IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 7 of 7  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] 2024-07-22
Hokkaido Sapporo Convention Center Collision Attack on DM-AES
Kodai Taiyama (UOH), Kosei Sakamoto (ME), Ryoma Ito (NICT), Kazuma Taka, Takanori Isobe (UOH)
ICSS, IPSJ-SPT 2024-03-21
Okinawa OIST
(Primary: On-site, Secondary: Online)
A comprehensive investigation of forgery attack on the Nostr protocol
Hayato Kimura (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo) ICSS2023-69
(To be available after the conference date) [more] ICSS2023-69
ICSS, IPSJ-SPT 2024-03-22
Okinawa OIST
(Primary: On-site, Secondary: Online)
Discovery of a Vulnerable Structure of SIMON Variants
Hayato Watanabe (Tokai Univ.), Ryoma Ito (NICT), Toshihiro Ohigashi (Tokai Univ.) ICSS2023-92
In SCIS 2024, Watanabe et al. applied a deep learning-based output prediction attack to SIMON variants, which are varian... [more] ICSS2023-92
IT, ISEC, RCC, WBS 2022-03-11
Online Online Improved Large-state Permutation based on AES instruction and Its Applications
Motoki Nakahashi, Rentaro Shiba, Kosei Sakamoto, Fukang Liu (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo/NICT/PRESTO) IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90
In CSS2021, Nakahashi et al. showed an optimal Feistel-type large-state permutations using only AES-NI from the security... [more] IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2018-07-26
Hokkaido Sapporo Convention Center Plaintext Recovery Attacks against WPA-TKIP Using Iterated RC4 Key Correlations
Ryoma Ito, Atsuko Miyaji (Osaka Univ.) ISEC2018-48 SITE2018-40 HWS2018-45 ICSS2018-51 EMM2018-47
 [more] ISEC2018-48 SITE2018-40 HWS2018-45 ICSS2018-51 EMM2018-47
ICSS 2015-03-04
Okinawa Meio Univiersity New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA
Daiki Michihiro (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryoma Ito (JAIST) ICSS2014-85
The first three bytes of the RC4 key in WPA are derived from the public parameter IV, and also the attacker can obtain t... [more] ICSS2014-85
ISEC 2014-05-09
Tokyo Kikai-Shinko-Kaikan Bldg. New Negative Biases in Long-Term Glimpse of RC4
Ryoma Ito, Atsuko Miyaji (JAIST) ISEC2014-3
RC4 stream cipher was designed by Ron Rivest in 1987 and is widely used for protocol, such as SSL/TLS, WEP, WPA and more... [more] ISEC2014-3
 Results 1 - 7 of 7  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan