|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, RCC, WBS |
2022-03-11 11:35 |
Online |
Online |
Improved Large-state Permutation based on AES instruction and Its Applications Motoki Nakahashi, Rentaro Shiba, Kosei Sakamoto, Fukang Liu (Univ. Hyogo), Ryoma Ito (NICT), Kazuhiko Minematsu (NEC), Takanori Isobe (Univ. Hyogo/NICT/PRESTO) IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90 |
In CSS2021, Nakahashi et al. showed an optimal Feistel-type large-state permutations using only AES-NI from the security... [more] |
IT2021-115 ISEC2021-80 WBS2021-83 RCC2021-90 pp.188-195 |
IT, ISEC, RCC, WBS |
2022-03-11 14:05 |
Online |
Online |
Rocca: Efficient AES-based Encryption Scheme for Beyond 5G Kosei Sakamoto, Fukang Liu (Univ of Hyogo), Yuto Nakano, Shinsaku Kiyomoto (KDDI Research), Takanori Isobe (Univ of Hyogo/NICT) IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101 |
In this paper, we present an AES-based authenticated-encryption with associated-data scheme nemed Rocca, with the purpos... [more] |
IT2021-126 ISEC2021-91 WBS2021-94 RCC2021-101 pp.249-255 |
CPSY |
2007-10-25 15:50 |
Kumamoto |
Kumamoto University |
Acceleration of AES Encryption with CAM-Enhanced Massive-Parallel SIMD Matrix Processor Masakatsu Ishizaki, Takeshi Kumaki, Masaharu Tagami, Tetsushi Koide, Hans Juergen Mattausch (Hiroshima Univ.), Takayuki Gyohten, Hideyuki Noda, Yoshihiro Okuno, Kazutami Arimoto (Renesas Technology) CPSY2007-28 |
We have previously reported that the Content Addressable Memory (CAM)-enhanced massive-parallel Single Instruction Multi... [more] |
CPSY2007-28 pp.25-30 |
IT, ISEC, WBS |
2007-03-16 13:50 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Performance Evaluation of Block Encryption Algorithms on Core2 Junko Nakajima, Mitsuru Matsui (Mitsubishi Electric Corp.) |
This paper discusses the cutting-edge methodology of software optimization for symmetric cryptographic primitives on the... [more] |
IT2006-103 ISEC2006-158 WBS2006-100 pp.105-110 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|