Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-22 12:10 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Extension of the linear approximation for stream cipher ChaCha Yurie Okada, Atsuko Miyaji (OU) ICSS2023-95 |
(To be available after the conference date) [more] |
ICSS2023-95 pp.188-193 |
ICSS |
2023-11-16 16:25 |
Ishikawa |
IT Business Plaza Musashi and Online (Primary: On-site, Secondary: Online) |
Redefinition of pair-PNB and application to ChaCha differential linear analysis Kai Izumi, Atsuko Miyaji (Osaka Univ.) ICSS2023-58 |
ChaCha is the stream cipher adopted in TLS1.3 and analyzing its security is important given its wide deployment. Differe... [more] |
ICSS2023-58 pp.49-56 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Side-Channel Attacks on Unrolled Implementation of Trivium Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.) ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 |
This paper describes a side-channel attack (SCA) on unrolled implementation of Trivium. Previous SCAs on Trivium, such a... [more] |
ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 pp.194-201 |
RCC, ISEC, IT, WBS |
2023-03-15 15:45 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
New Differential Pair of Linear Differential Attack for Salsa Kunjo Ri, Atsuko Miyaji (Handai) IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130 |
Salsa20 is a stream cipher designed by D.J.Bernstein in 2005, and research on its security is highly necessary in ensuri... [more] |
IT2022-133 ISEC2022-112 WBS2022-130 RCC2022-130 pp.412-418 |
ICSS, IPSJ-SPT |
2023-03-13 16:50 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
New linear approximation and improved bias of ChaCha in differential linear analysis Ryo Watanabe (Osaka Univ..), Atsuko Miyaji (Osaka Univ./JAIST) ICSS2022-69 |
Differential analysis has been widely used to analyze ChaCha, a stream cipher selected for TLS 1.3. Recently, differenti... [more] |
ICSS2022-69 pp.127-132 |
ICSS, IPSJ-SPT |
2023-03-13 17:10 |
Okinawa |
Okinawaken Seinenkaikan (Primary: On-site, Secondary: Online) |
Improvement of Linear Approximations in Differential Linear Analysis of Stream Cipher ChaCha Atsuki Nagai (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) ICSS2022-70 |
ChaCha, a stream cipher, is the successor to Salsa20, which is also a stream cipher, and is the only cipher adopted in T... [more] |
ICSS2022-70 pp.133-138 |
NLP |
2022-11-25 11:10 |
Shiga |
(Primary: On-site, Secondary: Online) |
[Invited Talk]
Chaotic time series and Ueda's theory of chaos Takaya Miyano (Ritsumeikan Univ.) NLP2022-72 |
In terms of Ueda’s theory of chaos, i.e., the concept of randomly transitional oscillations, we discuss the implications... [more] |
NLP2022-72 pp.71-72 |
ISEC, SITE, LOIS |
2022-11-18 09:00 |
Online |
Online |
Construction of Quantum-Resistant Crypotsystems combining CSIDH with Y-00 quantum stream cipher Shigeo Tsuii, Osamu Hirota (Chuo Univ.) ISEC2022-31 SITE2022-35 LOIS2022-15 |
This paper describes total constructive structure of PQC (Post-quantum cryptography) including mathematical public key c... [more] |
ISEC2022-31 SITE2022-35 LOIS2022-15 pp.9-15 |
WBS, IT, ISEC |
2021-03-04 10:15 |
Online |
Online |
Analysis of a new linear bias in the input/output difference of Salsa20 Ryo Watanabe, Atsuko Miyaji (Osaka Univ.) IT2020-120 ISEC2020-50 WBS2020-39 |
Among cryptographic techniques, Salsa20, a stream cipher, is the predecessor of ChaCha20,
which was selected for TLS 1... [more] |
IT2020-120 ISEC2020-50 WBS2020-39 pp.52-57 |
ICSS, IPSJ-SPT |
2021-03-02 15:20 |
Online |
Online |
The linear probability of the stream cipher Salsa Junru Li (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST) ICSS2020-51 |
Salsa20 is a stream cipher designed by D.J. Bernstein in 2005. One of the effective attack methods applied to Salsa20 is... [more] |
ICSS2020-51 pp.150-153 |
ISEC, IT, WBS |
2020-03-11 09:30 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Security Evaluation of Differential Attacks against KCipher-2 Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57 |
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] |
IT2019-108 ISEC2019-104 WBS2019-57 pp.121-126 |
NLP, NC (Joint) |
2019-01-24 09:50 |
Hokkaido |
The Centennial Hall, Hokkaido Univ. |
Messsage transcription using partial synchronization of intermittently coupled chaotic oscillators Kenichiro Cho, Masashi Onishi, Takaya Miyano (Ritsumeikan Univ.) NLP2018-110 |
We have developed a method for the secure communication of a short message via the partial synchronization of intermitte... [more] |
NLP2018-110 pp.77-82 |
SITE, ISEC, LOIS |
2018-11-03 11:00 |
Fukuoka |
|
A Statistical Method for Searching Biases of Stream Ciphers Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24 |
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] |
ISEC2018-64 SITE2018-42 LOIS2018-24 pp.1-6 |
SITE, ISEC, LOIS |
2018-11-03 11:30 |
Fukuoka |
|
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25 |
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] |
ISEC2018-65 SITE2018-43 LOIS2018-25 pp.7-12 |
ICSS, IPSJ-SPT |
2018-03-07 14:50 |
Hokkaido |
Okinawa Hokubu Koyou Nouryoku Kaihatsu Sougou Center |
Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion Yusuke Matsuoka, Atsuko Miyaji (Osaka Univ.) ICSS2017-62 |
As of April 2016, in newly proposed TLS1.3, as encryption methods of symmetric key encryption scheme, AES in the block e... [more] |
ICSS2017-62 pp.67-72 |
ISEC, WBS, IT |
2017-03-09 10:25 |
Tokyo |
TOKAI University |
A Note on Key Dependency of Stream Cipher Grain v1 Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) IT2016-99 ISEC2016-89 WBS2016-75 |
Meet-in-the-middle (MITM) attack is a powerful cryptanalytic method for block ciphers. Several attacks for block ciphers... [more] |
IT2016-99 ISEC2016-89 WBS2016-75 pp.1-6 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 09:55 |
Yamaguchi |
|
Further improving security of Vector Stream Cipher Atsushi Iwasaki, Ken Umeno (Kyoto Univ.) ISEC2016-28 SITE2016-22 ICSS2016-28 EMM2016-36 |
Vector Stream Cipher (VSC) is a stream cipher which is very fast and is implemented lightly.
Some attacks for VSC have ... [more] |
ISEC2016-28 SITE2016-22 ICSS2016-28 EMM2016-36 pp.115-120 |
ICSS, IPSJ-SPT |
2016-03-04 13:30 |
Kyoto |
Academic Center for Computing and Media Studies, Kyoto University |
A New Key Correlation in the Stream Cipher RC4 Daiki Michihiro (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/CREST) ICSS2015-65 |
The stream cipher RC4 has been analyzed by using various schemes since the algorithm was leaked
in 1994.In particular, ... [more] |
ICSS2015-65 pp.111-116 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 11:05 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Chosen Initial Vector Attack against Pseudorandom Number Generator QP-DYN Kenichi Arai, Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ of Science) ISEC2015-11 SITE2015-9 ICSS2015-21 EMM2015-19 |
QP--DYN is a new pseudorandom number generator (PRNG) proposed by Ohya and Accardi.
In 2014, Iriyama and Ohya introduce... [more] |
ISEC2015-11 SITE2015-9 ICSS2015-21 EMM2015-19 pp.15-21 |
ISEC, IT, WBS |
2015-03-02 10:30 |
Fukuoka |
The University of Kitakyushu |
Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54 |
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more] |
IT2014-62 ISEC2014-75 WBS2014-54 pp.1-4 |