Hidenori KUWAKADO


A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256
Jiageng CHEN Shoichi HIROSE Hidenori KUWAKADO Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 14-21
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
double-block-length compression functionfree-start collision attackrebound attackAES-256
 Summary | Full Text:PDF(1.3MB)

Multilane Hashing Mode Suitable for Parallel Processing
Hidenori KUWAKADO Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/12/01
Vol. E96-A  No. 12  pp. 2434-2442
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
hash functionmode of operationsparallel processingindifferentiability
 Summary | Full Text:PDF(391.8KB)

Secure Regenerating Codes Based on Rashmi-Shah-Kumar MBR Codes
Masazumi KURIHARA Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/02/01
Vol. E96-A  No. 2  pp. 635-648
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
secret sharingsecure regenerating codedistributed storage
 Summary | Full Text:PDF(356.9KB)

Collision Resistance of Hash Functions in a Weak Ideal Cipher Model
Shoichi HIROSE Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 252-255
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
hash functionprovable securitycollision resistance
 Summary | Full Text:PDF(98.2KB)

An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW
Shoichi HIROSE Kota IDEGUCHI Hidenori KUWAKADO Toru OWADA Bart PRENEEL Hirotaka YOSHIDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 89-99
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
hash functionslightweight cryptographysecurity reduction proofs
 Summary | Full Text:PDF(649.5KB)

Generalized Classes of Weak Keys on RC4 Using Predictive State
Ryoichi TERAMURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 10-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
cryptanalysisstream cipherRC4weak keypredictive state
 Summary | Full Text:PDF(630.7KB)

Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
Ryoichi TERAMURA Yasuo ASAKURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 164-171
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
cryptanalysisRC4WEPIEEE 802.11wireless LANIP packet
 Summary | Full Text:PDF(832.3KB)

Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function
Shoichi HIROSE Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10  pp. 2447-2453
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
hash functionpseudorandom functionblock cipher
 Summary | Full Text:PDF(205KB)

A Chosen-IV Key Recovery Attack on Py and Pypy
Takanori ISOBE Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/01/01
Vol. E92-D  No. 1  pp. 32-40
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
cryptanalysisstream cipherPyPypyeSTREAMkey recovery attack
 Summary | Full Text:PDF(374.5KB)

Compression Functions Suitable for the Multi-Property-Preserving Transform
Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 2851-2859
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
compression functionhash functionmulti-property preserving
 Summary | Full Text:PDF(195.8KB)

Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/10/01
Vol. E90-A  No. 10  pp. 2301-2308
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyhash functioncompression functionblock cipher
 Summary | Full Text:PDF(223.7KB)

Size-Reduced Visual Secret Sharing Scheme
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1193-1197
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
visual secret sharing schemepolynomial representationsize reductioncolumn deletion
 Summary | Full Text:PDF(97.9KB)

Efficient Relative Time-Stamping Scheme Based on the Ternary Link
Yuichi IGARASHI Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10  pp. 2552-2559
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
relative time-stamping schemeverification pathternary link
 Summary | Full Text:PDF(415.6KB)

Transitive Signature Scheme for Directed Trees
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1120-1126
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
transitive signaturefail-stop signaturetreegraph
 Summary | Full Text:PDF(220.9KB)

Polynomial Representation of a Visual Secret Sharing Scheme and Its Application
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/06/01
Vol. E85-A  No. 6  pp. 1379-1386
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
information securityvisual secret sharingpolynomial representation
 Summary | Full Text:PDF(214.1KB)

All-or-Nothing Transform Based on a Linear Code
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/05/01
Vol. E85-A  No. 5  pp. 1084-1087
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyinformation securityall-or-nothing transformencryption modelinear code
 Summary | Full Text:PDF(134.7KB)

Message Authentication for Stream
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 190-193
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitymessage authenticationstreamhash function
 Summary | Full Text:PDF(142.2KB)

Equivalent Keys in RC6-32/20/176
Hiroshi MIZUNO Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/10/01
Vol. E84-A  No. 10  pp. 2474-2481
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
cryptanalysisRC6key scheduleequivalent keyDavies-Meyer hash function
 Summary | Full Text:PDF(297.1KB)

Improvement on the Cheater Identifiable Threshold Scheme
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/04/01
Vol. E84-A  No. 4  pp. 957-960
Type of Manuscript:  Special Section LETTER (Special Section on Fundamentals of Information and Communications)
Category: 
Keyword: 
information securitysecret sharingauthentication codeerasure decodingcheater
 Summary | Full Text:PDF(142.5KB)

New Algorithm for Finding Preimages in a Reduced Version of the MD4 Compression Function
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 97-100
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securityhash functionone-way functionMD4
 Summary | Full Text:PDF(507.8KB)

Image Size Invariant Visual Cryptography
Ryo ITO Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/10/25
Vol. E82-A  No. 10  pp. 2172-2177
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
secret sharingvisual secret sharingvisual cryptography
 Summary | Full Text:PDF(466KB)

New Subliminal Channel Embedded in the ESIGN
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/10/25
Vol. E82-A  No. 10  pp. 2167-2171
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
cryptographydigital signaturesubliminal channelESIGN
 Summary | Full Text:PDF(424.2KB)

On the Security of the ElGamal-Type Signature Scheme with Small Parameters
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 93-97
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
digital signaturecontinued fractionElGamal signatureDSA
 Summary | Full Text:PDF(168.2KB)

On the Security of the Improved Knapsack Cryptosystem
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10  pp. 2184-2185
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Coded Modulation/Security
Keyword: 
public-key cryptosystemknapsack problemchoice of encryption keyscontinued fractionLLL algorithm
 Summary | Full Text:PDF(153.4KB)

Improved Elliptic Curve Methods for Factoring and Their Performance
Hidenori KUWAKADO Kenji KOYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 25-33
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
factorizationelliptic curvebirthday paradox
 Summary | Full Text:PDF(589.8KB)

A New RSA-Type Scheme Based on Singular Cubic Curves (y-αx)(y-βx)x3(mod n)
Hidenori KUWAKADO Kenji KOYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 49-53
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public-key cryptosystemthe RSA schemecubic curves
 Summary | Full Text:PDF(382.5KB)

A New RSA-Type Scheme Based on Singular Cubic Curves y2x3+bx2 (mod n)
Hidenori KUWAKADO Kenji KOYAMA Yukio TSURUOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1  pp. 27-33
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyRSA cryptosystemcubic curve
 Summary | Full Text:PDF(576.1KB)

Efficient Cryptosystems over Elliptic Curves Based on a Product of Form-Free Primes
Hidenori KUWAKADO Kenji KOYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8  pp. 1309-1318
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
cryptographypublic-keyelliptic curvesfactorization
 Summary | Full Text:PDF(830.8KB)