Kazuhide FUKUSHIMA


Fast Implementation of KCipher-2 for Software and Hardware
Yuto NAKANO Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Tsukasa ISHIGURO Yutaka MIYAKE Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/01/01
Vol. E97-D  No. 1  pp. 43-52
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
stream cipherKCipher-2software implementationhardware implementation
 Summary | Full Text:PDF

Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
Takafumi HIBIKI Naofumi HOMMA Yuto NAKANO Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Yutaka MIYAKE Takafumi AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 157-166
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
side-channel attacksKCipher-2correlation power analysisrandom masking
 Summary | Full Text:PDF

Software Protection Combined with Tamper-Proof Device
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Yutaka MIYAKE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 213-222
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Software Protection
Keyword: 
software protectioncopy protectiontamper-proof devicequantitative security analysis
 Summary | Full Text:PDF

Improved Subset Difference Method with Ternary Tree
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 2034-2044
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
broadcast encryptionsubset difference methodternary tree
 Summary | Full Text:PDF

A Fast (k,L,n)-Threshold Ramp Secret Sharing Scheme
Jun KURIHARA Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8  pp. 1808-1821
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
secret sharing schemethreshold schemethreshold ramp schemeexclusive-orrandom number
 Summary | Full Text:PDF

Design of Anonymous Attribute Authentication Mechanism
Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/04/01
Vol. E92-B  No. 4  pp. 1112-1118
Type of Manuscript:  Special Section PAPER (Special Section on Internet Technology and its Architecture for Ambient Information Systems)
Category: 
Keyword: 
anonymous authenticationattribute authenticationself-blindable certificateuntraceability
 Summary | Full Text:PDF

On a Fast (k,n)-Threshold Secret Sharing Scheme
Jun KURIHARA Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9  pp. 2365-2378
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
secret sharing schemethreshold schemeexclusive-orentropyrandom numberideal secret sharing scheme
 Summary | Full Text:PDF

Analysis of Program Obfuscation Schemes with Variable Encoding Technique
Kazuhide FUKUSHIMA Shinsaku KIYOMOTO Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 316-329
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
program obfuscationvariable encoding techniqueanalysis
 Summary | Full Text:PDF

A Fast (3,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations
Jun KURIHARA Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 127-138
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
secret sharing schemesxorentropyrandom numberideal secret sharing schemes
 Summary | Full Text:PDF

On Effectiveness of Clock Control in Stream Ciphers
Shinsaku KIYOMOTO Kazuhide FUKUSHIMA Toshiaki TANAKA Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1780-1787
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
stream cipherclock controlirregular clocking
 Summary | Full Text:PDF