Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
SAT-based Differential analysis of AEGIS Family Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH) ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 |
We evaluate the security of the AEGIS family which is authenticated encryption with an associated data scheme to achieve... [more] |
ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 pp.202-207 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock Shion Utsumi (Univ. of Hyogo), Kosei Sakamoto (MELCO), Takanori Isobe (Univ. of Hyogo) ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 |
In this paper, we evaluate security of Piccolo, TWINE, T-TWINE and LBlcok angainst on impossilbe related-key differentia... [more] |
ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 pp.208-213 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 |
The design of multiple-branch-based designs, such as the low-latency pseudo-random function Orthros, holds the potential... [more] |
ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 pp.221-228 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 14:30 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Security Analysis on Nostr protocol for decentralized SNS Hayato Kimura, Takanori Isobe (Univ. Hyogo) ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51 |
Nostr is a protocol for distributed social networking services (SNS) characterized by being Simple, Resilient, and Verif... [more] |
ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51 pp.239-246 |
ISEC |
2023-05-17 15:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros (from CT-RSA 2023) Kazuma Taka, Kosei Sakamoto (Hyogo Univ.), Tatsuya Ishikawa (WDB KOUGAKU Co.,Ltd.), Takanori Isobe (Hyogo Univ.) ISEC2023-12 |
As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis ca... [more] |
ISEC2023-12 p.65 |
RCC, ISEC, IT, WBS |
2023-03-15 15:20 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Evaluation and Improvement of Related Key Differential Attack for the Block Cipher Midori Shion Hirao, Keigo Horibe, Kosei Sakamoto, Takanori Isobe (UOH) IT2022-132 ISEC2022-111 WBS2022-129 RCC2022-129 |
[more] |
IT2022-132 ISEC2022-111 WBS2022-129 RCC2022-129 pp.404-411 |
IT, ISEC, RCC, WBS |
2022-03-11 11:35 |
Online |
Online |
Improved Large-state Permutation based on AES instruction and Its Applications Motoki Nakahashi, Rentaro Shiba, Kosei Sakamoto, Fukang Liu (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo/NICT/PRESTO) IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90 |
In CSS2021, Nakahashi et al. showed an optimal Feistel-type large-state permutations using only AES-NI from the security... [more] |
IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90 pp.188-195 |
IT, ISEC, RCC, WBS |
2022-03-11 14:05 |
Online |
Online |
Rocca: Efficient AES-based Encryption Scheme for Beyond 5G Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Yuto Nakano, Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101 |
In this paper, we present an AES-based authenticated-encryption with associated-data scheme nemed Rocca, with the purpos... [more] |
IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101 pp.249-255 |
IT, ISEC, RCC, WBS |
2022-03-11 14:30 |
Online |
Online |
Implementation and Performance Evaluation of Rocca Yuto Nakano (KDDI Research), Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102 |
In this paper, we implement an AES-based authenticated-encryption with associated-data scheme called name, proposed by S... [more] |
IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102 pp.256-261 |
ICSS, IPSJ-SPT |
2021-03-02 14:55 |
Online |
Online |
Security Evaluation of End-to-End Encryption of LINE Version 2 Kotaro Kita, Takanori Isobe (UH) ICSS2020-47 |
[more] |
ICSS2020-47 pp.126-131 |
ISEC |
2020-05-20 13:50 |
Online |
Online |
[Invited Talk]
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure (from IWSEC 2019) Kosei Sakamoto (University of Hyogo), Kazuhiko Minematsu (NEC), Nao Shibata, Maki Shigeri, Hiroyasu Kubo (NES), Yuki Funabiki (Kobe Univ.), Andrey Bogdanov (DTU), Sumio Morioka (Interstellar), Takanori Isobe (University of Hyogo/NICT) ISEC2020-7 |
[more] |
ISEC2020-7 p.29 |
ISEC, IT, WBS |
2020-03-11 09:30 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Security Evaluation of Differential Attacks against KCipher-2 Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57 |
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] |
IT2019-108 ISEC2019-104 WBS2019-57 pp.121-126 |
SITE, ISEC, LOIS |
2018-11-03 11:00 |
Fukuoka |
|
A Statistical Method for Searching Biases of Stream Ciphers Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24 |
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] |
ISEC2018-64 SITE2018-42 LOIS2018-24 pp.1-6 |
SITE, ISEC, LOIS |
2018-11-03 11:30 |
Fukuoka |
|
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25 |
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] |
ISEC2018-65 SITE2018-43 LOIS2018-25 pp.7-12 |
ISEC |
2018-09-07 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (from CRYPTO2018) Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo) ISEC2018-61 |
[more] |
ISEC2018-61 p.57 |
ISEC |
2018-09-07 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1 (from CRYPTO2018) Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo), Kazumaro Aoki (NTT) ISEC2018-62 |
[more] |
ISEC2018-62 p.59 |
ISEC |
2018-05-16 16:30 |
Tokyo |
Ookayama Campus, Tokyo Institute of Technology |
[Invited Talk]
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers Takanori Isobe (Univ. of Hyogo), Kyoji Shibutani (Nagoya Univ.) ISEC2018-11 |
In this invited talk, we introduce our paper presented in international cryptographic conference ASIACRYPT 2017 held on ... [more] |
ISEC2018-11 p.61 |
ISEC |
2017-09-04 16:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Cube Attacks on Non-Blackbox Polynomials based on Division Property (from CRYPTO 2017) Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo) ISEC2017-48 |
[more] |
ISEC2017-48 p.45 |
ISEC, WBS, IT |
2017-03-09 10:25 |
Tokyo |
TOKAI University |
A Note on Key Dependency of Stream Cipher Grain v1 Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) IT2016-99 ISEC2016-89 WBS2016-75 |
Meet-in-the-middle (MITM) attack is a powerful cryptanalytic method for block ciphers. Several attacks for block ciphers... [more] |
IT2016-99 ISEC2016-89 WBS2016-75 pp.1-6 |
ISEC, WBS, IT |
2017-03-09 11:25 |
Tokyo |
TOKAI University |
[Invited Talk]
Recent Advances in Whitebox Cryptgraphy
-- Efficient and Robust Constructions and New Attacks -- Takanori Isobe (Sony Global M&O Corp.) IT2016-102 ISEC2016-92 WBS2016-78 |
Whitebox cryptography is a technique to protect software implementations of cryptographic algorithms
in untrusted envir... [more] |
IT2016-102 ISEC2016-92 WBS2016-78 p.23 |