IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 21  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2016-03-04
13:30
Kyoto Academic Center for Computing and Media Studies, Kyoto University A New Key Correlation in the Stream Cipher RC4
Daiki Michihiro (JAIST), Atsuko Miyaji (Osaka Univ./JAIST/CREST) ICSS2015-65
The stream cipher RC4 has been analyzed by using various schemes since the algorithm was leaked
in 1994.In particular, ... [more]
ICSS2015-65
pp.111-116
ICSS 2015-03-04
10:50
Okinawa Meio Univiersity New Linear Correlations and Analysis Method for Key Recovery Attack of RC4 in WPA
Daiki Michihiro (JAIST), Atsuko Miyaji (JAIST/JST CREST), Ryoma Ito (JAIST) ICSS2014-85
The first three bytes of the RC4 key in WPA are derived from the public parameter IV, and also the attacker can obtain t... [more] ICSS2014-85
pp.133-138
ISEC 2014-05-09
14:00
Tokyo Kikai-Shinko-Kaikan Bldg. New Negative Biases in Long-Term Glimpse of RC4
Ryoma Ito, Atsuko Miyaji (JAIST) ISEC2014-3
RC4 stream cipher was designed by Ron Rivest in 1987 and is widely used for protocol, such as SSL/TLS, WEP, WPA and more... [more] ISEC2014-3
pp.13-19
ICSS, IPSJ-SPT 2014-03-27
13:30
Okinawa Meio Univiersity An Active Attack on RC4 in SSL/TLS
Toshihiro Ohigashi (Hiroshima Univ.), Takanori Isobe (Sony), Yuhei Watanabe (Kobe Univ.), Ryo Nojima (NICT), Masakatu Morii (Kobe Univ.) ICSS2013-63
In 2013, Isobe et al. and AlFardan et al. proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadca... [more] ICSS2013-63
pp.7-12
IA, ICSS 2013-06-20
15:00
Niigata Ao-re Nagaoka Vulnerability of RC4 in SSL/TLS
Yuhei Watanabe, Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.) IA2013-4 ICSS2013-4
In FSE2013, we showed that the first 257 bytes and 1000T bytes of the plaintext could be easily recovered with high prob... [more] IA2013-4 ICSS2013-4
pp.19-24
ISEC, LOIS 2011-11-15
09:00
Osaka Osaka Electro-Communication University Proposal and Evaluation of a Secure WEP Operation against Existing Key Recovery Attacks
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) ISEC2011-48 LOIS2011-42
WEP is a security protocol in a wireless LAN network, and its vulnerability has been pointed out.Many key recovering att... [more] ISEC2011-48 LOIS2011-42
pp.93-100
ITE-ME, EMM, IE, LOIS, IEE-CMN [detail] 2011-09-20
13:50
Ehime   A Proposal of a WEP Operation Secure Against the Key-Recovery Attack
Tsubasa Tsukaune, Yosuke Todo, Masakatu Morii (Kobe Univ.) LOIS2011-17 IE2011-50 EMM2011-28
WEP is a security protocol in a wireless LAN network, and its ulnerability has been pointed out.Many key recovering atta... [more] LOIS2011-17 IE2011-50 EMM2011-28
pp.11-16
NS, IN
(Joint)
2010-03-05
14:00
Miyazaki Miyazaki Phoenix Seagaia Resort (Miyazaki) 10Gbps implementation of TLS/SSL accelerator on FPGA
Takashi Isobe, Satoshi Tsutsumi (Hitachi Ltd.,), Koichiro Seto, Kenji Aoshima, Kazutoshi Kariya (Hitachi Cable Ltd.,) NS2009-260
This paper is the one-chip architecture to mount all processes for TLS/SSL encrypted communication into one FPGA or ASIC... [more] NS2009-260
pp.549-554
ISEC, LOIS 2009-11-13
13:00
Gifu Gifu Univ. State Recovery of RC4 PRGA by Using Nonzero Bit Differences
Mitsuki Ajiro, Atsuko Miyaji (JAIST) ISEC2009-65 LOIS2009-54
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the
transitions of two permutations, $S$ and $S'$, ... [more]
ISEC2009-65 LOIS2009-54
pp.95-100
WBS, IT, ISEC 2009-03-10
09:50
Hokkaido Hakodate Mirai Univ. Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (1)
Masahiro Sukegawa, Atsuko Miyaji (JAIST) IT2008-80 ISEC2008-138 WBS2008-93
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the
transitions of two permutations, $S$ and $S'$,... [more]
IT2008-80 ISEC2008-138 WBS2008-93
pp.231-237
WBS, IT, ISEC 2009-03-10
10:15
Hokkaido Hakodate Mirai Univ. Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (2)
Mitsuki Ajiro, Masahiro Sukegawa, Atsuko Miyaji (JAIST) IT2008-81 ISEC2008-139 WBS2008-94
In this paper, we focus on a keystream of RC4 PRGA. The analysis of the transitions of two permutations, S and S′,
with... [more]
IT2008-81 ISEC2008-139 WBS2008-94
pp.239-244
ISEC, LOIS 2008-11-14
09:55
Aichi Nagoya Noh Theater Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences
Masahiro Sukegawa, Atsuko Miyaji (Japan Advanced Institute of Science and Technology) ISEC2008-83 OIS2008-59
In this paper, we focus on a shuffle-exchange structure of PRGA.
We investigate how the structure mixes the permutatio... [more]
ISEC2008-83 OIS2008-59
pp.67-72
ISEC, IT, WBS 2008-02-28
13:00
Tokyo   [Invited Talk] [Invitation Talk] The State of Stream Ciphers
Masakatu Morii (Kobe Univ.) IT2007-35 ISEC2007-132 WBS2007-66
The author has been working in the field of Network Security and Cryptography. Recently it is in stream cipher. This pap... [more] IT2007-35 ISEC2007-132 WBS2007-66
pp.23-30
ISEC, IT, WBS 2008-02-29
13:25
Tokyo   RC4 Keystream Generator (1)
Imaya, Masahiro Sukegawa, Atsuko Miyaji (JAIST) IT2007-62 ISEC2007-159 WBS2007-93
Pseudo-Random Generation Algorithm(PRGA) on RC4 change at most two entry per round.
If two PRGAs internal states are al... [more]
IT2007-62 ISEC2007-159 WBS2007-93
pp.89-94
ISEC, IT, WBS 2008-02-29
13:50
Tokyo   New Weakness in Alleged RC4 Keystream Generator (2)
Masahiro Sukegawa, Imaya, Atsuko Miyaji (JAIST) IT2007-63 ISEC2007-160 WBS2007-94
Pseudo-Random Generation Algorithm(PRGA) on RC4 change at most two entry per round.
If two PRGAs internal states are al... [more]
IT2007-63 ISEC2007-160 WBS2007-94
pp.95-100
ISEC, LOIS 2007-11-22
15:20
Hyogo Kobe University A Key Recovery Attack on WEP with Less Packets
Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-109 OIS2007-81
E. Tews, R. Weinmann, and A. Pyshkin have recently shown a key recovery attack on WEP (called the PTW attack). The PTW a... [more] ISEC2007-109 OIS2007-81
pp.61-68
ISEC, LOIS 2007-11-22
16:10
Hyogo Kobe University New Weak Keys on RC4
Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-111 OIS2007-83
This paper discusses the keys on RC4 which parts of them can be recovered from
their outputs with high probability.
We... [more]
ISEC2007-111 OIS2007-83
pp.75-80
CQ, LOIS, IE, IEE-CMN, ITE-ME 2007-09-27
15:40
Tokushima The university of Tokushima New Method for Reconstructing a Part of the Internal State in RC4
Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) CQ2007-49 OIS2007-39 IE2007-46
This paper discusses the correlation on the initial states-keystream of
RC4, and
gives the key recovery attack exploit... [more]
CQ2007-49 OIS2007-39 IE2007-46
pp.71-76
ISEC, SITE, IPSJ-CSEC 2007-07-20
10:45
Hokkaido Future University-Hakodate A Study on the Tews-Weinmann-Pyshkin Attack against WEP
Yuko Ozasa, Yoshiaki Fujikawa, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) ISEC2007-47
Tews, Weinmann, and Phshkin have shown a key recovery attack against WEP (the TWP attack), which is the modification of ... [more] ISEC2007-47
pp.17-21
IT, WBS, ISEC 2005-03-17
16:10
Kyoto Kyoto Univ. A Chosen IV Attack against FMS Attack-Resistant WEP Implementation
Toshihiro Ohigashi (The Univ. of Tokushima), Yoshiaki Shiraishi (Kinki Univ.), Masakatu Morii (The Univ. of Tokushima)
WEP protocol is a security protocol to protect privacy of the wireless LAN communication. Original WEP was broken by the... [more] IT2004-57 ISEC2004-113 WBS2004-172
pp.43-48
 Results 1 - 20 of 21  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan