Keyword : hash function


Hash-Based Cache Distribution and Search Schemes in Content-Centric Networking
Yurino SATO Yusuke ITO Hiroyuki KOGA 
Publication:   
Publication Date: 2019/05/01
Vol. E102-D  No. 5 ; pp. 998-1001
Type of Manuscript:  Special Section LETTER (Special Section on the Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
cache distributionhash functionCCNICN
 Summary | Full Text:PDF(336.5KB)

Proposing and Evaluating Clone Detection Approaches with Preprocessing Input Source Files
Eunjong CHOI Norihiro YOSHIDA Yoshiki HIGO Katsuro INOUE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/02/01
Vol. E98-D  No. 2 ; pp. 325-333
Type of Manuscript:  PAPER
Category: Software Engineering
Keyword: 
code clonehash functionsource code transformation
 Summary | Full Text:PDF(723.9KB)

Finite Length Analysis on Listing Failure Probability of Invertible Bloom Lookup Tables
Daichi YUGAWA Tadashi WADAYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/12/01
Vol. E97-A  No. 12 ; pp. 2309-2316
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
data structurehash functionstopping set
 Summary | Full Text:PDF(971.6KB)

Cryptanalysis of Double-Block-Length Hash Modes MDC-4 and MJH
Deukjo HONG Daesung KWON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/08/01
Vol. E97-A  No. 8 ; pp. 1747-1753
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
hash functionhash modecollisionpreimageMDC-4MJH
 Summary | Full Text:PDF(566.1KB)

Multilane Hashing Mode Suitable for Parallel Processing
Hidenori KUWAKADO Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/12/01
Vol. E96-A  No. 12 ; pp. 2434-2442
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
hash functionmode of operationsparallel processingindifferentiability
 Summary | Full Text:PDF(391.8KB)

Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 121-130
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
AEShash functionDavies-MeyerMatyas-Meyer-OseasMiyaguchi-PreneelPGVpreimagemeet-in-the-middleWhirlpool
 Summary | Full Text:PDF(1.1MB)

Security of Hash-then-CBC Key Wrapping Revisited
Yasushi OSAKI Tetsu IWATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 25-34
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
authenticated key wrappinghash functionCBC modesecurity proofdeterministic authenticated encryption
 Summary | Full Text:PDF(307.8KB)

On the Security of an Efficient and Secure Dynamic ID-Based Remote User Authentication Scheme
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6 ; pp. 1684-1686
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
authenticationpasswordcryptanalysishash functionsmartcard
 Summary | Full Text:PDF(120.6KB)

Collision Resistance of Hash Functions in a Weak Ideal Cipher Model
Shoichi HIROSE Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 252-255
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
hash functionprovable securitycollision resistance
 Summary | Full Text:PDF(98.2KB)

Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent
Deukjo HONG Bonwook KOO Dong-Chan KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 372-380
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
ARIACamelliaSerpenthash functionPGVpreimagemeet-in-the-middle
 Summary | Full Text:PDF(781.8KB)

Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11 ; pp. 2167-2170
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
cryptanalysiskey agreementchaotic mapshash functionChebyshev map
 Summary | Full Text:PDF(234.6KB)

The Security of Abreast-DM in the Ideal Cipher Model
Jooyoung LEE Daesung KWON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 104-109
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
hash functionblockciphercollision resistance
 Summary | Full Text:PDF(5.3MB)

Preimage Attack on 23-Step Tiger
Lei WANG Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 110-120
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
Tigerhash functionmeet-in-the-middlepreimage attackindependent chunks
 Summary | Full Text:PDF(5.8MB)

Merkle-Damgård Hash Functions with Split Padding
Kan YASUDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 76-83
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
hash functionMerkle-Damgårdpaddingsecond-preimage resistanceone-wayness
 Summary | Full Text:PDF(415.7KB)

Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
Yu SASAKI Lei WANG Kazuo OHTA Kazumaro AOKI Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 84-92
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
challenge and responseprefixhybridpassword recovery attacklocal collisionhash functionMD4
 Summary | Full Text:PDF(339.7KB)

Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function
Shoichi HIROSE Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10 ; pp. 2447-2453
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
hash functionpseudorandom functionblock cipher
 Summary | Full Text:PDF(205KB)

Leaky Random Oracle
Kazuki YONEYAMA Satoshi MIYAGAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 1795-1807
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
hash functionrandom oracle modelstandard modelprovable securityleakage
 Summary | Full Text:PDF(257.5KB)

A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
Jun YAJIMA Terutoshi IWASAKI Yusuke NAITO Yu SASAKI Takeshi SHIMOYAMA Thomas PEYRIN Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 87-95
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
hash functioncollision searchSHA-1disturbance vector
 Summary | Full Text:PDF(330.1KB)

Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
Yu SASAKI Lei WANG Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 96-104
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
APOPSIPdigest authenticationIV bridgecollision attackhash functionMD5
 Summary | Full Text:PDF(230.4KB)

Compression Functions Suitable for the Multi-Property-Preserving Transform
Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10 ; pp. 2851-2859
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
compression functionhash functionmulti-property preserving
 Summary | Full Text:PDF(195.8KB)

Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
Donghoon CHANG Mridul NANDI Jesang LEE Jaechul SUNG Seokhie HONG Jongin LIM Haeryong PARK Kilsoo CHUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9 ; pp. 2607-2614
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
hash functionrandom oracleideal cipher model
 Summary | Full Text:PDF(320.9KB)

New Message Differences for Collision Attacks on MD4 and MD5
Yu SASAKI Lei WANG Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 55-63
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
collision attackmessage differenceMD4MD5hash function
 Summary | Full Text:PDF(265KB)

Classification of Hash Functions Suitable for Real-Life Systems
Yasumasa HIRAI Takashi KUROKAWA Shin'ichiro MATSUO Hidema TANAKA Akihiro YAMAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 64-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
securityhash function
 Summary | Full Text:PDF(290.5KB)

Improved Collision Search for Hash Functions: New Advanced Message Modification
Yusuke NAITO Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 46-54
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
hash functioncollision attackcollision searchadvanced message modification
 Summary | Full Text:PDF(302.9KB)

Birthday Paradox for Multi-Collisions
Kazuhiro SUZUKI Dongvu TONIEN Kaoru KUROSAWA Koji TOYOTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 39-45
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
hash functionbirthday paradoxmulti-collisioncollision resistant
 Summary | Full Text:PDF(246.8KB)

Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/10/01
Vol. E90-A  No. 10 ; pp. 2301-2308
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyhash functioncompression functionblock cipher
 Summary | Full Text:PDF(223.7KB)

Improved Collision Attacks on MD4 and MD5
Yu SASAKI Yusuke NAITO Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 36-47
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
message modificationcollision attackMD5MD4hash function
 Summary | Full Text:PDF(260.9KB)

Anonymous and Transferable Coins in Pay-Fair Ecommerce
Lih-Chyau WUU Chih-Ming LIN Wen-Fong WANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/12/01
Vol. E89-D  No. 12 ; pp. 2950-2956
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
e-coinhash functiontransferabilityfairness
 Summary | Full Text:PDF(943.3KB)

Complexity of Differential Attacks on SHA-0 with Various Message Schedules
Mitsuhiro HATTORI Shoichi HIROSE Susumu YOSHIDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/12/01
Vol. E88-A  No. 12 ; pp. 3668-3671
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
hash functionSHA-0Chabaud-Joux attackBiham-Chen attack
 Summary | Full Text:PDF(89.8KB)

PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis
Wonil LEE Mridul NANDI Palash SARKAR Donghoon CHANG Sangjin LEE Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 39-48
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
hash functionblock cipherblack-box modelprovable security
 Summary | Full Text:PDF(266KB)

Construction of UOWHF: Two New Parallel Methods
Wonil LEE Donghoon CHANG Sangjin LEE Soohak SUNG Mridul NANDI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 49-58
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
UOWHFhash functionmasking assignmentsequential construcitonparallel constructiontree based construction
 Summary | Full Text:PDF(303.6KB)

Properties of Exponential Hashing
Wenbin LUO Gregory L. HEILEMAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/09/01
Vol. E87-A  No. 9 ; pp. 2408-2411
Type of Manuscript:  Special Section LETTER (Special Section on Nonlinear Theory and its Applications)
Category: 
Keyword: 
chaotic probinghash functiondouble hashingexponential hashing
 Summary | Full Text:PDF(133.8KB)

Stolen-Verifier Attack on an Efficient Smartcard-Based One-Time Password Authentication Scheme
Wei-Chi KU Hao-Chuan TSAI Maw-Jinn TSAUR 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/08/01
Vol. E87-B  No. 8 ; pp. 2374-2376
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
smartcardpasswordauthenticationS/KEYhash function
 Summary | Full Text:PDF(69.6KB)

A One-Time Password Authentication Method for Low Spec Machines and on Internet Protocols
Takasuke TSUJI Akihiro SHIMIZU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/06/01
Vol. E87-B  No. 6 ; pp. 1594-1600
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
cryptographyhash functionpassword authenticationone-time password
 Summary | Full Text:PDF(216.1KB)

A Note on the Strength of Weak Collision Resistance
Shoichi HIROSE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1092-1097
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hash functionweak collision resistancemessage authentication codeNMAC
 Summary | Full Text:PDF(137.7KB)

On Parallel Hash Functions Based on Block-Ciphers
Toshihiko MATSUO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 67-74
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
hash functionblock cipher
 Summary | Full Text:PDF(303KB)

An Impersonation Attack on One-Time Password Authentication Protocol OSPA
Takasuke TSUJI Akihiro SHIMIZU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/07/01
Vol. E86-B  No. 7 ; pp. 2182-2185
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
cryptographyhash functionpassword authenticationone-time password
 Summary | Full Text:PDF(144.3KB)

Message Authentication for Stream
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 190-193
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitymessage authenticationstreamhash function
 Summary | Full Text:PDF(142.2KB)

An Electronic Soccer Lottery System that Uses Bit Commitment
Kunio KOBAYASHI Hikaru MORITA Mitsuari HAKUTA Takanori NAKANOWATARI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/05/25
Vol. E83-D  No. 5 ; pp. 980-987
Type of Manuscript:  Special Section PAPER (Special Issue on Next Generation Internet Technologies and Their Applications)
Category: 
Keyword: 
soccer lotterysecuritybit commitmenthash functiondigital signaturebulletin board
 Summary | Full Text:PDF(594.4KB)

New Algorithm for Finding Preimages in a Reduced Version of the MD4 Compression Function
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1 ; pp. 97-100
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securityhash functionone-way functionMD4
 Summary | Full Text:PDF(507.8KB)

Towards Secure and Fast Hash Functions
Takashi SATOH Mio HAGA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 55-62
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptanalysishash functionblock ciphermeet-in-the-middle attackbirthday attack
 Summary | Full Text:PDF(165.2KB)

Collision Search of a Hash Function by Using Random Mapping
Hikaru MORITA Hideki ODAGI Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 35-40
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
hash functioncollisionpseudo random functionrandom mapping
 Summary | Full Text:PDF(471.5KB)

On Claw Free Families
Wakaha OGATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1 ; pp. 72-80
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
claw freeone-way functionhomomorphic propertydigital signaturehash function
 Summary | Full Text:PDF(556.5KB)