|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA, ICSS |
2015-06-11 15:45 |
Fukuoka |
Kyushu Institute of Technology Univ. |
The Analysis of the CREAM vulnerability against OpenSSL Jun Hasegawa, Yuhei Watanabe, Masakatu Morii (Kobe Univ.) IA2015-6 ICSS2015-6 |
In this paper we discuss vulnerability of "CREAM", which was originally created by Daniel J. Bernstein in 2005 and named... [more] |
IA2015-6 ICSS2015-6 pp.27-32 |
ICSS, IPSJ-SPT |
2014-03-27 13:30 |
Okinawa |
Meio Univiersity |
An Active Attack on RC4 in SSL/TLS Toshihiro Ohigashi (Hiroshima Univ.), Takanori Isobe (Sony), Yuhei Watanabe (Kobe Univ.), Ryo Nojima (NICT), Masakatu Morii (Kobe Univ.) ICSS2013-63 |
In 2013, Isobe et al. and AlFardan et al. proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadca... [more] |
ICSS2013-63 pp.7-12 |
IA, ICSS |
2013-06-20 15:00 |
Niigata |
Ao-re Nagaoka |
Vulnerability of RC4 in SSL/TLS Yuhei Watanabe, Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IA2013-4 ICSS2013-4 |
In FSE2013, we showed that the first 257 bytes and 1000T bytes of the plaintext could be easily recovered with high prob... [more] |
IA2013-4 ICSS2013-4 pp.19-24 |
ICSS |
2012-11-22 11:10 |
Hiroshima |
Miyajima Mori-no-Yado |
Gray scale two-dimensional code and its applications Keisuke Furumoto, Yuhei Watanabe (Kobe Univ.), Masakatu Morii (kobe Univ.) ICSS2012-46 |
With the widespread use of mobile phones equipped with a decoder, two-dimensional code represented by QR code is widely ... [more] |
ICSS2012-46 pp.7-12 |
ICSS |
2012-03-16 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Malicious QR Code and its protection Yuhei Watanabe, Yuki Kashii, Masakatu Morii (Kobe Univ.) ICSS2011-39 |
With the spread of mobile phones, the two dimensional code is used for various uses. But the visibility of QR Code stori... [more] |
ICSS2011-39 pp.1-4 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|