IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2024-03-21
10:55
Okinawa OIST
(Primary: On-site, Secondary: Online)
A comprehensive investigation of forgery attack on the Nostr protocol
Hayato Kimura (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo) ICSS2023-69
(To be available after the conference date) [more] ICSS2023-69
pp.1-8
IT, ISEC, RCC, WBS 2022-03-11
11:10
Online Online Corruption-Correctable Message Authentication Code
Isamu Furuya, Akiko Inoue, Kazuhiko Minematsu (NEC) IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89
We propose correction correctable MAC, which enables to verify data integrity and to correct corruptions of the data.
A... [more]
IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89
pp.180-187
IT, ISEC, RCC, WBS 2022-03-11
11:35
Online Online Improved Large-state Permutation based on AES instruction and Its Applications
Motoki Nakahashi, Rentaro Shiba, Kosei Sakamoto, Fukang Liu (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo/NICT/PRESTO) IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90
In CSS2021, Nakahashi et al. showed an optimal Feistel-type large-state permutations using only AES-NI from the security... [more] IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90
pp.188-195
ISEC 2021-05-19
13:50
Online Online Distinguishing and Forgery Attacks against Romulus-N and Romulus-M
Makoto Habu (Nagoya Univ.), Kazuhiko Minematsu (NEC), Tetsu Iwata (Nagoya Univ.) ISEC2021-6
Romulus is an authenticated encryption scheme based on a tweakable block cipher. It was submitted to the NIST Lightweigh... [more] ISEC2021-6
pp.25-31
HWS, VLD [detail] 2021-03-04
13:25
Online Online A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design
Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] VLD2020-83 HWS2020-58
pp.85-90
ISEC 2020-05-20
13:50
Online Online [Invited Talk] Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure (from IWSEC 2019)
Kosei Sakamoto (University of Hyogo), Kazuhiko Minematsu (NEC), Nao Shibata, Maki Shigeri, Hiroyasu Kubo (NES), Yuki Funabiki (Kobe Univ.), Andrey Bogdanov (DTU), Sumio Morioka (Interstellar), Takanori Isobe (University of Hyogo/NICT) ISEC2020-7
 [more] ISEC2020-7
p.29
ISEC, IT, WBS 2020-03-11
09:30
Hyogo University of Hyogo
(Cancelled but technical report was issued)
Security Evaluation of Differential Attacks against KCipher-2
Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] IT2019-108 ISEC2019-104 WBS2019-57
pp.121-126
ICSS, IPSJ-SPT 2019-03-07
14:45
Okinawa NICT Okinawa Electromagnetic Technology Center Implementation and evaluation of aggregate message authentication method
Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU) ICSS2018-73
 [more] ICSS2018-73
pp.29-33
HWS 2018-04-13
13:30
Fukuoka   AES-OTR Hardware Architecture and Its Evaluation
Rei Ueno, Noafumi Homma (Tohoku Univ.), Tomonori Iida (YDK), Kazuhiko Minematsu (NEC) HWS2018-4
This paper reports a hardware implementation of AES-OTR, an authenticated encryption schemes based on AES. AES-OTR is a ... [more] HWS2018-4
pp.17-21
ISEC 2017-09-04
16:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication
Tetsu Iwata (Nagoya Univ.), Kazuhiko Minematsu (NEC), Thomas Peyrin (NTU), Yannick Seurin (ANSSI) ISEC2017-47
 [more] ISEC2017-47
p.43
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
13:00
Yamaguchi   Efficient Discrete Gaussian Sampling on Constrained Devices
Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT) ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40
Lattice-based cryptography has been attracted by features of simple-implementation, quantum-resilient, and high-level fu... [more] ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40
pp.169-175
ISEC 2014-09-05
17:05
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
Kazuhiko Minematsu (NEC) ISEC2014-55
This paper proposes a new authenticated encryption (AE) scheme, called OTR for Offset Two-Round, which can be realized a... [more] ISEC2014-55
p.49
IT, ISEC, WBS 2013-03-08
11:20
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Software Implementation Using Quadruple-Rail Representation Against Power Analysis
Tomoyasu Suzaki, Akira Maekawa, Kazuhiko Minematsu, Toshihiko Okamura (NEC) IT2012-95 ISEC2012-113 WBS2012-81
Power analysis is an attack against a crypto device that extracts the secret key by using the relation between the power... [more] IT2012-95 ISEC2012-113 WBS2012-81
pp.211-216
ISEC 2012-12-12
16:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Breaking and Repairing GCM Security Proofs (from CRYPTO 2012)
Tetsu Iwata, Keisuke Ohashi (Nagoya Univ.), Kazuhiko Minematsu (NEC) ISEC2012-78
 [more] ISEC2012-78
p.41
IT, ISEC, WBS 2010-03-05
15:45
Nagano Nagano-Engineering Campus, Shinshu University A Study on Key Estimation Attacks to Stream Cipher based on Statistical Decision Theory
Ety Yudiasticha (Waseda Univ.), Kazuhiko Minematsu (NEC), Toshiyasu Matsushima (Waseda Univ.) IT2009-114 ISEC2009-122 WBS2009-93
This study looks at stream cipher that use nonlinear combination generator's output, which has multi-LFSR and a nonlinea... [more] IT2009-114 ISEC2009-122 WBS2009-93
pp.281-287
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan