Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:00 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Side-Channel Attacks on Unrolled Implementation of Trivium Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.) ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 |
This paper describes a side-channel attack (SCA) on unrolled implementation of Trivium. Previous SCAs on Trivium, such a... [more] |
ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44 pp.194-201 |
ISEC |
2018-09-07 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (from CRYPTO2018) Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo) ISEC2018-61 |
[more] |
ISEC2018-61 p.57 |
ISEC |
2018-09-07 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1 (from CRYPTO2018) Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo), Kazumaro Aoki (NTT) ISEC2018-62 |
[more] |
ISEC2018-62 p.59 |
ISEC |
2017-09-04 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Cube Attacks on Non-Blackbox Polynomials based on Division Property (from CRYPTO 2017) Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo) ISEC2017-48 |
[more] |
ISEC2017-48 p.45 |
ISEC |
2015-12-18 16:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Integral Cryptanalysis on Full MISTY1 (from CRYPTO 2015) Yosuke Todo (NTT) ISEC2015-59 |
[more] |
ISEC2015-59 p.31 |
ISEC |
2015-09-04 15:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Structural Evaluation by Generalized Integral Property (from EUROCRYPT 2015) Yosuke Todo (NTT) ISEC2015-33 |
[more] |
ISEC2015-33 p.53 |
ISEC, LOIS |
2011-11-14 10:00 |
Osaka |
Osaka Electro-Communication University |
Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-34 LOIS2011-28 |
In 2009, Peikert proposed a public-key cryptosystem that is secure against the chosen ciphertext attack. In this cryptos... [more] |
ISEC2011-34 LOIS2011-28 pp.1-6 |
ISEC, LOIS |
2011-11-14 10:25 |
Osaka |
Osaka Electro-Communication University |
A Lattice Attack against (u|u+v)ΣPKC Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-35 LOIS2011-29 |
In 2010, Kasahara et al. proposed a knapsack cryptosystem secure against a low-density attack.
The cryptosystem were a... [more] |
ISEC2011-35 LOIS2011-29 pp.7-12 |
ISEC, LOIS |
2011-11-15 09:00 |
Osaka |
Osaka Electro-Communication University |
Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-48 LOIS2011-42 |
WEP is a security protocol in a wireless LAN network, and its vulnerability has been pointed out.Many key recovering att... [more] |
ISEC2011-48 LOIS2011-42 pp.93-100 |
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] |
2011-09-20 13:50 |
Ehime |
|
A Proposal of a WEP Operation Secure Against the Key-Recovery Attack Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) LOIS2011-17 IE2011-50 EMM2011-28 |
WEP is a security protocol in a wireless LAN network, and its ulnerability has been pointed out.Many key recovering atta... [more] |
LOIS2011-17 IE2011-50 EMM2011-28 pp.11-16 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 10:15 |
Shizuoka |
Shizuoka University |
The proposal of the evaluation for decryption failure about GGH series Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-18 SITE2011-15 ICSS2011-23 EMM2011-17 |
The GGH cryptosystem is a public key cryptosystem proposed by O. Goldreich, S. Goldwasser and S. Halevil in 1997. This c... [more] |
ISEC2011-18 SITE2011-15 ICSS2011-23 EMM2011-17 pp.97-102 |
IE, LOIS, ITE-ME, IEE-CMN [detail] |
2010-09-21 16:10 |
Kochi |
|
Proposal of CAPTCHA Method based on the Difficulty of Image Recognition Tsukasa Kobayashi, Yosuke Todo, Masakatu Morii (Kobe Univ.) LOIS2010-24 IE2010-66 |
A CAPTCHA is used to protectWeb service against unfair use with automated program. A CAPTCHA is a test to ensure that th... [more] |
LOIS2010-24 IE2010-66 pp.37-42 |
IT |
2010-07-22 14:05 |
Tokyo |
Kogakuin University |
Speeding Up of a WEP-Key Recovery attack using IP Packets Ryohei Okamoto, Yosuke Todo, Masakatu Morii (Kobe Univ.) IT2010-17 |
WEP is the security protocol in the wireless LAN, and its vulnerability is have been pointed out.
However, the attacke... [more] |
IT2010-17 pp.35-40 |
IT, ISEC, WBS |
2010-03-05 10:50 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet
-- Almost All Implementations of WPA-TKIP Can Be Attacked -- Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IT2009-106 ISEC2009-114 WBS2009-85 |
[more] |
IT2009-106 ISEC2009-114 WBS2009-85 pp.225-232 |
IT, ISEC, WBS |
2010-03-05 11:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A Note on Realistic Damages Caused by a Message Falsification Attack on WPA-TKIP Yuki Ozawa, Yosuke Todo (Kobe Univ), Toshihiro Ohigashi (Hiroshima Univ), Masakatu Morii (Kobe Univ) IT2009-107 ISEC2009-115 WBS2009-86 |
[more] |
IT2009-107 ISEC2009-115 WBS2009-86 pp.233-240 |
LOIS, IE, ITE-ME, IEE-CMN |
2009-09-25 15:50 |
Hiroshima |
Hiroshima Univ. |
The Vulnerability Scanner for Client using Existing Vulnerability Databases Yosuke Todo, Yasuo Asakura, Masakatu Morii (Kobe Univ.) LOIS2009-37 IE2009-78 |
The threats of the attacks that exploit vulnerabilities in software are amazingly increased in recent years. Because of ... [more] |
LOIS2009-37 IE2009-78 pp.107-112 |