Search Results 1-20 of 68

  • 1 / 4
  • Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset  [in Japanese]

    上野 嶺 , 森岡 澄夫 , 三浦 典之 , 松田 航平 , 永田 真 , Bhasin Shivam , Mathieu Yves , Graba Tarik , Danger Jean-Luc , 本間 尚文

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 119(143), 375-382, 2019-07-23

  • Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset  [in Japanese]

    上野 嶺 , 森岡 澄夫 , 三浦 典之 , 松田 航平 , 永田 真 , Bhasin Shivam , Mathieu Yves , Graba Tarik , Danger Jean-Luc , 本間 尚文

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 119(142), 375-382, 2019-07-23

  • Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset  [in Japanese]

    上野 嶺 , 森岡 澄夫 , 三浦 典之 , 松田 航平 , 永田 真 , Bhasin Shivam , Mathieu Yves , Graba Tarik , Danger Jean-Luc , 本間 尚文

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 119(141), 375-382, 2019-07-23

  • Design of Highly Efficient AES Hardware Architectures Based on Multiplicative-Offset  [in Japanese]

    上野 嶺 , 森岡 澄夫 , 三浦 典之 , 松田 航平 , 永田 真 , Bhasin Shivam , Mathieu Yves , Graba Tarik , Danger Jean-Luc , 本間 尚文

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 119(140), 375-382, 2019-07-23

  • Mathematical Analysis of Secrecy Amplification in Key Infection: The Whispering Mode

    YUM Dae HYUN

    … a sensor node wishing to communicate secretly with other nodes simply sends a symmetric encryption key in the clear. … whispering mode).</p> …

    IEICE Transactions on Information and Systems E102.D(12), 2599-2602, 2019

    J-STAGE 

  • Post-Quantum Security of IGE Mode Encryption in Telegram

    LEE Jeeun , KIM Sungsook , LEE Seunghyun , KIM Kwangjo

    … <p>IGE mode used in Telegram's customized protocol has not been fully investigated in terms of post-quantum security. … In this letter, we show that IGE mode is IND-qCPA insecure by Simon's algorithm, assuming that the underlying block cipher is a standard-secure pseudorandom function (sPRF). … Under a stronger assumption that the block cipher is a quantum-secure pseudorandom function (qPRF), IND-qCPA security of IGE mode is proved using one-way to hiding lemma.</p> …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A(1), 148-151, 2019

    J-STAGE 

  • Cryptographically-Secure Outsorcing of Statistical Data Analysis I: Descriptive Statistics  [in Japanese]

    陸 文杰 , 川崎 将平 , 佐久間 淳

    コンピュータセキュリティシンポジウム2015論文集 2015(3), 266-273, 2015-10-14

    IPSJ 

  • Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions  [in Japanese]

    MINEMATSU Kazuhiko

    Technical report of IEICE. ISEC 114(203), 49, 2014-08-29

  • A Security Enhancement Scheme for Wireless Packet Communications Using Secret Sharing and Precoding  [in Japanese]

    YAMASAKI Shoichiro , MATSUSHIMA Tomoko K. , OHNO Kazuyoshi

    … The encryption key for packet information is set to the secret information, and the secret information is divided into n shares, and each share is located in the packet header. … The base-station transmits the packets to the target terminal using eigen-mode transmission based on precoding. …

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 113(343), 131-136, 2013-12-12

  • Study of the Hardware Trojan for Embedded Processor  [in Japanese]

    TSUKADA Yasushi , ITAYA Shuhei , KUMAKI Takeshi , 吉川 雅弥 , OGURA Takeshi , FUJINO Takeshi

    … We implemented Trojan AES encryption circuit to custom-mode. … In order to execute disabling encryption, and outflow encryption key within on ARM processor. … Moreover, we confirmed that Trojan AES circuit starts disabling encryption and outflow key when a trigger signal is input. …

    IEICE technical report. Computer systems 113(324), 29-34, 2013-11-27

  • Fundamental Study on a Mechanism of Non-invasive Fault-injection at Arbitrary Timing of Cryptographic Processing  [in Japanese]

    Kobayashi Mizuki , Hayashi Yu-ichi , Homma Naofumi , Mizuki Takaaki , Aoki Takafumi , Sone Hideaki

    … We demonstrate the fault injection attack based on the above IEMI through experiments using an Advanced Encryption Standard (AES) module implemented on a standard evaluation board (SASEBO). …

    IEICE technical report. Microwaves 113(260), 175-179, 2013-10-24

  • Fundamental Study on a Mechanism of Non-invasive Fault-injection at Arbitrary Timing of Cryptographic Processing  [in Japanese]

    Kobayashi Mizuki , Hayashi Yu-ichi , Homma Naofumi , Mizuki Takaaki , Aoki Takafumi , Sone Hideaki

    … We demonstrate the fault injection attack based on the above IEMI through experiments using an Advanced Encryption Standard (AES) module implemented on a standard evaluation board (SASEBO). …

    IEICE technical report. Electromagnetic compatibility 113(259), 175-179, 2013-10-24

  • Fundamental Study on a Mechanism of Non-invasive Fault-injection at Arbitrary Timing of Cryptographic Processing  [in Japanese]

    Kobayashi Mizuki , Hayashi Yu-ichi , Homma Naofumi , Mizuki Takaaki , Aoki Takafumi , Sone Hideaki

    … We demonstrate the fault injection attack based on the above IEMI through experiments using an Advanced Encryption Standard (AES) module implemented on a standard evaluation board (SASEBO). …

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 113(261), 175-179, 2013-10-24

  • Using KCV with CTR Mode and CENC  [in Japanese]

    IKI Kazuma , IWATA Tetsu

    … CTR is a standard encryption mode and CENC is an encryption mode that has higher security than CTR. …

    Technical report of IEICE. ISEC 113(53), 1-8, 2013-05-23

  • Efficient Reliable Multicast for Wi-Fi Networks  [in Japanese]

    KANNHAVONG Bounpadith , YAMAGAKI Norio , OGURA Kazumine , UEDA Hirofumi , FUJITA Norihito

    … At the same time, other nodes who wish to receive the same content, receives the content by overhearing TCP traffic generated from the sender to the target node using promiscuous mode. … We also present a technique to enable overhearing in an environment which employs pair-wise key and group key based encryption mechanism such as WPA. …

    IEICE technical report 112(463), 31-36, 2013-03-07

  • Boomerang Distinguishers on MD4-Based Hash Functions : First Practical Results on Full 5-Pass HAVAL Compression Function

    SASAKI Yu

    … Our approach is based on the previous work by Kim et al., which proposed the boomerang distinguisher on the encryption mode of MD4, MD5, and HAVAL in the related-key setting. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 96(1), 131-140, 2013-01-01

    J-STAGE  References (32)

  • Security of Hash-then-CBC Key Wrapping Revisited

    OSAKI Yasushi , IWATA Tetsu

    … hash function and CBC mode, has provable AKW-security. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences 96(1), 25-34, 2013-01-01

    J-STAGE  References (20)

  • Bitstream Protection in Dynamic Partial Reconfiguration Systems Using Authenticated Encryption

    HORI Yohei , KATASHITA Toshihiro , SAKANE Hirofumi , TODA Kenji , SATOH Akashi

    … In this paper, we present a high-speed and area-efficient bitstream protection scheme for DPR systems using the Advanced Encryption Standard with Galois/Counter Mode (AES-GCM), which is an authenticated encryption algorithm. …

    IEICE Transactions on Information and Systems E96.D(11), 2333-2343, 2013

    J-STAGE 

  • High Throughput Parallelization of AES-CTR Algorithm

    TRAN Nhat-Phuong , LEE Myungho , HONG Sugwon , LEE Seung-Jae

    … Data encryption and decryption are common operations in network-based application programs that must offer security. … In order to keep pace with the high data input rate of network-based applications such as the multimedia data streaming, real-time processing of the data encryption/decryption is crucial. …

    IEICE Transactions on Information and Systems E96.D(8), 1685-1695, 2013

    J-STAGE 

  • Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current

    HAYASHI Yu-ichi , HOMMA Naofumi , MIZUKI Takaaki , SUGAWARA Takeshi , KAYANO Yoshiki , AOKI Takafumi , MINEGISHI Shigeki , SATOH Akashi , SONE Hideaki , INOUE Hiroshi

    … We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. …

    IEICE Transactions on Electronics 95(6), 1089-1097, 2012-06-01

    J-STAGE  References (29)

  • 1 / 4
Page Top