IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 33  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
NS, ICM, CQ, NV
(Joint)
2020-11-26
15:25
Online Online [Invited Talk] Development of the Edge Computing Platform with Dynamic Modular Architecture and its Application of Cryptography with Advanced Functionality
Hidenobu Watanabe, Tohru Kondo (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) NS2020-75 CQ2020-47 ICM2020-26
We have developed an edge computing platform that can coordinate with each computing resources of device , edge and clou... [more] NS2020-75 CQ2020-47 ICM2020-26
pp.4-8(NS), pp.4-8(CQ), pp.38-42(ICM)
ISEC 2019-05-17
16:30
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] A Generic Construction of Integrated Secure-Channel Free PEKS and PKE (from ISPEC 2018)
Tatsuya Suzuki (Tokai Univ./NICT), Keita Emura (NICT), Toshihiro Ohigashi (Tokai Univ./NICT) ISEC2019-10
In this talk we explain the content of ``A Generic Construction of Integrated Secure-Channel Free PEKS and PKE'' (Tatsuy... [more] ISEC2019-10
p.47
SITE, ISEC, LOIS 2018-11-03
11:00
Fukuoka   A Statistical Method for Searching Biases of Stream Ciphers
Seiya Tanamoto, Toshihiro Ohigashi (Tokai Univ), Takanori Isobe (Univ. of Hyogo) ISEC2018-64 SITE2018-42 LOIS2018-24
Plaintext recovery attacks on stream ciphers based on biases of keystream in the broadcast setting where same plaintext ... [more] ISEC2018-64 SITE2018-42 LOIS2018-24
pp.1-6
SITE, ISEC, LOIS 2018-11-03
11:30
Fukuoka   A Study on a New Evaluation Tool for Pseudo Random Number Generators based on Neural Network
Hayato Kimura (Tokai Univ.), Takanori Isobe (Univ. of Hyogo), Toshihiro Ohigashi (Tokai Univ.) ISEC2018-65 SITE2018-43 LOIS2018-25
Security of stream cipher depends on PRNG (Pseudo Random Number Generator) of the stream cipher. There are evaluation me... [more] ISEC2018-65 SITE2018-43 LOIS2018-25
pp.7-12
IA, SITE, IPSJ-IOT [detail] 2018-03-05
14:30
Tochigi Kinugawa Onsen Hotel Implementation and Evaluation on Security Modules for the Edge Computing Platform based on Modular Architecture
Hiroyuki Yanagi, Hayato Kimura (Tokai Univ.), Tohru Kondo, Hidenobu Watanabe (Hiroshima Univ.), Toshihiro Ohigashi (Tokai Univ.) SITE2017-65 IA2017-76
Edge computing platform requires capability of deploy demanded functions appropriately and rapidly. We proposed Edge Com... [more] SITE2017-65 IA2017-76
pp.91-96
ISEC, COMP 2017-12-21
15:25
Kochi Eikokuji Campus, Kochi University of Technology Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.) ISEC2017-79 COMP2017-33
Aggregator Oblivious Encryption (AOE) was proposed by Shi et al. in NDSS 2011. AOE with public verifiability was also pr... [more] ISEC2017-79 COMP2017-33
pp.43-50
ISEC, WBS, IT 2017-03-09
10:25
Tokyo TOKAI University A Note on Key Dependency of Stream Cipher Grain v1
Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.) IT2016-99 ISEC2016-89 WBS2016-75
Meet-in-the-middle (MITM) attack is a powerful cryptanalytic method for block ciphers. Several attacks for block ciphers... [more] IT2016-99 ISEC2016-89 WBS2016-75
pp.1-6
ICSS, IA 2014-06-06
11:20
Hyogo Takikawa Memorial Hall, Kobe University Ransomware: Threat Analysis and Countermeasures
Akira Kanaoka (Toho Univ.), Toshihiro Ohigashi (Hiroshima Univ.) IA2014-7 ICSS2014-7
Ransomware which disables data or functions in victim's computer and demand money from victim, uses cryptographic techno... [more] IA2014-7 ICSS2014-7
pp.33-38
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity An Active Attack on RC4 in SSL/TLS
Toshihiro Ohigashi (Hiroshima Univ.), Takanori Isobe (Sony), Yuhei Watanabe (Kobe Univ.), Ryo Nojima (NICT), Masakatu Morii (Kobe Univ.) ICSS2013-63
In 2013, Isobe et al. and AlFardan et al. proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadca... [more] ICSS2013-63
pp.7-12
IA, ICSS 2013-06-20
15:00
Niigata Ao-re Nagaoka Vulnerability of RC4 in SSL/TLS
Yuhei Watanabe, Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IA2013-4 ICSS2013-4
In FSE2013, we showed that the first 257 bytes and 1000T bytes of the plaintext could be easily recovered with high prob... [more] IA2013-4 ICSS2013-4
pp.19-24
ICSS 2012-11-22
15:35
Hiroshima Miyajima Mori-no-Yado Implementation and Evaluation of a File Sharing Service with File Name Encryption using CP-ABE
Megumi Goto, Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) ICSS2012-53
Online storage services, e.g. Dropbox, have a weakness, which the storage administrator can obtain contents of user's fi... [more] ICSS2012-53
pp.49-54
IT, ISEC, WBS 2010-03-05
10:50
Nagano Nagano-Engineering Campus, Shinshu University A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet -- Almost All Implementations of WPA-TKIP Can Be Attacked --
Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IT2009-106 ISEC2009-114 WBS2009-85
 [more] IT2009-106 ISEC2009-114 WBS2009-85
pp.225-232
IT, ISEC, WBS 2010-03-05
11:15
Nagano Nagano-Engineering Campus, Shinshu University A Note on Realistic Damages Caused by a Message Falsification Attack on WPA-TKIP
Yuki Ozawa, Yosuke Todo (Kobe Univ), Toshihiro Ohigashi (Hiroshima Univ), Masakatu Morii (Kobe Univ) IT2009-107 ISEC2009-115 WBS2009-86
 [more] IT2009-107 ISEC2009-115 WBS2009-86
pp.233-240
ISEC, LOIS 2009-11-13
13:50
Gifu Gifu Univ. Speeding Up of a Message Falsification Attack on WPA-TKIP
Toshihiro Ohigashi (Hiroshima Univ.), Yuki Ozawa, Masakatu Morii (Kobe Univ.) ISEC2009-67 LOIS2009-56
 [more] ISEC2009-67 LOIS2009-56
pp.107-112
LOIS, IE, ITE-ME, IEE-CMN 2009-09-25
16:20
Hiroshima Hiroshima Univ. An Implementation and Evaluation for a Message Falsification Attack on WPA
Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) LOIS2009-38 IE2009-79
 [more] LOIS2009-38 IE2009-79
pp.113-118
ICSS 2009-05-15
16:15
Hyogo Kobe University A Study on Modification Attacks on WPA
Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.)
 [more]
IA, SITE 2009-03-05
16:00
Kumamoto   A Wearable Device Support System using Virtualization and IP Mobility Architecture
Hidenobu Watanabe, Toshihiro Ohigashi, Tohru Kondo, Kouji Nishimura, Reiji Aibara (Hiroshima Univ) SITE2008-65 IA2008-88
The wearable computing uses wearable devices that can be worn to human's body. We always can use the application with su... [more] SITE2008-65 IA2008-88
pp.125-130
IA, SITE 2009-03-06
09:50
Kumamoto   A Management Method of MAC Address Authentication in Large-Scale Campus Networks
Kouichi Tashima, Tohru Kondo, Seigo Kishiba, Toshihiro Ohigashi, Norikazu Iwata, Kouji Nishimura, Reiji Aibara (Hiroshima Univ.) SITE2008-89 IA2008-112
 [more] SITE2008-89 IA2008-112
pp.265-270
ISEC, LOIS 2007-11-22
15:20
Hyogo Kobe University A Key Recovery Attack on WEP with Less Packets
Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-109 OIS2007-81
E. Tews, R. Weinmann, and A. Pyshkin have recently shown a key recovery attack on WEP (called the PTW attack). The PTW a... [more] ISEC2007-109 OIS2007-81
pp.61-68
ISEC, LOIS 2007-11-22
15:45
Hyogo Kobe University A Key Recovery Attack with Equivalent Keys of Stream Cipher
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-110 OIS2007-82
 [more] ISEC2007-110 OIS2007-82
pp.69-74
 Results 1 - 20 of 33  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan