks on Unrolled Implementation of Trivium
Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.) ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44
This paper describes a side-channel attack (SCA) on unrolled implementation of Trivium. Previous SCAs on Trivium, such a... [more] ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44
pp.194-201
RCC, ISEC, IT, WBS 2023-03-15
15:45
Yamaguchi
(Primary: On-site, Secondary: Online)
New Differential Pair of Linear Differential Attack for Salsa
Kunjo Ri, Atsuko Miyaji (Handai) IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130
Salsa20 is a stream cipher designed by D.J.Bernstein in 2005, and research on its security is highly necessary in ensuri... [more] IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130
pp.412-418
ICSS, IPSJ-SPT 2023-03-13
16:50
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
New linear approximation and improved bias of ChaCha in differential linear analysis
Ryo Watanabe (Osaka Univ..), Atsuko Miyaji (Osaka Univ./JAIST) ICSS2022-69
Differential analysis has been widely used to analyze ChaCha, a stream cipher selected for TLS 1.3. Recently, differenti... [more] ICSS2022-69
pp.127-132
ICSS, IPSJ-SPT 2023-03-13
17:10
Okinawa Okinawaken Seinenkaikan
(Primary: On-site, Secondary: Online)
Improvement of Linear Approximations in Differential Linear Analysis of Stream Cipher ChaCha
Atsuki Nagai (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) ICSS2022-70
ChaCha, a stream cipher, is the successor to Salsa20, which is also a stream cipher, and is the only cipher adopted in T... [more] ICSS2022-70
pp.133-138
NLP 2022-11-25
11:10
Shiga
(Primary: On-site, Secondary: Online)
[Invited Talk] Chaotic time series and Ueda's theory of chaos
Takaya Miyano (Ritsumeikan Univ.) NLP2022-72
In terms of Ueda’s theory of chaos, i.e., the concept of randomly transitional oscillations, we discuss the implications... [more] NLP2022-72
pp.71-72
ISEC, SITE, LOIS 2022-11-18
09:00
Online Online Construction of Quantum-Resistant Crypotsystems combining CSIDH with Y-00 quantum stream cipher
Shigeo Tsuii, Osamu Hirota (Chuo Univ.) ISEC2022-31 SITE2022-35 LOIS2022-15
This paper describes total constructive structure of PQC (Post-quantum cryptography) including mathematical public key c... [more] ISEC2022-31 SITE2022-35 LOIS2022-15
pp.9-15
WBS, IT, ISEC 2021-03-04
10:15
Online Online Analysis of a new linear bias in the input/output difference of Salsa20
Ryo Watanabe, Atsuko Miyaji (Osaka Univ.) IT2020-120 ISEC2020-50 WBS2020-39
Among cryptographic techniques, Salsa20, a stream cipher, is the predecessor of ChaCha20,
which was selected for TLS 1... [more]
IT2020-120 ISEC2020-50 WBS2020-39
pp.52-57
ICSS, IPSJ-SPT 2021-03-02
15:20
Online Online The linear probability of the stream cipher Salsa
Junru Li (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) ICSS2020-51
Salsa20 is a stream cipher designed by D.J. Bernstein in 2005. One of the effective attack methods applied to Salsa20 is... [more] ICSS2020-51
pp.150-153
ISEC, IT, WBS 2020-03-11
09:30
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Security Evaluation of Differential Attacks against KCipher-2
Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] IT2019-108 ISEC2019-104 WBS2019-57
pp.121-126
NLP, NC
(Joint)
2019-01-24
09:50
Hokkaido The Centennial Hall, Hokkaido Univ. Messsage transcription using partial synchronization of intermittently coupled chaotic oscillators
Kenichiro Cho, Masashi Onishi, Takaya Miyano (Ritsumeikan Univ.) NLP2018-110
We have developed a method for the secure communication of a short message via the partial synchronization of intermitte... [more] NLP2018-110
pp.77-82
SITE, ISEC, LOIS 2018-11-03
11:00
Fukuoka   A Statistical Method for Searching Biases of Stream Ciphers
Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] ISEC2018-64 SITE2018-42 LOIS2018-24
pp.1-6
SITE, ISEC, LOIS 2018-11-03
11:30
Fukuoka   A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network
Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] ISEC2018-65 SITE2018-43 LOIS2018-25
pp.7-12
ICSS, IPSJ-SPT 2018-03-07
14:50
Hokkaido Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion
Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.) ICSS2017-62
As of April 2016, in newly proposed TLS1.3, as encryption methods of symmetric key encryption scheme, AES in the block e... [more] ICSS2017-62
pp.67-72
ISEC, WBS, IT 2017-03-09
10:25
Tokyo TOKAI University A Note on Key Dependency of Stream Cipher Grain v1
Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) IT2016-99 ISEC2016-89 WBS2016-75
Meet-in-the-middle (MITM) attack is a powerful cryptanalytic method for block ciphers. Several attacks for block ciphers... [more] IT2016-99 ISEC2016-89 WBS2016-75
pp.1-6
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
09:55
Yamaguchi   Further improving security of Vector Stream Cipher
Atsushi Iwasaki, Ken Umeno (Kyoto Univ.) ISEC2016-28 SITE2016-22 ICSS2016-28 EMM2016-36
Vector Stream Cipher (VSC) is a stream cipher which is very fast and is implemented lightly.
Some attacks for VSC have ... [more]
ISEC2016-28 SITE2016-22 ICSS2016-28 EMM2016-36
pp.115-120
ICSS, IPSJ-SPT 2016-03-04
13:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University A New Key Correlation in the Stream Cipher RC4
Daiki Michihiro (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/CREST) ICSS2015-65
The stream cipher RC4 has been analyzed by using various schemes since the algorithm was leaked
in 1994.In particular, ... [more]
ICSS2015-65
pp.111-116
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2015-07-02
11:05
Aichi NAGOYA TRADE & INDUSTRY CENTER Chosen Initial Vector Attack against Pseudorandom Number Generator QP-DYN
Kenichi Arai, Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science) ISEC2015-11 SITE2015-9 ICSS2015-21 EMM2015-19
QP--DYN is a new pseudorandom number generator (PRNG) proposed by Ohya and Accardi.
In 2014, Iriyama and Ohya introduce... [more]
ISEC2015-11 SITE2015-9 ICSS2015-21 EMM2015-19
pp.15-21
ISEC, IT, WBS 2015-03-02
10:30
Fukuoka The University of Kitakyushu Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more]
IT2014-62 ISEC2014-75 WBS2014-54
pp.1-4
 Results 1 - 20 of 69  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan