Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ICSS, IPSJ-SPT |
2024-03-21 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
A comprehensive investigation of forgery attack on the Nostr protocol Hayato Kimura (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo) ICSS2023-69 |
(To be available after the conference date) [more] |
ICSS2023-69 pp.1-8 |
IT, ISEC, RCC, WBS |
2022-03-11 11:10 |
Online |
Online |
Corruption-Correctable Message Authentication Code Isamu Furuya, Akiko Inoue, Kazuhiko Minematsu (NEC) IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89 |
We propose correction correctable MAC, which enables to verify data integrity and to correct corruptions of the data.
A... [more] |
IT2021-114 ISEC2021-79 WBS2021-82 RCC2021-89 pp.180-187 |
IT, ISEC, RCC, WBS |
2022-03-11 11:35 |
Online |
Online |
Improved Large-state Permutation based on AES instruction and Its Applications Motoki Nakahashi, Rentaro Shiba, Kosei Sakamoto, Fukang Liu (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo/NICT/PRESTO) IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90 |
In CSS2021, Nakahashi et al. showed an optimal Feistel-type large-state permutations using only AES-NI from the security... [more] |
IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90 pp.188-195 |
ISEC |
2021-05-19 13:50 |
Online |
Online |
Distinguishing and Forgery Attacks against Romulus-N and Romulus-M Makoto Habu (Nagoya Univ.), Kazuhiko Minematsu (NEC), Tetsu Iwata (Nagoya Univ.) ISEC2021-6 |
Romulus is an authenticated encryption scheme based on a tweakable block cipher. It was submitted to the NIST Lightweigh... [more] |
ISEC2021-6 pp.25-31 |
HWS, VLD [detail] |
2021-03-04 13:25 |
Online |
Online |
A Low-Latency Memory Encryption Scheme with Tweakable Block Cipher and Its Hardware Design Maya Oda, Rei Ueno, Naofumi Homma (Tohoku Univ.), Akiko Inoue, Kazuhiko Minematsu (NEC) VLD2020-83 HWS2020-58 |
In this paper, we propose a highly efficient memory protection method based on the Tweakable block cipher (TBC). The lat... [more] |
VLD2020-83 HWS2020-58 pp.85-90 |
ISEC |
2020-05-20 13:50 |
Online |
Online |
[Invited Talk]
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure (from IWSEC 2019) Kosei Sakamoto (University of Hyogo), Kazuhiko Minematsu (NEC), Nao Shibata, Maki Shigeri, Hiroyasu Kubo (NES), Yuki Funabiki (Kobe Univ.), Andrey Bogdanov (DTU), Sumio Morioka (Interstellar), Takanori Isobe (University of Hyogo/NICT) ISEC2020-7 |
[more] |
ISEC2020-7 p.29 |
ISEC, IT, WBS |
2020-03-11 09:30 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Security Evaluation of Differential Attacks against KCipher-2 Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57 |
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] |
IT2019-108 ISEC2019-104 WBS2019-57 pp.121-126 |
ICSS, IPSJ-SPT |
2019-03-07 14:45 |
Okinawa |
NICT Okinawa Electromagnetic Technology Center |
Implementation and evaluation of aggregate message authentication method Atsuhiro Yamagishi (JDC), Tatsuya Takehisa, Eiichi Nishiura (NISSIN), Shouichi Hirose, Yu Imamura (JDC), Kazuhiko Minematsu (nec), Junji Shikata, Koji Nakao (YNU) ICSS2018-73 |
[more] |
ICSS2018-73 pp.29-33 |
HWS |
2018-04-13 13:30 |
Fukuoka |
|
AES-OTR Hardware Architecture and Its Evaluation Rei Ueno, Noafumi Homma (Tohoku Univ.), Tomonori Iida (YDK), Kazuhiko Minematsu (NEC) HWS2018-4 |
This paper reports a hardware implementation of AES-OTR, an authenticated encryption schemes based on AES. AES-OTR is a ... [more] |
HWS2018-4 pp.17-21 |
ISEC |
2017-09-04 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication Tetsu Iwata (Nagoya Univ.), Kazuhiko Minematsu (NEC), Thomas Peyrin (NTU), Yannick Seurin (ANSSI) ISEC2017-47 |
[more] |
ISEC2017-47 p.43 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 13:00 |
Yamaguchi |
|
Efficient Discrete Gaussian Sampling on Constrained Devices Yuki Tanaka, Isamu Teranishi, Kazuhiko Minematsu (NEC), Yoshinori Aono (NICT) ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40 |
Lattice-based cryptography has been attracted by features of simple-implementation, quantum-resilient, and high-level fu... [more] |
ISEC2016-32 SITE2016-26 ICSS2016-32 EMM2016-40 pp.169-175 |
ISEC |
2014-09-05 17:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions Kazuhiko Minematsu (NEC) ISEC2014-55 |
This paper proposes a new authenticated encryption (AE) scheme, called OTR for Offset Two-Round, which can be realized a... [more] |
ISEC2014-55 p.49 |
IT, ISEC, WBS |
2013-03-08 11:20 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Software Implementation Using Quadruple-Rail Representation Against Power Analysis Tomoyasu Suzaki, Akira Maekawa, Kazuhiko Minematsu, Toshihiko Okamura (NEC) IT2012-95 ISEC2012-113 WBS2012-81 |
Power analysis is an attack against a crypto device that extracts the secret key by using the relation between the power... [more] |
IT2012-95 ISEC2012-113 WBS2012-81 pp.211-216 |
ISEC |
2012-12-12 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Breaking and Repairing GCM Security Proofs (from CRYPTO 2012) Tetsu Iwata, Keisuke Ohashi (Nagoya Univ.), Kazuhiko Minematsu (NEC) ISEC2012-78 |
[more] |
ISEC2012-78 p.41 |
IT, ISEC, WBS |
2010-03-05 15:45 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A Study on Key Estimation Attacks to Stream Cipher based on Statistical Decision Theory Ety Yudiasticha (Waseda Univ.), Kazuhiko Minematsu (NEC), Toshiyasu Matsushima (Waseda Univ.) IT2009-114 ISEC2009-122 WBS2009-93 |
This study looks at stream cipher that use nonlinear combination generator's output, which has multi-LFSR and a nonlinea... [more] |
IT2009-114 ISEC2009-122 WBS2009-93 pp.281-287 |