IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 16 of 16  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2023-07-25
09:00
Hokkaido Hokkaido Jichiro Kaikan Side-Channel Attacks on Unrolled Implementation of Trivium
Soichiro Kobayashi, Rei Ueno (Tohoku Univ.), Yosuke Todo (NTT), Naofumi Homma (Tohoku Univ.) ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44
This paper describes a side-channel attack (SCA) on unrolled implementation of Trivium. Previous SCAs on Trivium, such a... [more] ISEC2023-44 SITE2023-38 BioX2023-47 HWS2023-44 ICSS2023-41 EMM2023-44
pp.194-201
ISEC 2018-09-07
16:00
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (from CRYPTO2018)
Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo) ISEC2018-61
 [more] ISEC2018-61
p.57
ISEC 2018-09-07
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1 (from CRYPTO2018)
Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo), Kazumaro Aoki (NTT) ISEC2018-62
 [more] ISEC2018-62
p.59
ISEC 2017-09-04
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Cube Attacks on Non-Blackbox Polynomials based on Division Property (from CRYPTO 2017)
Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo) ISEC2017-48
 [more] ISEC2017-48
p.45
ISEC 2015-12-18
16:15
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Integral Cryptanalysis on Full MISTY1 (from CRYPTO 2015)
Yosuke Todo (NTT) ISEC2015-59
 [more] ISEC2015-59
p.31
ISEC 2015-09-04
15:35
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Structural Evaluation by Generalized Integral Property (from EUROCRYPT 2015)
Yosuke Todo (NTT) ISEC2015-33
 [more] ISEC2015-33
p.53
ISEC, LOIS 2011-11-14
10:00
Osaka Osaka Electro-Communication University Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction
Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-34 LOIS2011-28
In 2009, Peikert proposed a public-key cryptosystem that is secure against the chosen ciphertext attack. In this cryptos... [more] ISEC2011-34 LOIS2011-28
pp.1-6
ISEC, LOIS 2011-11-14
10:25
Osaka Osaka Electro-Communication University A Lattice Attack against (u|u+v)ΣPKC
Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-35 LOIS2011-29
In 2010, Kasahara et al. proposed a knapsack cryptosystem secure against a low-density attack.
The cryptosystem were a... [more]
ISEC2011-35 LOIS2011-29
pp.7-12
ISEC, LOIS 2011-11-15
09:00
Osaka Osaka Electro-Communication University Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-48 LOIS2011-42
WEP is a security protocol in a wireless LAN network, and its vulnerability has been pointed out.Many key recovering att... [more] ISEC2011-48 LOIS2011-42
pp.93-100
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] 2011-09-20
13:50
Ehime   A Proposal of a WEP Operation Secure Against the Key-Recovery Attack
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) LOIS2011-17 IE2011-50 EMM2011-28
WEP is a security protocol in a wireless LAN network, and its ulnerability has been pointed out.Many key recovering atta... [more] LOIS2011-17 IE2011-50 EMM2011-28
pp.11-16
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
10:15
Shizuoka Shizuoka University The proposal of the evaluation for decryption failure about GGH series
Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-18 SITE2011-15 ICSS2011-23 EMM2011-17
The GGH cryptosystem is a public key cryptosystem proposed by O. Goldreich, S. Goldwasser and S. Halevil in 1997. This c... [more] ISEC2011-18 SITE2011-15 ICSS2011-23 EMM2011-17
pp.97-102
IE, LOIS, ITE-ME, IEE-CMN [detail] 2010-09-21
16:10
Kochi   Proposal of CAPTCHA Method based on the Difficulty of Image Recognition
Tsukasa Kobayashi, Yosuke Todo, Masakatu Morii (Kobe Univ.) LOIS2010-24 IE2010-66
A CAPTCHA is used to protectWeb service against unfair use with automated program. A CAPTCHA is a test to ensure that th... [more] LOIS2010-24 IE2010-66
pp.37-42
IT 2010-07-22
14:05
Tokyo Kogakuin University Speeding Up of a WEP-Key Recovery attack using IP Packets
Ryohei Okamoto, Yosuke Todo, Masakatu Morii (Kobe Univ.) IT2010-17
WEP is the security protocol in the wireless LAN, and its vulnerability is have been pointed out.
However, the attacke... [more]
IT2010-17
pp.35-40
IT, ISEC, WBS 2010-03-05
10:50
Nagano Nagano-Engineering Campus, Shinshu University A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet -- Almost All Implementations of WPA-TKIP Can Be Attacked --
Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IT2009-106 ISEC2009-114 WBS2009-85
 [more] IT2009-106 ISEC2009-114 WBS2009-85
pp.225-232
IT, ISEC, WBS 2010-03-05
11:15
Nagano Nagano-Engineering Campus, Shinshu University A Note on Realistic Damages Caused by a Message Falsification Attack on WPA-TKIP
Yuki Ozawa, Yosuke Todo (Kobe Univ), Toshihiro Ohigashi (Hiroshima Univ), Masakatu Morii (Kobe Univ) IT2009-107 ISEC2009-115 WBS2009-86
 [more] IT2009-107 ISEC2009-115 WBS2009-86
pp.233-240
LOIS, IE, ITE-ME, IEE-CMN 2009-09-25
15:50
Hiroshima Hiroshima Univ. The Vulnerability Scanner for Client using Existing Vulnerability Databases
Yosuke Todo, Yasuo Asakura, Masakatu Morii (Kobe Univ.) LOIS2009-37 IE2009-78
The threats of the attacks that exploit vulnerabilities in software are amazingly increased in recent years. Because of ... [more] LOIS2009-37 IE2009-78
pp.107-112
 Results 1 - 16 of 16  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan