Search Results 1-20 of 606

  • Decentralized Attribute-Based Encryption and Signatures

    OKAMOTO Tatsuaki , TAKASHIMA Katsuyuki

    … <p>This paper presents decentralized multi-authority attribute-based encryption and signature (DMA-ABE and DMA-ABS) schemes, in which no central authority exists and no global coordination is required except for the setting of a parameter for a prime order bilinear group and a hash function, which can be available from public documents, e.g., ISO and FIPS official documents. …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E103.A(1), 41-73, 2020

    J-STAGE 

  • Cayley Hash Function-Map Based on LPS-Type Ramanujan Graphs

    Hyungrok Jo , Noboru Kunihiro , Yoshinori Yamasaki

    コンピュータセキュリティシンポジウム2019論文集 (2019), 1236-1241, 2019-10-14

    IPSJ 

  • Robustness Evaluation on Deep Learning in Steganography  [in Japanese]

    繁田 大輝 , 森田 光

    コンピュータセキュリティシンポジウム2019論文集 (2019), 349-353, 2019-10-14

    IPSJ 

  • String commitment scheme with low output locality

    Miyaji Hideaki , Kawachi Akinori , Miyaji Atsuko

    … In this paper, we construct a commitment scheme having low output locality from a modified lattice-based hash function for the first time. … We also prove that our scheme satisfies the binding property by using the collision resistance of the lattice-based hash functions and the hiding property by using a modified version of the leftover hash lemma, respectively. …

    2019 14th Asia Joint Conference on Information Security (AsiaJCIS), 32-39, 2019-08

    IR 

  • History-Free Sequential Aggregate MAC without Pseudorandom Permutation (ワイドバンドシステム)

    廣瀬 勝一 , 四方 順司

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 118(479), 155-162, 2019-03-07

  • History-Free Sequential Aggregate MAC without Pseudorandom Permutation (情報セキュリティ)

    廣瀬 勝一 , 四方 順司

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 118(478), 155-162, 2019-03-07

  • History-Free Sequential Aggregate MAC without Pseudorandom Permutation (情報理論)

    廣瀬 勝一 , 四方 順司

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 118(477), 155-162, 2019-03-07

  • On the Performance Analysis of SPHINCS<sup>+</sup> Verification

    KANG Tae Gu , LEE Jinwoo , KIM Junyeng , YUM Dae Hyun

    … <p>SPHINCS<sup>+</sup>, an updated version of SPHINCS, is a post-quantum hash-based signature scheme submitted to the NIST post-quantum cryptography standardization project. … gives the theoretical number of function calls and the actual runtime of a reference implementation. … We show that the theoretical number of function calls for SPHINCS<sup>+</sup> …

    IEICE Transactions on Information and Systems E102.D(12), 2603-2606, 2019

    J-STAGE 

  • Implementation of high speed hash function Keccak on GPU

    Dat Thuong Nguyen , Iwai Keisuke , Matsubara Takashi , Kurokawa Takakazu

    … Nowadays, a hash function is used for password management. … The hash function is desired to possess the following three characteristics: Pre-Image Resistance, Second Pre-Image Resistance, and Collision Resistance. … They are set on the assumption that it is computationally difficult to find the original message from a given hash value. …

    International Journal of Networking and Computing 9(2), 370-389, 2019

    J-STAGE 

  • Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages

    Kodera Yuta , Kuribayashi Minoru , Kusaka Takuya , Nogami Yasuyuki

    IoT technologies and cloud storages have been developed remarkably, and many types of data including private information have been gradually outsourced. For such a situation, new convenient functional …

    International Journal of Networking and Computing 9(2), 171-187, 2019

    J-STAGE 

  • Hash-Based Cache Distribution and Search Schemes in Content-Centric Networking

    SATO Yurino , ITO Yusuke , KOGA Hiroyuki

    … Therefore, we propose hash-based cache distribution and search schemes to obtain various contents from nearby nodes and evaluate the effectiveness of this approach through simulation.</p> …

    IEICE Transactions on Information and Systems E102.D(5), 998-1001, 2019

    J-STAGE 

  • Optimization of Intelligent Data Mining Technology in Big Data Environment

    Wang Wei

    … Secondly, in order to effectively improve the scanning speed of data items, an optimized association data mining technology based on hash technology and optimized transaction compression technology is proposed. …

    Journal of Advanced Computational Intelligence and Intelligent Informatics 23(1), 129-133, 2019

    J-STAGE 

  • An adaptive hash-based search for integer motion estimation in SCC

    Choi Youngkyu , Lee Hyuk-Jae , Chae Soo-Ik

    … <p>As a new approach to finding integer motion vectors in SCC, hash-based searches have been proposed recently. … In the paper we propose an improved search algorithm for integer motion estimation (IME) that employs hash-based search only for 8 × 8 coding units (CUs) and bottom-up search for larger CUs. … Furthermore, it updates the hash function and hash table for each CTU to improve coding efficiency and reduce search complexity. …

    IEICE Electronics Express 16(1), 20181019-20181019, 2019

    J-STAGE 

  • Improving MDC-4 to Be More Secure

    HONG Deukjo , KIM Dong-Chan , KWON Daesung

    … <p>MDC-4 is the enhanced version of MDC-2, which is a well-known hash mode of block ciphers. … However, it does not guarantee sufficient securities required for a cryptographic hash function. … In the ideal cipher model, the MDC-4 compression function has the collision security bound close to 2<sup>5<i>n</i>/8</sup> … We also discuss its efficiency by comparing existing hash modes.</p> …

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E102.A(1), 278-289, 2019

    J-STAGE 

  • Code-Based Signature Scheme without Trapdoors (ハードウェアセキュリティ)

    SARATHI ROY Partha , MOROZOV Kirill , FUKUSHIMA Kazuhide , KIYOMOTO Shinsaku , TAKAGI Tsuyoshi

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 118(153), 17-22, 2018-07-25

  • Code-Based Signature Scheme without Trapdoors (技術と社会・倫理)

    SARATHI ROY Partha , MOROZOV Kirill , FUKUSHIMA Kazuhide , KIYOMOTO Shinsaku , TAKAGI Tsuyoshi

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 118(152), 17-22, 2018-07-25

  • Code-Based Signature Scheme without Trapdoors (情報セキュリティ)

    SARATHI ROY Partha , MOROZOV Kirill , FUKUSHIMA Kazuhide , KIYOMOTO Shinsaku , TAKAGI Tsuyoshi

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報 118(151), 17-22, 2018-07-25

  • LPS-type Ramanujan graphs

    Hyungrok Jo , Yoshinori Yamasaki

    IEICE Proceeding Series (55), 399-403, 2018

    DOI 

  • Basic Experiments on Measurement and Control of Position of Moving Robot with Encoders  [in Japanese]

    SUZUKI Shinichi , BOLD Enkh-Amgaran , BATSAIKHAN Bilguun , JARGALSAIKHAN Batzaya , BAYASAIKHAN Yandagkhuu , BATSAIKHAN Hash-Erdene , JAVKHL Gantushig , AVIRMED Otgonbayar

    … Two rotary encoders are used to measure the position of the robot as a function of time. …

    The Proceedings of the Materials and Mechanics Conference 2018(0), OS0512, 2018

    J-STAGE 

  • Hardware-assisted integrity monitor based on lightweight hash function

    Du Pei , Wang Xiang , Wang Weike , Li Lin , Xia Tongsheng , Li Hongge

    … A hardware-assisted monitoring architecture based on lightweight hash function is proposed to detect run-time program integrity on the embedded processor. … The fine-grained property information is extracted as the integrity verification object, and hashed by lightweight hash function as the monitoring model. …

    IEICE Electronics Express 15(10), 20180107-20180107, 2018

    J-STAGE 

Page Top