Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
SAT-based Differential analysis of AEGIS Family Takuro Shiraya (UOH), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (UOH) ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 |
We evaluate the security of the AEGIS family which is authenticated encryption with an associated data scheme to achieve... [more] |
ISEC2023-45 SITE2023-39 BioX2023-48 HWS2023-45 ICSS2023-42 EMM2023-45 pp.202-207 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 09:40 |
Hokkaido |
Hokkaido Jichiro Kaikan |
SAT-based Search of Related-key Impossible Distinguisher for Piccolo, TWINE, LBlock Shion Utsumi (Univ. of Hyogo), Kosei Sakamoto (MELCO), Takanori Isobe (Univ. of Hyogo) ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 |
In this paper, we evaluate security of Piccolo, TWINE, T-TWINE and LBlcok angainst on impossilbe related-key differentia... [more] |
ISEC2023-46 SITE2023-40 BioX2023-49 HWS2023-46 ICSS2023-43 EMM2023-46 pp.208-213 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 10:20 |
Hokkaido |
Hokkaido Jichiro Kaikan |
On the Maximum Differential Characteristic Probabilities for Multi-Branch Structures Kazuma Taka (Hyogo Univ.), Kosei Sakamoto (Mitsubishi Electric), Takanori Isobe (Hyogo Univ.) ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 |
The design of multiple-branch-based designs, such as the low-latency pseudo-random function Orthros, holds the potential... [more] |
ISEC2023-48 SITE2023-42 BioX2023-51 HWS2023-48 ICSS2023-45 EMM2023-48 pp.221-228 |
ISEC |
2023-05-17 15:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros (from CT-RSA 2023) Kazuma Taka, Kosei Sakamoto (Hyogo Univ.), Tatsuya Ishikawa (WDB KOUGAKU Co.,Ltd.), Takanori Isobe (Hyogo Univ.) ISEC2023-12 |
As low-latency designs tend to have a small number of rounds to decrease latency, the differential-type cryptanalysis ca... [more] |
ISEC2023-12 p.65 |
HWS, VLD |
2023-03-03 13:50 |
Okinawa |
(Primary: On-site, Secondary: Online) |
A Logic Locking Method based on Function Modification Circuit Yohei Noguchi, Masayoshi Yoshimura (Kyoto Sangyo Univ.), Rei Miura, Toshinori Hosokawa (Nihon Univ.) VLD2022-107 HWS2022-78 |
In recent years, with the increase of VLSI integration, semiconductor design companies to design a VLSI have tended to u... [more] |
VLD2022-107 HWS2022-78 pp.185-190 |
DC |
2022-03-01 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. (Primary: On-site, Secondary: Online) |
A Logic Locking Method based on SFLL-hd at Register Transfer Level Yohei Noguchi, Masayoshi Yoshimura (Kyoto Sangyo Univ.), Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.) DC2021-72 |
In recent years, with the increase of VLSI integration, LSI design companies utilize circuit design information, called ... [more] |
DC2021-72 pp.45-50 |
DC |
2021-12-10 14:00 |
Kagawa |
(Primary: On-site, Secondary: Online) |
A SAT and FALL Attacks Resistant Logic Locking Method at Register Transfer Level Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) DC2021-57 |
In recent years, to meet strict time-to-market constraints, it has become difficult for only one semiconductor design co... [more] |
DC2021-57 pp.13-18 |
RCS, SAT (Joint) |
2021-08-27 10:55 |
Online |
Online |
[Encouragement Talk]
Study on key-distillation system with adaptive polar codes in free-space quantum key distribution Yuma Yamashita (NITech), Hiroyuki Endo (NICT), Shingo Fujita, Eiji Okamoto (NITech), Hideki Takenaka, Morio Toyoshima (NICT) SAT2021-35 |
Quantum key distribution (QKD) is a cryptographic method that has been proven as secure against any physically allowable... [more] |
SAT2021-35 pp.37-42 |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2021-03-26 12:00 |
Online |
Online |
A Logic Locking Method Based on Anti-SAT at Register Transfer Level Atsuya Tsujikawa, Toshinori Hosokawa (Nihon Univ.), Masayoshi Yoshimura (Kyoto Sangyo Univ.) CPSY2020-64 DC2020-94 |
In recent years, increasing circuit density, it has become difficult for only one semiconductor design company to design... [more] |
CPSY2020-64 DC2020-94 pp.85-90 |
AP, SANE, SAT (Joint) |
2020-07-15 15:05 |
Online |
Online |
Numerical investigation on the application of polar codes to free-space quantum key distribution Yuma Yamashita (NITech), Hiroyuki Endo (NICT), Shingo Fujita, Eiji Okamoto (NITech), Hideki Takenaka, Morio Toyoshima (NICT) SAT2020-5 |
Quantum key distribution (QKD) is a technology to securely share keys against any attack physically permitted, with the ... [more] |
SAT2020-5 pp.13-18 |
SANE |
2019-06-14 11:10 |
Kanagawa |
JAXA Sagamihara Campus |
A Space System for World Peace and Security
-- For elimination of the threat of nuclear war -- Osamu Ichiyoshi (HNB21C) SANE2019-14 |
Nuclear weapons become useless if their transportation means are nullified. I have proposed a system that can immediatel... [more] |
SANE2019-14 pp.7-12 |
CS |
2018-07-12 10:59 |
Okinawa |
Eef Information Plaza (Kumejima Is.) |
Study on Routing Control Method for DoS Attack Jun Kiyama, Takuya shindo, Takefumi Hiraguri (NIT) CS2018-24 |
DoS attack that attack a web service and the internet is a big problem in recent years, because DoS attack takes a resou... [more] |
CS2018-24 pp.67-70 |
SANE |
2017-05-22 11:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Measurement deception and its countermeasure in a navigation satellite system Takashi Iwamoto (Mitsubishi Electric Corp.) SANE2017-4 |
Broadened applications of navigation satellite systems as social bases have been revealing vulnerabilities of being inte... [more] |
SANE2017-4 pp.19-22 |
IT, ISEC, WBS |
2012-03-01 15:45 |
Kanagawa |
|
New Saturation Characteristics of HyRAL Naoki Shibayama, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2011-54 ISEC2011-81 WBS2011-55 |
HyRAL is the 128-bit block cipher proposed by Hirata in 2010. It has been shown that 13-round with 256-bit secret key is... [more] |
IT2011-54 ISEC2011-81 WBS2011-55 pp.53-60 |
ISEC, IPSJ-CSEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2011-07-13 10:55 |
Shizuoka |
Shizuoka University |
Security Evaluation of HyRAL against Saturation Cryptanalysis(II) Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18 |
In this paper, we focuse on the saturation attack on block cipher HyRAL that was proposed by Hirata in 2010.
It has bee... [more] |
ISEC2011-19 SITE2011-16 ICSS2011-24 EMM2011-18 pp.103-109 |
AP, SAT (Joint) |
2009-07-09 16:10 |
Hokkaido |
Otaru city, Hokkaido |
[Special Talk]
J-ALERT
-- The warning system which tells an emergency immediately -- Chiharu Ohuchi, Yasuzumi Izumi (Lascom) AP2009-68 SAT2009-11 |
"The civil protection warning system" (J-ALERT) which notifies large-scale disasters, armed attack information and so on... [more] |
AP2009-68 SAT2009-11 pp.141-146(AP), pp.23-28(SAT) |
WBS, IT, ISEC |
2006-03-17 10:45 |
Aichi |
Nagoya Univ. |
Proposal of Image Compensation Which Embeds Data for Compensation in An Image Takumi Sasaki, Kunikatsu Kobayashi (Yamagata Univ.) |
Generally digital watermarking has the problem of being weak in the geometric
attack of rotation, expansion or reducti... [more] |
IT2005-100 ISEC2005-157 WBS2005-114 pp.31-36 |
IE, ITE-BCT, ITE-AIT, ITE-ME |
2004-11-25 16:40 |
Nagasaki |
|
Watermarking Method for Motion Pictures in MPEG Compressed Bitstream Shigeyuki Sakazawa, Yasuhiro Takishima (KDDI R&D LABS) |
A novel video watermarking method is proposed, which can directly embed a watermark into a bitstream encoded by MPEG. It... [more] |
IE2004-85 pp.33-38 |