Keyword : cryptanalysis


Impossible Differential Attack on Reduced Round SPARX-128/256
Muhammad ELSHEIKH Mohamed TOLBA Amr M. YOUSSEF 
Publication:   
Publication Date: 2018/04/01
Vol. E101-A  No. 4 ; pp. 731-733
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
SPARXblock cipherscryptanalysisimpossible differential attacks
 Summary | Full Text:PDF(412.6KB)

Improved Multiple Impossible Differential Cryptanalysis of Midori128
Mohamed TOLBA Ahmed ABDELKHALEK Amr M. YOUSSEF 
Publication:   
Publication Date: 2017/08/01
Vol. E100-A  No. 8 ; pp. 1733-1737
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptanalysisimpossible differential cryptanalysisblock ciphersMidori128
 Summary | Full Text:PDF(473.7KB)

Related-Key Attacks on Reduced-Round Hierocrypt-L1
Bungo TAGA Shiho MORIAI Kazumaro AOKI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1 ; pp. 126-137
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptanalysisHierocrypt-L1key scheduling differentials with probability 1related-key attacksimpossible differentialsCRYPTREC
 Summary | Full Text:PDF(1.1MB)

General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA
Atsushi TAKAYASU Noboru KUNIHIRO 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1 ; pp. 50-61
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
LLL algorithmCoppersmith's methodthe small inverse problemcryptanalysismulti-prime RSA
 Summary | Full Text:PDF(401.5KB)

A Meet in the Middle Attack on Reduced Round Kiasu-BC
Mohamed TOLBA Ahmed ABDELKHALEK Amr M. YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/10/01
Vol. E99-A  No. 10 ; pp. 1888-1890
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
Kiasu-BCtweakcryptanalysismeet-in-the-middle attacksdifferential enumeration
 Summary | Full Text:PDF(134.9KB)

A Meet-in-the-Middle Attack on Reduced-Round Kalyna-b/2b
Riham ALTAWY Ahmed ABDELKHALEK Amr M. YOUSSEF 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4 ; pp. 1246-1250
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
Kalynacryptanalysismeet-in-the-middle attacksdifferential enumerationDSTU 7624:2014
 Summary | Full Text:PDF(290.5KB)

A Meet in the Middle Attack on Reduced Round Kuznyechik
Riham ALTAWY Amr M. YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/10/01
Vol. E98-A  No. 10 ; pp. 2194-2198
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
Kuznyechikcryptanalysismeet-in-the-middle attacksdifferential enumerationGOST-grasshopper
 Summary | Full Text:PDF(328KB)

Note on Some Recent Cheater Identifiable Secret Sharing Schemes
Rui XU Kirill MOROZOV Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/08/01
Vol. E98-A  No. 8 ; pp. 1814-1819
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
secret sharingcheater identifiable secret sharingcryptanalysisReed-Solomon code
 Summary | Full Text:PDF(880.7KB)

Multiple Impossible Differential Cryptanalysis on Reduced FOX
Xinran LI Fang-Wei FU Xuan GUANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/03/01
Vol. E98-A  No. 3 ; pp. 906-911
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
FOX block ciphercryptanalysismultiple impossible differentialthe early abort technique
 Summary | Full Text:PDF(219.7KB)

Improved Attacks on Multi-Prime RSA with Small Prime Difference
Hui ZHANG Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/07/01
Vol. E97-A  No. 7 ; pp. 1533-1541
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptanalysismulti-prime RSAsmall prime differencelattice reduction
 Summary | Full Text:PDF(820.4KB)

Cryptanalysis of 249-, 250-, ..., 256-Bit Key HyRAL via Equivalent Keys
Yuki ASANO Shingo YANAGIHARA Tetsu IWATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 371-383
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptanalysisblockcipherHyRALequivalent key
 Summary | Full Text:PDF(1.1MB)

A New Higher Order Differential of CLEFIA
Naoki SHIBAYAMA Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 118-126
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
cryptanalysishigher order differential attackmeet-in-the-middle attack techniqueblock cipherCLEFIA
 Summary | Full Text:PDF(873.2KB)

Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6 ; pp. 1687-1689
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
cryptanalysisauthenticationanonymitywireless communicationssecurity
 Summary | Full Text:PDF(61.1KB)

Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
Ying SUN Yong YU Yi MU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6 ; pp. 1690-1693
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
cryptanalysisencryptionhierarchical identity-based cryptography
 Summary | Full Text:PDF(71KB)

On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6 ; pp. 1684-1686
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
authenticationpasswordcryptanalysishash functionsmartcard
 Summary | Full Text:PDF(120.6KB)

Cryptanalysis of a GL(r,Zn)-Based Public Key System
Abdel Alim KAMAL Amr YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/04/01
Vol. E95-A  No. 4 ; pp. 829-831
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
general linear groupcryptanalysispublic key cryptography
 Summary | Full Text:PDF(70.1KB)

Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
Hu XIONG Xiaofeng WANG Fagen LI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 256-258
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
wireless communicationuser authenticationanonymitycryptanalysis
 Summary | Full Text:PDF(63.3KB)

Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11 ; pp. 2167-2170
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
cryptanalysiskey agreementchaotic mapshash functionChebyshev map
 Summary | Full Text:PDF(234.6KB)

Cryptanalysis of a Public Key Encryption Scheme Using Ergodic Matrices
Mohamed RASSLAN Amr YOUSSEF 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2 ; pp. 853-854
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
public key cryptosystemscryptanalysis
 Summary | Full Text:PDF(60.7KB)

Related-Key Boomerang Attack on Block Cipher SQUARE
Bonwook KOO Yongjin YEOM Junghwan SONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 3-9
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
block ciphercryptanalysisrelated-key boomerang attackSQUARE
 Summary | Full Text:PDF(3MB)

Generalized Classes of Weak Keys on RC4 Using Predictive State
Ryoichi TERAMURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 10-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
cryptanalysisstream cipherRC4weak keypredictive state
 Summary | Full Text:PDF(630.7KB)

Off-Line Keyword Guessing Attacks on Searchable Encryption with Keyword-Recoverability
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/07/01
Vol. E93-D  No. 7 ; pp. 1995-1996
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
keyword searchkeyword-recoverabilitycryptanalysiskeyword guessing attacks
 Summary | Full Text:PDF(61.9KB)

An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/04/01
Vol. E93-A  No. 4 ; pp. 850-853
Type of Manuscript:  LETTER
Category: Reliability, Maintainability and Safety Analysis
Keyword: 
cryptographyauthenticationpasswordkey exchangecryptanalysis
 Summary | Full Text:PDF(299.6KB)

Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
Ryoichi TERAMURA Yasuo ASAKURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 164-171
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
cryptanalysisRC4WEPIEEE 802.11wireless LANIP packet
 Summary | Full Text:PDF(832.3KB)

On the Security of a Conditional Proxy Re-Encryption
Xi ZHANG Min-Rong CHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10 ; pp. 2644-2647
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
conditional proxy re-encryptionchosen-ciphertext attackcryptanalysis
 Summary | Full Text:PDF(83.9KB)

Practical Hierarchical Identity Based Encryption Scheme without Random Oracles
Xiaoming HU Shangteng HUANG Xun FAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/06/01
Vol. E92-A  No. 6 ; pp. 1494-1499
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptanalysishierarchical identity-based encryptionconstant size ciphertexttight security reduction
 Summary | Full Text:PDF(112.6KB)

A Chosen-IV Key Recovery Attack on Py and Pypy
Takanori ISOBE Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/01/01
Vol. E92-D  No. 1 ; pp. 32-40
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
cryptanalysisstream cipherPyPypyeSTREAMkey recovery attack
 Summary | Full Text:PDF(374.5KB)

New Weakness in the Key-Scheduling Algorithm of RC4
Toshihiro OHIGASHI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 3-11
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
cryptanalysisstream cipherRC4key scheduling algorithm
 Summary | Full Text:PDF(308.7KB)

Security Analysis of Zhu-Bao's Verifiably Committed Signature
Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/12/01
Vol. E90-A  No. 12 ; pp. 2962-2964
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
fair exchangeverifiably encrypted signaturecryptanalysis
 Summary | Full Text:PDF(63KB)

A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards
Al-Sakib Khan PATHAN Choong Seon HONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/11/01
Vol. E90-D  No. 11 ; pp. 1885-1888
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
authenticationcryptanalysisforgery attacksmart card
 Summary | Full Text:PDF(85.3KB)

Security Analysis of an ID-Based Key Agreement for Peer Group Communication
Duc-Liem VO Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/11/01
Vol. E90-A  No. 11 ; pp. 2624-2625
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
group key agreementcryptanalysispairingsimpersonation attack
 Summary | Full Text:PDF(53.7KB)

Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes
Miodrag J. MIHALJEVI Marc P.C. FOSSORIER Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/06/01
Vol. E90-A  No. 6 ; pp. 1248-1251
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
conditional data access controlbroadcast encryptioncryptographic key managementcryptanalysisbirthday paradox
 Summary | Full Text:PDF(72.7KB)

On the Security of Status Certificate-Based Encryption Scheme
Je Hong PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 303-304
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
public key encryptionstatus certificate-based encryptioncryptanalysiskey substitution
 Summary | Full Text:PDF(61.8KB)

Rogue Public Key Registration Attack and the Importance of 'Proof of Possession' in the PKI Environment
Younho LEE Yongsu PARK Heeyoul KIM Seong-Min HONG Hyunsoo YOON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/08/01
Vol. E89-D  No. 8 ; pp. 2452-2455
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
proxy signaturedigital signaturecryptanalysis
 Summary | Full Text:PDF(81.5KB)

Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator
Pino CABALLERO-GIL Amparo FUSTER-SABATER 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5 ; pp. 1166-1172
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cellular automatacryptanalysisstream ciphershrinking generatoralgorithmsdiscrete mathematics
 Summary | Full Text:PDF(156.9KB)

Cryptanalysis of Tzeng-Tzeng Forward-Secure Signature Schemes
Hong WANG Gang QIU Deng-Guo FENG Guo-Zhen XIAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/03/01
Vol. E89-A  No. 3 ; pp. 822-825
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
threshold cryptographysignaturecryptanalysisforward-securesecure multiparty computation
 Summary | Full Text:PDF(86.7KB)

Cryptanalysis of Improvement of Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks
Chou-Chen YANG Ren-Chiun WANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/11/01
Vol. E88-B  No. 11 ; pp. 4370-4372
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptanalysisguessing attackkey agreementpasswordwireless networks
 Summary | Full Text:PDF(58.9KB)

Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem
Chao-Liang LIU Gwoboa HORNG Hsin-Yu LIU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/05/01
Vol. E88-B  No. 5 ; pp. 2171-2172
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptanalysisuser identificationID-based cryptosystemwireless network
 Summary | Full Text:PDF(52.1KB)

Cryptanalysis of Yeh-Shen-Hwang's One-Time Password Authentication Scheme
Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/04/01
Vol. E88-B  No. 4 ; pp. 1647-1648
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptanalysisone-time passwordS/KEYauthentication scheme
 Summary | Full Text:PDF(54.9KB)

An Improvement of a Deniable Authentication Protocol
Bin-Tsan HSIEH Hung-Min SUN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/10/01
Vol. E87-B  No. 10 ; pp. 3099-3101
Type of Manuscript:  LETTER
Category: Network
Keyword: 
cryptanalysisauthenticationprotocol
 Summary | Full Text:PDF(67.2KB)

Security Analysis of a Threshold Access Control Scheme Based on Smart Cards
Gwoboa HORNG Chao-Liang LIU Yao-Te HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2177-2179
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptanalysisaccess controlthreshold schemeimpersonation attack
 Summary | Full Text:PDF(68KB)

Security of a Remote User Authentication Scheme Using Smart Cards
Her-Tyan YEH Hung-Min SUN Bin-Tsan HSIEH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/01/01
Vol. E87-B  No. 1 ; pp. 192-194
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
password authenticationsmart cardnetwork securityremote logincryptanalysis
 Summary | Full Text:PDF(105KB)

Cryptanalysis and Restriction of an Automatic Signature Scheme in Distributed Systems
Yuh-Min TSENG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/05/01
Vol. E86-B  No. 5 ; pp. 1679-1681
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
cryptographycryptanalysissignaturecomputer viruses
 Summary | Full Text:PDF(116.1KB)

Further Cryptanalysis of a Password Authentication Scheme with Smart Cards
Hung-Min SUN Her-Tyan YEH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/04/01
Vol. E86-B  No. 4 ; pp. 1412-1415
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
password authenticationsmart cardnetwork securityID-based schemecryptanalysis
 Summary | Full Text:PDF(125.5KB)

On the Security of Nested SPN Cipher against the Differential and Linear Cryptanalysis
Fumihiko SANO Kenji OHKUMA Hideo SHIMIZU Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 37-46
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block cipherSPNcryptanalysis
 Summary | Full Text:PDF(807.4KB)

Cryptanalysis of Reduced-Round RC6 without Whitening
Atsuko MIYAJI Masao NONAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 19-30
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block cipherRC6cryptanalysisχ2 attack
 Summary | Full Text:PDF(685.3KB)

Linear Cryptanalysis of Block Cipher Xenon
Toshio TOKITA Mitsuru MATSUI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 13-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block ciphercryptanalysislinear cryptanalysisISOXenon
 Summary | Full Text:PDF(254.9KB)

Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network
Narn-Yih LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/02/01
Vol. E85-D  No. 2 ; pp. 386-391
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
cryptographycryptanalysisaccess controluser authentication
 Summary | Full Text:PDF(204.5KB)

Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher
Miodrag J. MIHALJEVIC Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 66-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
stream cipherkeystream generatorslinear feedback shift registersnonlinear filtercryptanalysis
 Summary | Full Text:PDF(280.4KB)

The 128-Bit Block Cipher Camellia
Kazumaro AOKI Tetsuya ICHIKAWA Masayuki KANDA Mitsuru MATSUI Shiho MORIAI Junko NAKAJIMA Toshio TOKITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 11-24
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block cipherblock cipher designcryptanalysisCamellia
 Summary | Full Text:PDF(706.7KB)

Equivalent Keys in RC6-32/20/176
Hiroshi MIZUNO Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/10/01
Vol. E84-A  No. 10 ; pp. 2474-2481
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
cryptanalysisRC6key scheduleequivalent keyDavies-Meyer hash function
 Summary | Full Text:PDF(297.1KB)

On Decoding Techniques for Cryptanalysis of Certain Encryption Algorithms
Miodrag J. MIHALJEVIC Marc P. C. FOSSORIER Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/04/01
Vol. E84-A  No. 4 ; pp. 919-930
Type of Manuscript:  Special Section PAPER (Special Section on Fundamentals of Information and Communications)
Category: 
Keyword: 
decodingcryptanalysiskeystream generatorsfast correlation attack
 Summary | Full Text:PDF(309.6KB)

The Automated Cryptanalysis of DFT-Based Speech Scramblers
Wen-Whei CHANG Heng-Iang HSU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/12/25
Vol. E83-D  No. 12 ; pp. 2107-2112
Type of Manuscript:  PAPER
Category: Speech and Hearing
Keyword: 
cryptanalysisspeech scramblerassignment problemgenetic algorithm
 Summary | Full Text:PDF(329.9KB)

An Efficient Interpolation Attack
Shiho MORIAI Takeshi SHIMOYAMA Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1 ; pp. 39-47
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptanalysisblock cipherinterpolation attackcomputer algebra systemSNAKE
 Summary | Full Text:PDF(512.4KB)

Towards Secure and Fast Hash Functions
Takashi SATOH Mio HAGA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 55-62
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptanalysishash functionblock ciphermeet-in-the-middle attackbirthday attack
 Summary | Full Text:PDF(165.2KB)

On the Number of Messages Which Cannot be Concealed in LUC
Wen-Chung KUO Chi-Sung LAIH Min Jea GAU Chin Chen CHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11 ; pp. 2218-2224
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
LUCRSAcryptosystemscryptanalysis
 Summary | Full Text:PDF(562.3KB)

On Construction of Signature Scheme over a Certain Non-Commutative Ring
Takakazu SATOH Kiyomichi ARAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1 ; pp. 40-45
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
OSS digital signatureintegral quaternionnon-commutativitycryptanalysis
 Summary | Full Text:PDF(512.3KB)

On Ambiguity in Coppersmith' Attacking Method a against NIKS-TAS Scheme
Shigeo TSUJII Kiyomichi ARAKI Masao KASAHARA Eiji OKAMOTO Ryuichi SAKAI Yasuo MAEDA Tomohiko YAGISAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 66-75
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
modulo degeneracycryptanalysisID-based key sharingNIKS-TAS
 Summary | Full Text:PDF(762.2KB)

Optimization of Time-Memory Trade-Off Cryptanalysis and Its Application to DES, FEAL-32, and Skipjuck
Koji KUSUDA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 35-48
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block ciphercryptanalysistime-memory trade-off
 Summary | Full Text:PDF(986.1KB)

On Applicability of Linear Cryptanalysis to DES-like Cryptosystems--LOKI89, LOKI91 and s2 DES--
Toshio TOKITA Tohru SORIMACHI Mitsuru MATSUI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/09/25
Vol. E78-A  No. 9 ; pp. 1148-1153
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
cryptanalysislinear cryptanalysisdifferential cryptanalysisDES-like cryptosystem
 Summary | Full Text:PDF(489.6KB)

How to Strengthen DES-like Cryptosystems against Differential Cryptanalysis
Kenji KOYAMA Routo TERADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 63-69
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
DEScryptanalysisdifferential attackprobabilistic swapping
 Summary | Full Text:PDF(562.8KB)