Keyword : block cipher


Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher
Takanori ISOBE Kyoji SHIBUTANI 
Publication:   
Publication Date: 2019/01/01
Vol. E102-A  No. 1 ; pp. 17-26
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block cipherEven-Mansour ciphersmeet-in-the-middle attackkey recoverypartial invariable pairmatching with the input-restricted public permutation
 Summary | Full Text:PDF(946.2KB)

Impossible Differential Cryptanalysis of Fantomas and Robin
Xuan SHEN Guoqiang LIU Chao LI Longjiang QU 
Publication:   
Publication Date: 2018/05/01
Vol. E101-A  No. 5 ; pp. 863-866
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
block cipherLS-designsFantomasRobinimpossible differential cryptanalysis
 Summary | Full Text:PDF(302.1KB)

Improvements on Security Evaluation of AES against Differential Bias Attack
Haruhisa KOSUGE Hidema TANAKA 
Publication:   
Publication Date: 2017/11/01
Vol. E100-A  No. 11 ; pp. 2398-2407
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block cipherside-channel attackformal security analysisleakage modelAESdifferential bias attackkey enumerationrank estimation
 Summary | Full Text:PDF(620.4KB)

One-Bit to Four-Bit Dual Conversion for Security Enhancement against Power Analysis
Seungkwang LEE Nam-Su JHO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/10/01
Vol. E99-A  No. 10 ; pp. 1833-1842
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
power analysiscountermeasureblock cipherAES
 Summary | Full Text:PDF(1.7MB)

Round Addition DFA on SPN Block Ciphers
Hideki YOSHIKAWA Masahiro KAMINAGA Arimitsu SHIKODA Toshinori SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/12/01
Vol. E97-A  No. 12 ; pp. 2671-2674
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
differential fault analysis (DFA)round additionblock cipherSPN block cipherAESKLEINLED
 Summary | Full Text:PDF(468KB)

A New Higher Order Differential of CLEFIA
Naoki SHIBAYAMA Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 118-126
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
cryptanalysishigher order differential attackmeet-in-the-middle attack techniqueblock cipherCLEFIA
 Summary | Full Text:PDF(873.2KB)

Round Addition DFA on 80-bit Piccolo and TWINE
Hideki YOSHIKAWA Masahiro KAMINAGA Arimitsu SHIKODA Toshinori SUZUKI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/09/01
Vol. E96-D  No. 9 ; pp. 2031-2035
Type of Manuscript:  Special Section LETTER (Special Section on Dependable Computing)
Category: 
Keyword: 
differential fault analysis (DFA)round additionblock cipherpiccoloTWINE
 Summary | Full Text:PDF(406.1KB)

Round Addition Using Faults for Generalized Feistel Network
Hideki YOSHIKAWA Masahiro KAMINAGA Arimitsu SHIKODA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/01/01
Vol. E96-D  No. 1 ; pp. 146-150
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
differential fault analysis (DFA)round additionblock ciphergeneralized Feistel network (GFN)DESCLEFIARC6
 Summary | Full Text:PDF(556.9KB)

Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function
Dukjae MOON Deukjo HONG Daesung KWON Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/08/01
Vol. E95-A  No. 8 ; pp. 1379-1389
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
preimage attackhash modeFeistel schemeMisty schemeblock cipher
 Summary | Full Text:PDF(1.7MB)

Finding Higher Order Differentials of MISTY1
Yukiyasu TSUNOO Teruo SAITO Takeshi KAWABATA Hirokatsu NAKAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/06/01
Vol. E95-A  No. 6 ; pp. 1049-1055
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block cipherCRYPTREChigher order differential attackMISTY1NESSIE
 Summary | Full Text:PDF(519.3KB)

Some Saturation Characteristics of XOR Sum of Balance Functions
Yasutaka IGARASHI Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 2-7
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
balance functionsaturation characteristicsHadamard transformExtended Hamming codeconvolutionblock cipherCLEFIA
 Summary | Full Text:PDF(480.3KB)

Compact Architecture for ASIC and FPGA Implementation of the KASUMI Block Cipher
Dai YAMAMOTO Kouichi ITOH Jun YAJIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/12/01
Vol. E94-A  No. 12 ; pp. 2628-2638
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: High-Level Synthesis and System-Level Design
Keyword: 
block cipherKASUMIhardwareASICFPGAcompact implementation
 Summary | Full Text:PDF(945.4KB)

Related-Key Boomerang Attack on Block Cipher SQUARE
Bonwook KOO Yongjin YEOM Junghwan SONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 3-9
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
block ciphercryptanalysisrelated-key boomerang attackSQUARE
 Summary | Full Text:PDF(3MB)

New Differential Cryptanalytic Results for Reduced-Round CAST-128
Meiqin WANG Xiaoyun WANG Kam Pui CHOW Lucas Chi Kwong HUI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/12/01
Vol. E93-A  No. 12 ; pp. 2744-2754
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block cipherdifferential cryptanalysisCAST-128weak key
 Summary | Full Text:PDF(474.3KB)

Compact Architecture for ASIC Implementation of the MISTY1 Block Cipher
Dai YAMAMOTO Jun YAJIMA Kouichi ITOH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 3-12
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
block cipherMISTY1hardwareASICcompact implementation
 Summary | Full Text:PDF(599.3KB)

Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
Yukiyasu TSUNOO Teruo SAITO Maki SHIGERI Takeshi KAWABATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 144-152
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
block cipherCRYPTREChigher order differential attackMISTY1NESSIE
 Summary | Full Text:PDF(322.6KB)

Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function
Shoichi HIROSE Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10 ; pp. 2447-2453
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
hash functionpseudorandom functionblock cipher
 Summary | Full Text:PDF(205KB)

Results of Linear Cryptanalysis Using Linear Sieve Methods
Yukiyasu TSUNOO Hiroki NAKASHIMA Hiroyasu KUBO Teruo SAITO Takeshi KAWABATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/05/01
Vol. E92-A  No. 5 ; pp. 1347-1355
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block cipherlinear cryptanalysislinear sieve method
 Summary | Full Text:PDF(355KB)

Higher Order Differential Attack on 6-Round MISTY1
Yukiyasu TSUNOO Teruo SAITO Hiroki NAKASHIMA Maki SHIGERI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 3-10
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
block cipherCRYPTREChigher order differential attackMISTY1NESSIE
 Summary | Full Text:PDF(305.2KB)

Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
Jiqiang LU Jongsung KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9 ; pp. 2588-2596
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block cipherSHACAL-2 differential cryptanalysisrelated-key rectangle attack
 Summary | Full Text:PDF(189.7KB)

Improved MACs from Differentially-Uniform Permutations
Kazuhiko MINEMATSU Toshiyasu MATSUSHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/12/01
Vol. E90-A  No. 12 ; pp. 2908-2915
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
MACblock cipherAESdifferentially-uniform permutation
 Summary | Full Text:PDF(241.7KB)

Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/10/01
Vol. E90-A  No. 10 ; pp. 2301-2308
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyhash functioncompression functionblock cipher
 Summary | Full Text:PDF(223.7KB)

Evaluation of the Security of RC6 against the χ2-Attack
Atsuko MIYAJI Yuuki TAKANO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 22-28
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
block cipherRC6χ2-attacks
 Summary | Full Text:PDF(183.6KB)

Linear Attack Using Multiple Linear Approximations
Jun CHOI Deukjo HONG Seokhie HONG Sangjin LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 2-8
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
block cipherlinear cryptanalysismultiple linear cryptanalsis
 Summary | Full Text:PDF(183.3KB)

PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis
Wonil LEE Mridul NANDI Palash SARKAR Donghoon CHANG Sangjin LEE Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 39-48
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
hash functionblock cipherblack-box modelprovable security
 Summary | Full Text:PDF(266KB)

How to Improve Interpolation Attack
Kaoru KUROSAWA Tetsu IWATA Quang Viet DUONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 9-15
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
block cipherinterpolation attackroot finding algorithmresultant
 Summary | Full Text:PDF(178.6KB)

On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1110-1118
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyf 8f 9modes of operationprovable securityblock cipherpseudorandom permutation
 Summary | Full Text:PDF(211.8KB)

On the Pseudorandomness of KASUMI Type Permutations
Tetsu IWATA Tohru YAGI Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1098-1109
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyblock cipherKASUMIpseudorandomnessprovable security
 Summary | Full Text:PDF(296.6KB)

On Parallel Hash Functions Based on Block-Ciphers
Toshihiko MATSUO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 67-74
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
hash functionblock cipher
 Summary | Full Text:PDF(303KB)

On the Universal Hash Functions in Luby-Rackoff Cipher
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 60-66
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
cryptographyblock cipherFeistel permutationsuper-pseudorandomness
 Summary | Full Text:PDF(254.2KB)

TMAC: Two-Key CBC MAC
Kaoru KUROSAWA Tetsu IWATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 46-53
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
cryptographyCBC MACblock cipherprovable security
 Summary | Full Text:PDF(277.9KB)

Statistical Analysis of χ2-Attacks
Norihisa ISOGAI Atsuko MIYAJI Masao NONAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5 ; pp. 1190-1197
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
block cipherstatistical analysisRC5χ2-attacks
 Summary | Full Text:PDF(250.6KB)

Cryptanalysis of Reduced-Round RC6 without Whitening
Atsuko MIYAJI Masao NONAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 19-30
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block cipherRC6cryptanalysisχ2 attack
 Summary | Full Text:PDF(685.3KB)

Linear Cryptanalysis of Block Cipher Xenon
Toshio TOKITA Mitsuru MATSUI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 13-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block ciphercryptanalysislinear cryptanalysisISOXenon
 Summary | Full Text:PDF(254.9KB)

A Study on Higher Order Differential Attack of Camellia
Takeshi KAWABATA Masaki TAKEDA Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 31-36
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block cipherchosen plaintext attackhigher order differential attackCamellia
 Summary | Full Text:PDF(535.6KB)

On the Security of Nested SPN Cipher against the Differential and Linear Cryptanalysis
Fumihiko SANO Kenji OHKUMA Hideo SHIMIZU Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 37-46
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block cipherSPNcryptanalysis
 Summary | Full Text:PDF(807.4KB)

The 128-Bit Block Cipher Camellia
Kazumaro AOKI Tetsuya ICHIKAWA Masayuki KANDA Mitsuru MATSUI Shiho MORIAI Junko NAKAJIMA Toshio TOKITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 11-24
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block cipherblock cipher designcryptanalysisCamellia
 Summary | Full Text:PDF(706.7KB)

Round Security and Super-Pseudorandomness of MISTY Type Structure
Tetsu IWATA Tomonobu YOSHINO Tomohiro YUASA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 2-10
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyblock cipherround securitysuper-pseudorandomnessMISTY type structure
 Summary | Full Text:PDF(304.5KB)

On a Certain Algebraic Property of Block Ciphers
Hideki SAWADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/05/01
Vol. E84-A  No. 5 ; pp. 1130-1134
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
block ciphermeet-in-the-middle attacktrapdoorsymmetric groupGAP
 Summary | Full Text:PDF(183.3KB)

Differential Cryptanalysis of CAST-256 Reduced to Nine Quad-Rounds
Haruki SEKI Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/04/01
Vol. E84-A  No. 4 ; pp. 913-918
Type of Manuscript:  Special Section PAPER (Special Section on Fundamentals of Information and Communications)
Category: 
Keyword: 
block cipherAESCAST-256differential cryptanalysisweak key
 Summary | Full Text:PDF(394.4KB)

An Efficient Interpolation Attack
Shiho MORIAI Takeshi SHIMOYAMA Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1 ; pp. 39-47
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptanalysisblock cipherinterpolation attackcomputer algebra systemSNAKE
 Summary | Full Text:PDF(512.4KB)

E2--A New 128-Bit Block Cipher
Masayuki KANDA Shiho MORIAI Kazumaro AOKI Hiroki UEDA Youichi TAKASHIMA Kazuo OHTA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1 ; pp. 48-59
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
encryption algorithmblock cipherE2AESdesign strategy
 Summary | Full Text:PDF(1.3MB)

Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
Takeshi SHIMOYAMA Shiho MORIAI Toshinobu KANEKO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/09/25
Vol. E82-A  No. 9 ; pp. 1971-1980
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
block cipherhigher order differential attackKN cipheralgebraic equation
 Summary | Full Text:PDF(596.5KB)

Construct Message Authentication Code with One-Way Hash Functions and Block Ciphers
Yi-Shiung YEH Chan-Chi WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/02/25
Vol. E82-A  No. 2 ; pp. 390-393
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyMACone-way hash functionblock cipher
 Summary | Full Text:PDF(340.7KB)

Fast Software Implementations of MISTY1 on Alpha Processors
Junko NAKAJIMA Mitsuru MATSUI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 107-116
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
software implementationassembly programmingblock cipherDESMISTY1
 Summary | Full Text:PDF(359.3KB)

On a Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis
Mitsuru MATSUI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 117-122
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block cipherdifferential cryptanalysislinear cryptanalysisprovable security
 Summary | Full Text:PDF(198.6KB)

Towards Secure and Fast Hash Functions
Takashi SATOH Mio HAGA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 55-62
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptanalysishash functionblock ciphermeet-in-the-middle attackbirthday attack
 Summary | Full Text:PDF(165.2KB)

On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis
Kouichi SAKURAI Yuliang ZHENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1 ; pp. 19-24
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block ciphercryptographyData Encryption Standarddifferential cryptanalysislinear cryptanalysispseudorandom permutationsecuritysecret-key block cipher
 Summary | Full Text:PDF(580.7KB)

A New Version of FEAL, Stronger against Differential Cryptanalysis*
Routo TERADA Paulo G. PINHEIRO Kenji KOYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 28-34
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyblock cipherdifferential cryptanalysiskey breaking
 Summary | Full Text:PDF(608.6KB)

Differential-Linear Cryptanalysis of FEAL-8
Kazumaro AOKI Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 20-27
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
code breakblock cipherdifferential-linear cryptanalysisFEAL
 Summary | Full Text:PDF(561.5KB)

Optimization of Time-Memory Trade-Off Cryptanalysis and Its Application to DES, FEAL-32, and Skipjuck
Koji KUSUDA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 35-48
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block ciphercryptanalysistime-memory trade-off
 Summary | Full Text:PDF(986.1KB)