Japan

関連リンク

関連リンク

関連リンク

関連リンク

サイト内の現在位置

データセキュリティ:論文・著書リスト

2019年5月22日

暗号

2018年

  • Takanori Isobe, Kazuhiko Minematsu: Breaking Message Integrity of an End-to-End Encryption Scheme of LINE. ESORICS (2) 2018: 249-268
  • Jooyoung Lee, Atul Luykx, Bart Mennink, Kazuhiko Minematsu: Connecting tweakable and multi-key blockcipher security. Des. Codes Cryptography 86 (3): 623-640 (2018)
  • Kazuhiko Minematsu, Kentarou Sasaki, Yuki Tanaka: Count-then-Permute: A Precision-Free Alternative to Inversion Sampling. CT-RSA 2018: 264-278
  • Haruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana: Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks. IEICE Transactions 101-A(1): 138-148 (2018)

2017年

  • Kazuhiko Minematsu, Tetsu Iwata: Cryptanalysis of PMACx, PMAC2x, and SIVx. IACR Trans. Symmetric Cryptol. 2017 (2): 162-176 (2017)
  • Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi: Blockcipher-Based Authenticated Encryption: How Small Can We Go? CHES 2017: 277-298
  • Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin: ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. CRYPTO (3) 2017: 34-65

2016年

  • Toshinori Araki, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara, "High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority", ACM CCS 2016. (Best Paper Award)
  • Tetsu Iwata, Kazuhiko Minematsu: Stronger Security Variants of GCM-SIV. IACR Trans. Symmetric Cryptol. 2016 (1): 134-157 (2016)
  • Kazuhiko Minematsu: Authenticated Encryption with Small Stretch ( or, How to Accelerate AERO ). ACISP (2) 2016: 347-362
  • Subhadeep Banik, Andrey Bogdanov, Kazuhiko Minematsu: Low-area hardware implementations of CLOC, SILC and AES-OTR. HOST 2016: 71-74
  • Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata: Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. ProvSec 2016: 257-276

2015年

  • Kazuhiko Minematsu: Building blockcipher from small-block tweakable blockcipher. Des. Codes Cryptography 74 (3): 645-663 (2015)
  • Hayato Kobayashi, Kazuhiko Minematsu, Tetsu Iwata: Optimality of Tweak Functions in CLOC. IEICE Transactions 98-A (10): 2152-2164 (2015)
  • Kazuhiko Minematsu: Efficient Message Authentication Codes with Combinatorial Group Testing. ESORICS (1) 2015: 185-202
  • Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata: GCM Security Bounds Reconsidered. FSE 2015: 385-407
  • Kazuhiko Minematsu, Tetsu Iwata: Tweak-Length Extension for Tweakable Blockciphers. IMA Int. Conf. 2015: 77-93
  • Haruna Higo, Toshiyuki Isshiki, Kengo Mori, Satoshi Obana: Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks. SAC 2015: 44-64

2014年

  • Isamu Teranishi, Moti Yung, Tal Malkin: Order-Preserving Encryption Secure Beyond One-Wayness. ASIACRYPT (2) 2014: 42-61
  • Kaoru Kurosawa, Jun Furukawa: 2-Pass Key Exchange Protocols from CPA-Secure KEM. CT-RSA 2014: 385-401
  • Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka, and Eita Kobayashi. SILC: SImple Lightweight CFB. DIAC 2014.
  • Noritaka Yamashita, Kazuhiko Minematsu, Toshihiko Okamura, Yukiyasu Tsunoo: A smaller and faster variant of RSM. DATE 2014: 1-6
  • Kazuhiko Minematsu: Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions. EUROCRYPT 2014: 275-292
  • Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka: CLOC: Authenticated Encryption for Short Input. FSE 2014 (pre-proceedings)
  • Kazuma Ohara, Kazuo Ohta, Koutarou Suzuki, Kazuki Yoneyama: Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum. AFRICACRYPT 2014: 285-299
  • Jun Furukawa: Short Comparable Encryption. CANS 2014: 337-352

2013年

  • Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata: Improved Authenticity Bound of EAX, and Refinements. ProvSec 2013: 184-201
  • Kazuhiko Minematsu: A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. ProvSec 2013: 221-238
  • Shigeo Tsujii, Hiroshi Doi, Ryou Fujita, Masahito Gotaishi, Yukiyasu Tsunoo, Takahiko Syouji: Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems. Financial Cryptography Workshops 2013: 201-212
  • Jun Furukawa: Request-Based Comparable Encryption. ESORICS 2013: 129-146
  • Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka: Factoring-Based Proxy Re-Encryption Schemes. ProvSec 2013: 309-329
  • Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka: Attacks to the Proxy Re-Encryption Schemes from IWSEC2011. IWSEC 2013: 290-302
  • Toshiyuki Isshiki, Toshinori Araki, Kengo Mori, Satoshi Obana, Tetsushi Ohki, Shizuo Sakamoto: New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems. BIOSIG 2013: 171-184
  • Wakaha Ogata, Toshinori Araki: Cheating Detectable Secret Sharing Schemes for Random Bit Strings. IEICE Transactions 96-A (11): 2230-2234 (2013)
  • Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, and Tetsu Iwata. Attacks and Security Proofs of EAX-Prime. Fast Software Encryption (FSE) 2013.
  • Toshiyuki Isshiki, Manh Ha Nguyen, Keisuke Tanaka. Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012. CT-RSA 2013. pp. 277-292.
  • Hongying Liu, Xin Jin, Yukiyasu Tsunoo, and Satoshi Goto. Correlated Noise Reduction for Electromagnetic Analysis. IEICE Transactions 96-A (1): 185-195 (2013)

2012年

  • Isamu Teranishi, Jun Furukawa: Anonymous Credential with Attributes Certification after Registration. IEICE Transactions 95-A (1): 125-137 (2012)
  • Jun Furukawa and Toshiyuki Isshiki. Controlled Joining on Encrypted Relational Database. Paring 2012. pp. 46-64.
  • Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka and Eita Kobayashi. TWINE: A Lightweight Block Cipher for Multiple Platforms. Selected Areas in Cryptography (SAC) 2012.
  • Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu: Breaking and Repairing GCM Security Proofs. CRYPTO 2012. pp. 31-49.
  • Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hirokatsu Nakagawa. Finding Higher Order Differentials of MISTY1. IEICE Transactions 95-A (6): 1049-1055 (2012)
  • Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Hiroshi Yamaguchi, Masahito Gotaishi, Yukiyasu Tsunoo, Takahiko Syouji, and Norihisa Doi. Scheme Overcoming Incompatibility of Privacy and Utilization of Personal Data. International Symposium on Information Theory and its Applications , ISITA 2012. pp. 727-730.

2011年

  • Tal Malkin, Isamu Teranishi, Moti Yung: Key dependent message security: recent results and applications. CODASPY 2011: 3-12
  • Tal Malkin, Isamu Teranishi, Moti Yung: Efficient Circuit-Size Independent Public Key Encryption with KDM Security. EUROCRYPT 2011: 507-526
  • Tal Malkin, Isamu Teranishi, Yevgeniy Vahlis, Moti Yung: Signatures Resilient to Continual Leakage on Memory and Computation. TCC 2011: 89-106
  • Satoshi Obana: Almost Optimum t-Cheater Identifiable Secret Sharing Schemes. EUROCRYPT 2011: 284-302
  • Sumio Morioka, Toshiyuki Isshiki, Satoshi Obana, Yuichi Nakamura, Kazue Sako: Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology. HOST 2011: 57-62
  • Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri: On Maximum Differential Probability of Generalized Feistel. ACISP 2011: 89-105
  • Kazuhiko Minematsu, Tetsu Iwata: Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. IMA Int. Conf. 2011: 391-412
  • Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka and Eita Kobayashi: Twine: A Lightweight, Versatile Blockcipher. ECRYPT Workshop on Lightweight Cryptography (LC11), 2011.

2010年

  • Toshiyuki Isshiki, Koichiro Wada, Keisuke Tanaka: A Rational Secret-Sharing Scheme Based on RSA-OAEP. IEICE Transactions 93-A (1): 42-49 (2010)
  • Frederik Armknecht, Jun Furukawa: On the Minimum Communication Effort for Secure Group Key Exchange. Selected Areas in Cryptography 2010: 320-337
  • Jun Furukawa, Kengo Mori, Kazue Sako: An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization. Towards Trustworthy Elections 2010: 141-154
  • Tomoyasu Suzaki, Kazuhiko Minematsu: Improving the Generalized Feistel. FSE 2010: 19-39
  • Kazuhiko Minematsu: How to Thwart Birthday Attacks against MACs via Small Randomness. FSE 2010: 230-249

2009年

  • Jun Furukawa, Kazue Sako, Satoshi Obana: IC card-based single sign-on system that remains secure under card analysis. Digital Identity Management 2009: 63-72
  • Isamu Teranishi, Jun Furukawa, Kazue Sako: k-Times Anonymous Authentication. IEICE Transactions 92-A (1): 147-165 (2009)
  • Kazuhiko Minematsu: Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. FSE 2009: 308-326
  • Kazuhiko Minematsu, Toshiyasu Matsushima: Generalization and Extension of XEX* Mode. IEICE Transactions 92-A (2): 517-524 (2009)
  • Yukiyasu Tsunoo, Teruo Saito, Hiroki Nakashima, Maki Shigeri: Higher Order Differential Attack on 6-Round MISTY1. IEICE Transactions 92-A (1): 3-10 (2009)
  • Yukiyasu Tsunoo, Hiroki Nakashima, Hiroyasu Kubo, Teruo Saito, Takeshi Kawabata: Results of Linear Cryptanalysis Using Linear Sieve Methods. IEICE Transactions 92-A (5): 1347-1355 (2009)

2008年

  • Akira Numayama, Toshiyuki Isshiki, Keisuke Tanaka: Security of Digital Signature Schemes in Weakened Random Oracle Models. Public Key Cryptography 2008: 268-287
  • Isamu Teranishi, Wakaha Ogata: Relationship between Two Approaches for Defining the Standard Model PA-ness. ACISP 2008: 113-127
  • Isamu Teranishi, Wakaha Ogata: Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. SCN 2008: 109-125
  • Isamu Teranishi, Wakaha Ogata: Relationship between Standard Model Plaintext Awareness and Message Hiding. IEICE Transactions 91-A (1): 244-261 (2008)
  • Isamu Teranishi, Takuro Oyama, Wakaha Ogata: General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. IEICE Transactions 91-A(1): 94-106 (2008)
  • Kaoru Kurosawa, Jun Furukawa: Universally Composable Undeniable Signature. ICALP (2) 2008: 524-535
  • Jun Furukawa, Nuttapong Attrapadung, Ryuichi Sakai, Goichiro Hanaoka: A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low. INDOCRYPT 2008: 116-129
  • Jun Furukawa, Frederik Armknecht, Kaoru Kurosawa: A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. SCN 2008: 392-408
  • Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo: Impossible Differential Cryptanalysis of CLEFIA. FSE 2008: 398-411
  • Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki: Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. ICICS 2008: 128-140
  • Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata: Higher Order Differential Attacks on Reduced-Round MISTY1. ICISC 2008: 415-431
  • Yibo Fan, Jidong Wang, Takeshi Ikenaga, Yukiyasu Tsunoo, Satoshi Goto: An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard. IEICE Transactions 91-A (1): 12-21 (2008)
  • Tsunoo Yukiyasu, Tsujihara Etsuko, Shigeri Maki, Suzaki Tomoyasu, Kawabata Takeshi: Cryptanalysis of CLEFIA using Multiple Impossible Differentials. ISITA 2008:

2007年

  • Toshinori Araki, Satoshi Obana: Flaws in Some Secret Sharing Schemes Against Cheating. ACISP 2007: 122-132
  • Jun Furukawa, Hideki Imai: An Efficient Aggregate Shuffle Argument Scheme. Financial Cryptography 2007: 260-274
  • Jun Furukawa, Nuttapong Attrapadung: Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys. ICALP 2007: 496-508
  • Jun Furukawa, Kazue Sako: An Efficient Publicly Verifiable Mix-Net for Long Inputs. IEICE Transactions 90-A(1): 113-127 (2007)
  • Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: Efficient Identity-Based Encryption with Tight Security Reduction. IEICE Transactions 90-A(9): 1803-1813 (2007)
  • Kazuhiko Minematsu, Toshiyasu Matsushima: New Bounds for PMAC, TMAC, and XCBC. FSE 2007: 434-451
  • Kazuhiko Minematsu, Toshiyasu Matsushima: Tweakable Enciphering Schemes from Hash-Sum-Expansion. INDOCRYPT 2007: 252-267
  • Kazuhiko Minematsu, Toshiyasu Matsushima: Improved MACs from Differentially-Uniform Permutations. IEICE Transactions 90-A(12): 2908-2915 (2007)
  • Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima: Distinguishing Attack Against TPypy. Selected Areas in Cryptography 2007: 396-407
  • Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki: Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher. IEEE Transactions on Information Theory 53(11): 4377-4383 (2007)
  • Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki: A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher. IEEE Transactions on Information Theory 53(9): 3250-3255 (2007)
  • Yibo Fan, Jidong Wang, Takeshi Ikenaga, Yukiyasu Tsunoo, Satoshi Goto: A New Video Encryption Scheme for H.264/AVC. PCM 2007: 246-255

秘密計算

  • T. Araki, A. Barak, J. Furukawa, M. Keller, Y. Lindell, K. Ohara and H. Tsuchida. "Generalizing the SPDZ Compiler For Other Protocols". ACM CCS 2018.
  • Jun Furukawa, Yehuda Lindell, Ariel Nof, Or Weinstein, "High-Throughput Secure Three-Party Computation for Malicious Adversaries and an Honest Majority", EUROCRYPT 2017.
  • Toshinori Araki, Assi Barak, Jun Furukawa, Yehuda Lindell, Ariel Nof, Kazuma Ohara, Adi Watzman, Or Weinstein. "Optimized Honest-Majority MPC for Malicious Adversaries-Breaking the 1 Billion-Gate Per Second Barrier", IEEE S&P 2017.
  • Toshinori Araki, Jun Furukawa, Tamar Lichter, Yehuda Lindell, Ariel Nof, Kazuma Ohara, "High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority", ACM CCS 2016. (Best Paper Award)

ブロックチェーン

  • 中川紗菜美、佐古和恵、小出俊夫、梶ヶ谷圭祐、 "不正転売問題を配慮したブロックチェーンベースのチケット管理システムの提案"、暗号と情報セキュリティシンポジウム(SCIS2018)。
  • 松尾真一郎(ジョージタウン大学教授)、楠正憲(Japan Digital Design)、崎村夏彦(野村総合研究所)、佐古和恵(NEC)、佐藤雅史(セコム株式会社 IS研究所)、林達也(株式会社レピダム)、古川諒(NEC)、宮澤慎一(セコム株式会社 IS研究所)。 ブロックチェーン技術の未解決問題。ISBN:978-4-8222-5842-9
  • 佐藤雅史、長谷川佳祐(セコム株式会社 IS研究所)、佐古和恵、並木悠太、梶ヶ谷圭祐(NEC)、松尾真一郎(ジョージタウン大学教授)
    ブロックチェーン技術の教科書。
    セコム株式会社 IS研究所、NEC(編) ISBN-13: 978-4863542433
    補足: 所属は発行当時の情報を記載

お問い合わせ

Escキーで閉じる 閉じる