IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 7 of 7  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
15:40
Hokkaido   Higher Order Differential Attack on HyRAL using Control Transform and Observation Transform
Naoki Shibayama (JASDF), Yasutaka Igarashi (Kagoshima Univ.), Toshinobu Kaneko (Tokyo Univ. of Science) ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22
HyRAL is a 128-bit block cipher proposed by Hirata in 2010. It has been reported that 14-round HyRAL with 256-bit secret... [more] ISEC2013-20 SITE2013-15 ICSS2013-25 EMM2013-22
pp.67-74
IT, ISEC, WBS 2012-03-01
15:45
Kanagawa   New Saturation Characteristics of HyRAL
Naoki Shibayama, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2011-54 ISEC2011-81 WBS2011-55
HyRAL is the 128-bit block cipher proposed by Hirata in 2010. It has been shown that 13-round with 256-bit secret key is... [more] IT2011-54 ISEC2011-81 WBS2011-55
pp.53-60
IT 2011-07-21
14:00
Okayama Okayama University Security evaluation of HyRAL against Boomerang Attack
Tomoya Inoue, Toshinobu Kaneko (TUS) IT2011-10
HyRAL is the block cipher proposed by Hirata in 2010.
In this paper, we study security evaluation of HyRAL against Boom... [more]
IT2011-10
pp.1-6
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
10:55
Shizuoka Shizuoka University Security Evaluation of HyRAL against Saturation Cryptanalysis(II)
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18
In this paper, we focuse on the saturation attack on block cipher HyRAL that was proposed by Hirata in 2010.
It has bee... [more]
ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18
pp.103-109
ISEC, IT, WBS 2011-03-04
09:50
Osaka Osaka University Higher Order Differential Attack on HyRAL
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2010-119 ISEC2010-123 WBS2010-98
In this paper, we focuse on the higher order differential attack on block cipher HyRAL that was proposed by Hirata in 20... [more] IT2010-119 ISEC2010-123 WBS2010-98
pp.341-347
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-01
13:50
Aomori Hirosaki University Protection Mode Against Cache Attack (HYRAL)
Kouzou Hirata (LIS) ISEC2010-14 SITE2010-10 ICSS2010-20
It is known that the Prime+probe method of Dag Arne Osuik, Adi shamir, and Eran Tromer[1] is the most efficient methods ... [more] ISEC2010-14 SITE2010-10 ICSS2010-20
pp.27-33
IT, ISEC, WBS 2007-03-16
13:25
Gunma Gunma Univ. (Kiryu Campus) On the Linear Characteristic of HyRAL16
Yasutaka Igarashi, Toshinobu Kaneko, Naoto Fukubayashi (Tokyo Univ. of Science)
HyRAL16 is a common-key cipher designed by Hirata of Laurel Intelligent Systems Inc. in 2006. A data block size is 128bi... [more] IT2006-102 ISEC2006-157 WBS2006-99
pp.99-103
 Results 1 - 7 of 7  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan