IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 5 of 5  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IA, ICSS 2015-06-11
15:45
Fukuoka Kyushu Institute of Technology Univ. The Analysis of the CREAM vulnerability against OpenSSL
Jun Hasegawa, Yuhei Watanabe, Masakatu Morii (Kobe Univ.) IA2015-6 ICSS2015-6
In this paper we discuss vulnerability of "CREAM", which was originally created by Daniel J. Bernstein in 2005 and named... [more] IA2015-6 ICSS2015-6
pp.27-32
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity An Active Attack on RC4 in SSL/TLS
Toshihiro Ohigashi (Hiroshima Univ.), Takanori Isobe (Sony), Yuhei Watanabe (Kobe Univ.), Ryo Nojima (NICT), Masakatu Morii (Kobe Univ.) ICSS2013-63
In 2013, Isobe et al. and AlFardan et al. proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadca... [more] ICSS2013-63
pp.7-12
IA, ICSS 2013-06-20
15:00
Niigata Ao-re Nagaoka Vulnerability of RC4 in SSL/TLS
Yuhei Watanabe, Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IA2013-4 ICSS2013-4
In FSE2013, we showed that the first 257 bytes and 1000T bytes of the plaintext could be easily recovered with high prob... [more] IA2013-4 ICSS2013-4
pp.19-24
ICSS 2012-11-22
11:10
Hiroshima Miyajima Mori-no-Yado Gray scale two-dimensional code and its applications
Keisuke Furumoto, Yuhei Watanabe (Kobe Univ.), Masakatu Morii (kobe Univ.) ICSS2012-46
With the widespread use of mobile phones equipped with a decoder, two-dimensional code represented by QR code is widely ... [more] ICSS2012-46
pp.7-12
ICSS 2012-03-16
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. Malicious QR Code and its protection
Yuhei Watanabe, Yuki Kashii, Masakatu Morii (Kobe Univ.) ICSS2011-39
With the spread of mobile phones, the two dimensional code is used for various uses. But the visibility of QR Code stori... [more] ICSS2011-39
pp.1-4
 Results 1 - 5 of 5  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan