Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 14:50 |
Hokkaido |
Sapporo Convention Center |
Collision Attack on DM-AES Kodai Taiyama (UOH), Kosei Sakamoto (ME), Ryoma Ito (NICT), Kazuma Taka, Takanori Isobe (UOH) ISEC2024-19 SITE2024-16 BioX2024-29 HWS2024-19 ICSS2024-23 EMM2024-25 |
AES-DM is a hashing mode used to construct a cryptographic hash function from AES. There are numerous results of free-st... [more] |
ISEC2024-19 SITE2024-16 BioX2024-29 HWS2024-19 ICSS2024-23 EMM2024-25 pp.73-80 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-22 16:05 |
Hokkaido |
Sapporo Convention Center |
Design of Low-Latency Block Ciphers with Multiple Linear Layers Kazuma Nakata, Tatsuya Ishikawa (Hyogo Uiv.), Kosei Sakamoto (Mitsubishi Electric), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Uiv.) ISEC2024-22 SITE2024-19 BioX2024-32 HWS2024-22 ICSS2024-26 EMM2024-28 |
Midori is a low-latency block cipher with an SPN (Substitution-Permutation Network) structure.At CSS 2023, a de- sign th... [more] |
ISEC2024-22 SITE2024-19 BioX2024-32 HWS2024-22 ICSS2024-26 EMM2024-28 pp.96-103 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2024-07-23 09:40 |
Hokkaido |
Sapporo Convention Center |
Security Analysis on the Authentication Process Using Bluetooth Shogo Shiraki, Takanori Isobe (Univ.Hyogo) ISEC2024-47 SITE2024-44 BioX2024-57 HWS2024-47 ICSS2024-51 EMM2024-53 |
Sinumy Corporation has developed a personal authentication process using Bluetooth, which employs a unique authenticatio... [more] |
ISEC2024-47 SITE2024-44 BioX2024-57 HWS2024-47 ICSS2024-51 EMM2024-53 pp.255-260 |
ICSS, IPSJ-SPT |
2024-03-21 10:55 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
A comprehensive investigation of forgery attack on the Nostr protocol Hayato Kimura (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo) ICSS2023-69 |
(To be available after the conference date) [more] |
ICSS2023-69 pp.1-8 |
ICSS, IPSJ-SPT |
2024-03-21 11:45 |
Okinawa |
OIST (Primary: On-site, Secondary: Online) |
Security Analysis on End-to-End Encryption of Zoom Mail Shogo Shiraki, Takanori Isobe (Univ.Hyogo) ICSS2023-71 |
Zoom Mail, an email service offered by Zoom Video Communications, incorporates an end-to-end encryption (E2EE) scheme, t... [more] |
ICSS2023-71 pp.17-24 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
SAT-based Differential analysis of AEGIS Family Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH) ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 |
We evaluate the security of the AEGIS family which is authenticated encryption with an associated data scheme to achieve... [more] |
ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 pp.202-207 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock Shion Utsumi (Univ. of Hyogo), Kosei Sakamoto (MELCO), Takanori Isobe (Univ. of Hyogo) ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 |
In this paper, we evaluate security of Piccolo, TWINE, T-TWINE and LBlcok angainst on impossilbe related-key differentia... [more] |
ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 pp.208-213 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 |
The design of multiple-branch-based designs, such as the low-latency pseudo-random function Orthros, holds the potential... [more] |
ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 pp.221-228 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 14:30 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Security Analysis on Nostr protocol for decentralized SNS Hayato Kimura, Takanori Isobe (Univ. Hyogo) ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51 |
Nostr is a protocol for distributed social networking services (SNS) characterized by being Simple, Resilient, and Verif... [more] |
ISEC2023-51 SITE2023-45 BioX2023-54 HWS2023-51 ICSS2023-48 EMM2023-51 pp.239-246 |
ISEC |
2023-05-17 15:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros (from CT-RSA 2023) Kazuma Taka, Kosei Sakamoto (Hyogo Univ.), Tatsuya Ishikawa (WDB KOUGAKU Co.,Ltd.), Takanori Isobe (Hyogo Univ.) ISEC2023-12 |
As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis ca... [more] |
ISEC2023-12 p.65 |
RCC, ISEC, IT, WBS |
2023-03-15 15:20 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Evaluation and Improvement of Related Key Differential Attack for the Block Cipher Midori Shion Hirao, Keigo Horibe, Kosei Sakamoto, Takanori Isobe (UOH) IT2022-132 ISEC2022-111 WBS2022-129 RCC2022-129 |
[more] |
IT2022-132 ISEC2022-111 WBS2022-129 RCC2022-129 pp.404-411 |
IT, ISEC, RCC, WBS |
2022-03-11 11:35 |
Online |
Online |
Improved Large-state Permutation based on AES instruction and Its Applications Motoki Nakahashi, Rentaro Shiba, Kosei Sakamoto, Fukang Liu (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo/NICT/PRESTO) IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90 |
In CSS2021, Nakahashi et al. showed an optimal Feistel-type large-state permutations using only AES-NI from the security... [more] |
IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90 pp.188-195 |
IT, ISEC, RCC, WBS |
2022-03-11 14:05 |
Online |
Online |
Rocca: Efficient AES-based Encryption Scheme for Beyond 5G Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Yuto Nakano, Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101 |
In this paper, we present an AES-based authenticated-encryption with associated-data scheme nemed Rocca, with the purpos... [more] |
IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101 pp.249-255 |
IT, ISEC, RCC, WBS |
2022-03-11 14:30 |
Online |
Online |
Implementation and Performance Evaluation of Rocca Yuto Nakano (KDDI Research), Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102 |
In this paper, we implement an AES-based authenticated-encryption with associated-data scheme called name, proposed by S... [more] |
IT2021-127 ISEC2021-92 WBS2021-95 RCC2021-102 pp.256-261 |
ICSS, IPSJ-SPT |
2021-03-02 14:55 |
Online |
Online |
Security Evaluation of End-to-End Encryption of LINE Version 2 Kotaro Kita, Takanori Isobe (UH) ICSS2020-47 |
[more] |
ICSS2020-47 pp.126-131 |
ISEC |
2020-05-20 13:50 |
Online |
Online |
[Invited Talk]
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure (from IWSEC 2019) Kosei Sakamoto (University of Hyogo), Kazuhiko Minematsu (NEC), Nao Shibata, Maki Shigeri, Hiroyasu Kubo (NES), Yuki Funabiki (Kobe Univ.), Andrey Bogdanov (DTU), Sumio Morioka (Interstellar), Takanori Isobe (University of Hyogo/NICT) ISEC2020-7 |
[more] |
ISEC2020-7 p.29 |
ISEC, IT, WBS |
2020-03-11 09:30 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Security Evaluation of Differential Attacks against KCipher-2 Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) IT2019-108 ISEC2019-104 WBS2019-57 |
This paper will investigate the resistance of KCipger-2 against differential attacks, which is the unique official strea... [more] |
IT2019-108 ISEC2019-104 WBS2019-57 pp.121-126 |
SITE, ISEC, LOIS |
2018-11-03 11:00 |
Fukuoka |
|
A Statistical Method for Searching Biases of Stream Ciphers Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24 |
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] |
ISEC2018-64 SITE2018-42 LOIS2018-24 pp.1-6 |
SITE, ISEC, LOIS |
2018-11-03 11:30 |
Fukuoka |
|
A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25 |
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] |
ISEC2018-65 SITE2018-43 LOIS2018-25 pp.7-12 |
ISEC |
2018-09-07 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (from CRYPTO2018) Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo) ISEC2018-61 |
[more] |
ISEC2018-61 p.57 |