IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 15 of 15  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC 2018-09-07
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (from CRYPTO2018)
Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo) ISEC2018-61
 [more] ISEC2018-61
ISEC 2018-09-07
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1 (from CRYPTO2018)
Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo), Kazumaro Aoki (NTT) ISEC2018-62
 [more] ISEC2018-62
ISEC 2017-09-04
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Cube Attacks on Non-Blackbox Polynomials based on Division Property (from CRYPTO 2017)
Yosuke Todo (NTT), Takanori Isobe (Univ. of Hyogo) ISEC2017-48
 [more] ISEC2017-48
ISEC 2015-12-18
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Integral Cryptanalysis on Full MISTY1 (from CRYPTO 2015)
Yosuke Todo (NTT) ISEC2015-59
 [more] ISEC2015-59
ISEC 2015-09-04
Tokyo Kikai-Shinko-Kaikan Bldg. [Invited Talk] Structural Evaluation by Generalized Integral Property (from EUROCRYPT 2015)
Yosuke Todo (NTT) ISEC2015-33
 [more] ISEC2015-33
ISEC, LOIS 2011-11-14
Osaka Osaka Electro-Communication University Evaluation and Improvement against a Lattice Trapdoor Function in the Alwen-Peikert Construction
Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-34 LOIS2011-28
In 2009, Peikert proposed a public-key cryptosystem that is secure against the chosen ciphertext attack. In this cryptos... [more] ISEC2011-34 LOIS2011-28
ISEC, LOIS 2011-11-14
Osaka Osaka Electro-Communication University A Lattice Attack against (u|u+v)ΣPKC
Atsushi Nagao, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-35 LOIS2011-29
In 2010, Kasahara et al. proposed a knapsack cryptosystem secure against a low-density attack.
The cryptosystem were a... [more]
ISEC2011-35 LOIS2011-29
ISEC, LOIS 2011-11-15
Osaka Osaka Electro-Communication University Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-48 LOIS2011-42
WEP is a security protocol in a wireless LAN network, and its vulnerability has been pointed out.Many key recovering att... [more] ISEC2011-48 LOIS2011-42
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] 2011-09-20
Ehime   A Proposal of a WEP Operation Secure Against the Key-Recovery Attack
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) LOIS2011-17 IE2011-50 EMM2011-28
WEP is a security protocol in a wireless LAN network, and its ulnerability has been pointed out.Many key recovering atta... [more] LOIS2011-17 IE2011-50 EMM2011-28
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] 2011-07-13
Shizuoka Shizuoka University The proposal of the evaluation for decryption failure about GGH series
Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-18 SITE2011-15 ICSS2011-23 EMM2011-17
The GGH cryptosystem is a public key cryptosystem proposed by O. Goldreich, S. Goldwasser and S. Halevil in 1997. This c... [more] ISEC2011-18 SITE2011-15 ICSS2011-23 EMM2011-17
IE, LOIS, ITE-ME, IEE-CMN [detail] 2010-09-21
Kochi   Proposal of CAPTCHA Method based on the Difficulty of Image Recognition
Tsukasa Kobayashi, Yosuke Todo, Masakatu Morii (Kobe Univ.) LOIS2010-24 IE2010-66
A CAPTCHA is used to protectWeb service against unfair use with automated program. A CAPTCHA is a test to ensure that th... [more] LOIS2010-24 IE2010-66
IT 2010-07-22
Tokyo Kogakuin University Speeding Up of a WEP-Key Recovery attack using IP Packets
Ryohei Okamoto, Yosuke Todo, Masakatu Morii (Kobe Univ.) IT2010-17
WEP is the security protocol in the wireless LAN, and its vulnerability is have been pointed out.
However, the attacke... [more]
IT, ISEC, WBS 2010-03-05
Nagano Nagano-Engineering Campus, Shinshu University A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet -- Almost All Implementations of WPA-TKIP Can Be Attacked --
Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IT2009-106 ISEC2009-114 WBS2009-85
 [more] IT2009-106 ISEC2009-114 WBS2009-85
IT, ISEC, WBS 2010-03-05
Nagano Nagano-Engineering Campus, Shinshu University A Note on Realistic Damages Caused by a Message Falsification Attack on WPA-TKIP
Yuki Ozawa, Yosuke Todo (Kobe Univ), Toshihiro Ohigashi (Hiroshima Univ), Masakatu Morii (Kobe Univ) IT2009-107 ISEC2009-115 WBS2009-86
 [more] IT2009-107 ISEC2009-115 WBS2009-86
LOIS, IE, ITE-ME, IEE-CMN 2009-09-25
Hiroshima Hiroshima Univ. The Vulnerability Scanner for Client using Existing Vulnerability Databases
Yosuke Todo, Yasuo Asakura, Masakatu Morii (Kobe Univ.) LOIS2009-37 IE2009-78
The threats of the attacks that exploit vulnerabilities in software are amazingly increased in recent years. Because of ... [more] LOIS2009-37 IE2009-78
 Results 1 - 15 of 15  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan