IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 27  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, SITE, LOIS 2022-11-18
17:45
Online Online Aggregate Entity Authentication with Group Testing
Shoichi Hirose (Univ. Fukui/Japan Datacom), Junji Shikata (Yokohama National Univ./Japan Datacom) ISEC2022-46 SITE2022-50 LOIS2022-30
Challenge-response entity authentication can be implemented with a MAC function. In such an entity authentication schem... [more] ISEC2022-46 SITE2022-50 LOIS2022-30
pp.100-106
ICSS, IPSJ-SPT 2020-03-02
13:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Implementation of aggregate message authentication and its evaluation
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-96
 [more] ICSS2019-96
pp.207-212
ICSS 2019-11-13
16:45
Miyazaki MRT Terrace(Miyazaki) Study on evaluation system for aggregate message authentication and its application to IoT systems
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-67
Utilization of Internet of things (IoT) devices has widely spread, and suppressing the increasing amount of data due to ... [more] ICSS2019-67
pp.41-46
IT, ISEC, WBS 2019-03-08
09:00
Tokyo University of Electro-Communications History-Free Sequential Aggregate MAC without Pseudorandom Permutation
Shoichi Hirose (Univ. Fukui/JDC), Junji Shikata (Yokohama National Univ.) IT2018-101 ISEC2018-107 WBS2018-102
Eikemeier et al. introduced and formalized sequential aggregate MAC in 2010. They also proposed a history-free scheme f... [more] IT2018-101 ISEC2018-107 WBS2018-102
pp.155-162
IT, ISEC, WBS 2019-03-08
09:25
Tokyo University of Electro-Communications Authenticated Encryption Scheme Secure Against Side Channel Attack
Shoichi Hirose (Univ. Fukui), Takeshi Sugawara (Univ. Electro-Communications), Yuichi Komano (Toshiba) IT2018-102 ISEC2018-108 WBS2018-103
In 2018, Guo, Pereira, Peters and Standaert formalized the security requirements for authenticated encryption with assoc... [more] IT2018-102 ISEC2018-108 WBS2018-103
pp.163-167
ISEC, LOIS, SITE 2016-11-07
15:20
Fukui Community Hall & AOSSA Mall, Fukui Sequential Hashing with Minimum Padding
Shoichi Hirose (Fukui Univ.) ISEC2016-55 SITE2016-45 LOIS2016-33
 [more] ISEC2016-55 SITE2016-45 LOIS2016-33
pp.27-32
IT, ISEC, WBS 2016-03-10
14:05
Tokyo The University of Electro-Communications Message Preprocessing for MD Hash Functions
Hidenori Kuwakado (Kansai Univ.), Shoichi Hirose (Univ. of Fukui) IT2015-115 ISEC2015-74 WBS2015-98
 [more] IT2015-115 ISEC2015-74 WBS2015-98
pp.89-93
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
16:10
Hokkaido San-Refure Hakodate Forward-Secure Sequential Aggregate Message Authentication Revisited
Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.) ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26
The notion of forward-secure sequential aggregate message
authentication was introduced by Ma and Tsudik in 2007.
It i... [more]
ISEC2014-26 SITE2014-21 ICSS2014-30 EMM2014-26
pp.163-170
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2013-07-18
15:15
Hokkaido   A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256
Jiageng Chen (JAIST), Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kansai Univ.), Atsuko Miyaji (JAIST) ISEC2013-19 SITE2013-14 ICSS2013-24 EMM2013-21
This paper presents the first collision attack on the double-block-length compression function presented at FSE 2006 ins... [more] ISEC2013-19 SITE2013-14 ICSS2013-24 EMM2013-21
pp.59-66
ISEC, LOIS 2012-11-21
14:40
Shizuoka Shizuoka City Industry-University Exchange Center Lightweight Hashing Mode Using Lesamnta-LW Compression Function and MDP Domain Extension
Asraf Akhimullah, Shoichi Hirose (Fukui Univ.), Emi Matsuyama (SAKAI ELCOM) ISEC2012-58 LOIS2012-33
This paper presents a block-cipher-based hashing scheme suitable for
resource constrained devices.
It uses the Lesamnt... [more]
ISEC2012-58 LOIS2012-33
pp.9-14
IT, ISEC, WBS 2012-03-01
15:20
Kanagawa   A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function
Shoichi Hirose (Univ. of Fukui), Hidenori Kuwakado (Kobe Univ.) IT2011-53 ISEC2011-80 WBS2011-54
 [more] IT2011-53 ISEC2011-80 WBS2011-54
pp.45-51
ISEC, LOIS 2011-11-15
15:40
Osaka Osaka Electro-Communication University Content Authentication for Range Queries in Peer-to-Peer Networks
Shoichi Hirose (Univ. of Fukui) ISEC2011-60 LOIS2011-54
In this article, we propose a distributed authenticated data structure for range queries, which is called distributed au... [more] ISEC2011-60 LOIS2011-54
pp.177-180
IT, ISEC, WBS 2010-03-05
16:10
Nagano Nagano-Engineering Campus, Shinshu University Preimage Resistance of Hash Functions on the Dedicated Block Cipher
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) IT2009-115 ISEC2009-123 WBS2009-94
 [more] IT2009-115 ISEC2009-123 WBS2009-94
pp.289-293
IT, ISEC, WBS 2010-03-05
09:00
Nagano Nagano-Engineering Campus, Shinshu University A Note on Practical Key Derivation Functions
Shoichi Hirose (Univ. of Fukui.) IT2009-130 ISEC2009-138 WBS2009-109
In this article, we first review key derivation functions by Krawczyk and in NIST SP 800-108. Then, we propose paralleli... [more] IT2009-130 ISEC2009-138 WBS2009-109
pp.381-384
IT, ISEC, WBS 2010-03-05
09:25
Nagano Nagano-Engineering Campus, Shinshu University Collision Attack on DM Compression Function Using Reduced AES-256
Tetsuya Kobayashi, Shoichi Hirose (Univ. Fukui) IT2009-131 ISEC2009-139 WBS2009-110
In 2009, Khovratovich, Biryukov and Nikoli\'{c} presented a kind of
collision attack on the Davies-Meyer (DM) compressi... [more]
IT2009-131 ISEC2009-139 WBS2009-110
pp.385-390
ISEC 2009-09-25
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. Constructing a Hash Function from a Weak Block Cipher in an Ideal Model
Shoichi Hirose (Univ. of Fukui.), Hidenori Kuwakado (Kobe Univ.) ISEC2009-47
This paper discusses the provable security of block-cipher-based hash functions. It first introduces a new model called ... [more] ISEC2009-47
pp.51-58
WBS, IT, ISEC 2009-03-10
13:00
Hokkaido Hakodate Mirai Univ. A Note on the Security of Cryptographic Hash Functions
Shoichi Hirose (Univ. Fukui) IT2008-85 ISEC2008-143 WBS2008-98
This article discusses relationships between preimage resistance, second-preimage resistance and universal one-wayness o... [more] IT2008-85 ISEC2008-143 WBS2008-98
pp.267-271
WBS, IT, ISEC 2009-03-10
13:25
Hokkaido Hakodate Mirai Univ. Formalizing Security of Hash Functions Against Length-Extension Attacks
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) IT2008-86 ISEC2008-144 WBS2008-99
Although the resistance of length-extension attacksas well as collision resistanceis an important factor for SHA-3,NIST'... [more] IT2008-86 ISEC2008-144 WBS2008-99
pp.273-276
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:25
Fukuoka Fukuoka Institute of System LSI Design Industry Analysis on the Pseudorandom-Function Property of the SHA-256 Compression Function
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui) ISEC2008-46
Applications of an iterated hash function such as HMAC require that the compression function of the hash function is a p... [more] ISEC2008-46
pp.81-86
ISEC, SITE, IPSJ-CSEC 2008-07-25
13:50
Fukuoka Fukuoka Institute of System LSI Design Industry Hash Function Using MMO Compression Function and MDP Domain Extension
Shoichi Hirose (Univ. Fukui), Hidenori Kuwakado (Kobe Univ.) ISEC2008-47
 [more] ISEC2008-47
pp.87-94
 Results 1 - 20 of 27  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan