|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-18 15:40 |
Hokkaido |
|
Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22 |
HyRAL is a 128-bit block cipher proposed by Hirata in 2010. It has been reported that 14-round HyRAL with 256-bit secret... [more] |
ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22 pp.67-74 |
IT, ISEC, WBS |
2012-03-01 15:45 |
Kanagawa |
|
New Saturation Characteristics of HyRAL Naoki Shibayama, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2011-54 ISEC2011-81 WBS2011-55 |
HyRAL is the 128-bit block cipher proposed by Hirata in 2010. It has been shown that 13-round with 256-bit secret key is... [more] |
IT2011-54 ISEC2011-81 WBS2011-55 pp.53-60 |
IT |
2011-07-21 14:00 |
Okayama |
Okayama University |
Security evaluation of HyRAL against Boomerang Attack Tomoya Inoue, Toshinobu Kaneko (TUS) IT2011-10 |
HyRAL is the block cipher proposed by Hirata in 2010.
In this paper, we study security evaluation of HyRAL against Boom... [more] |
IT2011-10 pp.1-6 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 10:55 |
Shizuoka |
Shizuoka University |
Security Evaluation of HyRAL against Saturation Cryptanalysis(II) Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18 |
In this paper, we focuse on the saturation attack on block cipher HyRAL that was proposed by Hirata in 2010.
It has bee... [more] |
ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18 pp.103-109 |
ISEC, IT, WBS |
2011-03-04 09:50 |
Osaka |
Osaka University |
Higher Order Differential Attack on HyRAL Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2010-119 ISEC2010-123 WBS2010-98 |
In this paper, we focuse on the higher order differential attack on block cipher HyRAL that was proposed by Hirata in 20... [more] |
IT2010-119 ISEC2010-123 WBS2010-98 pp.341-347 |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2010-07-01 13:50 |
Aomori |
Hirosaki University |
Protection Mode Against Cache Attack (HYRAL) Kouzou Hirata (LIS) ISEC2010-14 SITE2010-10 ICSS2010-20 |
It is known that the Prime+probe method of Dag Arne Osuik, Adi shamir, and Eran Tromer[1] is the most efficient methods ... [more] |
ISEC2010-14 SITE2010-10 ICSS2010-20 pp.27-33 |
IT, ISEC, WBS |
2007-03-16 13:25 |
Gunma |
Gunma Univ. (Kiryu Campus) |
On the Linear Characteristic of HyRAL16 Yasutaka Igarashi, Toshinobu Kaneko, Naoto Fukubayashi (Tokyo Univ. of Science) |
HyRAL16 is a common-key cipher designed by Hirata of Laurel Intelligent Systems Inc. in 2006. A data block size is 128bi... [more] |
IT2006-102 ISEC2006-157 WBS2006-99 pp.99-103 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|