Shoichi HIROSE


A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications
Shoichi HIROSE Hidenori KUWAKADO Hirotaka YOSHIDA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1  pp. 110-118
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
compression functionMACprovable securitypseudorandom functionvector-input PRF
 Summary | Full Text:PDF(959.2KB)

A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256
Jiageng CHEN Shoichi HIROSE Hidenori KUWAKADO Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 14-21
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
double-block-length compression functionfree-start collision attackrebound attackAES-256
 Summary | Full Text:PDF(1.3MB)

Multilane Hashing Mode Suitable for Parallel Processing
Hidenori KUWAKADO Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/12/01
Vol. E96-A  No. 12  pp. 2434-2442
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
hash functionmode of operationsparallel processingindifferentiability
 Summary | Full Text:PDF(391.8KB)

Collision Resistance of Hash Functions in a Weak Ideal Cipher Model
Shoichi HIROSE Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 252-255
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
hash functionprovable securitycollision resistance
 Summary | Full Text:PDF(98.2KB)

An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW
Shoichi HIROSE Kota IDEGUCHI Hidenori KUWAKADO Toru OWADA Bart PRENEEL Hirotaka YOSHIDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 89-99
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
hash functionslightweight cryptographysecurity reduction proofs
 Summary | Full Text:PDF(649.5KB)

A Note on Practical Key Derivation Functions
Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/08/01
Vol. E94-A  No. 8  pp. 1764-1767
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
key derivationpseudorandom functioncounter modeoutput feedback mode
 Summary | Full Text:PDF(359.1KB)

Sequential Bitwise Sanitizable Signature Schemes
Goichiro HANAOKA Shoichi HIROSE Atsuko MIYAJI Kunihiko MIYAZAKI Bagus SANTOSO Peng YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 392-404
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
sanitizable signaturebitwise controlone-way permutationpseudorandom generator
 Summary | Full Text:PDF(645.5KB)

Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function
Shoichi HIROSE Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10  pp. 2447-2453
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
hash functionpseudorandom functionblock cipher
 Summary | Full Text:PDF(205KB)

Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack
Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 74-82
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
double-block-length hash functionrandom oracle modelideal cipher modelcollision resistancefree-start collision attack
 Summary | Full Text:PDF(186.5KB)

A Security Analysis of Double-Block-Length Hash Functions with the Rate 1
Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10  pp. 2575-2582
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
cryptographic hash functiondouble-block-length hash functioncompression function
 Summary | Full Text:PDF(162.5KB)

Complexity of Differential Attacks on SHA-0 with Various Message Schedules
Mitsuhiro HATTORI Shoichi HIROSE Susumu YOSHIDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/12/01
Vol. E88-A  No. 12  pp. 3668-3671
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
hash functionSHA-0Chabaud-Joux attackBiham-Chen attack
 Summary | Full Text:PDF(89.8KB)

Cancellation Moderating Factor Control for DS-CDMA Non-linear Interference Canceller with Antenna Diversity Reception
Kazuto YANO Shoichi HIROSE Susumu YOSHIDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/07/01
Vol. E88-A  No. 7  pp. 1921-1930
Type of Manuscript:  Special Section PAPER (Special Section on Multi-dimensional Mobile Information Networks)
Category: Wireless Communication Technology
Keyword: 
variable spreading factor DS-CDMAmultistage MAI cancellercancellation moderating factorantenna diversityinterference suppression
 Summary | Full Text:PDF(1.4MB)

Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability
Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 33-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
cryptographic hash functioncollision resistanceweak collision resistancesecond-preimage resistanceweak second-preimage resistance
 Summary | Full Text:PDF(151KB)

A Note on the Strength of Weak Collision Resistance
Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1092-1097
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hash functionweak collision resistancemessage authentication codeNMAC
 Summary | Full Text:PDF(137.7KB)

An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt
Shoichi HIROSE Susumu YOSHIDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 280-281
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
oblivious transferapproximation
 Summary | Full Text:PDF(114.9KB)

Multistage Interference Canceller Combined with Adaptive Array Antenna for DS-CDMA System
Kazuto YANO Shoichi HIROSE Susumu YOSHIDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/07/01
Vol. E86-A  No. 7  pp. 1603-1610
Type of Manuscript:  Special Section PAPER (Special Section on Multi-dimensional Mobile Information Networks)
Category: 
Keyword: 
DS-CDMAadaptive array antennamultistage MAI cancellerinterference suppression
 Summary | Full Text:PDF(1.1MB)