Shinsaku KIYOMOTO


Comparison of Access Pattern Protection Schemes and Proposals for Efficient Implementation
Yuto NAKANO Shinsaku KIYOMOTO Yutaka MIYAKE Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/10/01
Vol. E97-D  No. 10  pp. 2576-2585
Type of Manuscript:  INVITED PAPER (Special Section on Frontiers of Internet of Things)
Category: 
Keyword: 
access pattern protectionoblivious RAMprivate information retrieval
 Summary | Full Text:PDF(441.5KB)

Fast Implementation of KCipher-2 for Software and Hardware
Yuto NAKANO Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Tsukasa ISHIGURO Yutaka MIYAKE Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/01/01
Vol. E97-D  No. 1  pp. 43-52
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
stream cipherKCipher-2software implementationhardware implementation
 Summary | Full Text:PDF(641.2KB)

Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
Takafumi HIBIKI Naofumi HOMMA Yuto NAKANO Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Yutaka MIYAKE Takafumi AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 157-166
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
side-channel attacksKCipher-2correlation power analysisrandom masking
 Summary | Full Text:PDF(6.7MB)

Software Protection Combined with Tamper-Proof Device
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Yutaka MIYAKE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 213-222
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Software Protection
Keyword: 
software protectioncopy protectiontamper-proof devicequantitative security analysis
 Summary | Full Text:PDF(615.6KB)

Improved Subset Difference Method with Ternary Tree
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 2034-2044
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
broadcast encryptionsubset difference methodternary tree
 Summary | Full Text:PDF(806.8KB)

A Fast (k,L,n)-Threshold Ramp Secret Sharing Scheme
Jun KURIHARA Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8  pp. 1808-1821
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
secret sharing schemethreshold schemethreshold ramp schemeexclusive-orrandom number
 Summary | Full Text:PDF(396.6KB)

Design of Anonymous Attribute Authentication Mechanism
Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/04/01
Vol. E92-B  No. 4  pp. 1112-1118
Type of Manuscript:  Special Section PAPER (Special Section on Internet Technology and its Architecture for Ambient Information Systems)
Category: 
Keyword: 
anonymous authenticationattribute authenticationself-blindable certificateuntraceability
 Summary | Full Text:PDF(365.9KB)

On a Fast (k,n)-Threshold Secret Sharing Scheme
Jun KURIHARA Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9  pp. 2365-2378
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
secret sharing schemethreshold schemeexclusive-orentropyrandom numberideal secret sharing scheme
 Summary | Full Text:PDF(396.3KB)

Efficient Implementation of the Pairing on Mobilephones Using BREW
Motoi YOSHITOMI Tsuyoshi TAKAGI Shinsaku KIYOMOTO Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1330-1337
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation
Keyword: 
pairing based cryptosystemmobilephoneBREWefficient implementation
 Summary | Full Text:PDF(272.9KB)

A Fast (3,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations
Jun KURIHARA Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 127-138
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
secret sharing schemesxorentropyrandom numberideal secret sharing schemes
 Summary | Full Text:PDF(367.5KB)

Analysis of Program Obfuscation Schemes with Variable Encoding Technique
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 316-329
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
program obfuscationvariable encoding techniqueanalysis
 Summary | Full Text:PDF(377.1KB)

On Effectiveness of Clock Control in Stream Ciphers
Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1780-1787
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
stream cipherclock controlirregular clocking
 Summary | Full Text:PDF(262.7KB)

Universally Composable Hierarchical Hybrid Authenticated Key Exchange
Haruki OTA Kazuki YONEYAMA Shinsaku KIYOMOTO Toshiaki TANAKA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 139-151
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
passwordDiffie-Hellmanauthenticated key exchangeuniversal composabilityhierarchical hybrid constructionMAC (Message Authentication Code)
 Summary | Full Text:PDF(334.6KB)

Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques
Shinsaku KIYOMOTO Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 222-226
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Information Hiding
Keyword: 
code obfuscationJava codeevaluation
 Summary | Full Text:PDF(655.3KB)

Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers
Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/10/01
Vol. E88-A  No. 10  pp. 2778-2791
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
stream cipherGuess-and-Determine attackAA5clock control
 Summary | Full Text:PDF(714.2KB)

Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification
Haruki OTA Shinsaku KIYOMOTO Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 287-295
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Biometrics
Keyword: 
iris scanning verificationiris codetransformation functionhidingexhaustive search attack
 Summary | Full Text:PDF(305.8KB)

New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients
Akira YAMADA Shinsaku KIYOMOTO Toshiaki TANAKA Koji NAKAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 182-189
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Applications
Keyword: 
time-stamplinking schemeforward or backward dating attackpseudonymousmutual communication
 Summary | Full Text:PDF(520KB)