Publication: Publication Date: 2019/09/01 Vol. E102-ANo. 9pp. 1272-1284 Type of Manuscript: PAPER Category: Cryptography and Information Security Keyword: entropy source, noise source, race condition,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2012/08/01 Vol. E95-ANo. 8pp. 1379-1389 Type of Manuscript: PAPER Category: Cryptography and Information Security Keyword: preimage attack, hash mode, Feistel scheme, Misty scheme, block cipher,
TinyECCK16: An Efficient Field Multiplication Algorithm on 16-bit Environment and Its Application to Tmote Sky Sensor Motes Seog Chung SEODong-Guk HANSeokhie HONG
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2009/05/01 Vol. E92-DNo. 5pp. 918-928 Type of Manuscript: Special Section PAPER (Special Section on Information and Communication System Security) Category: Implementation Issues Keyword: wireless sensor network, elliptic curve cryptosystem, efficient implementation,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2008/10/01 Vol. E91-ANo. 10pp. 3047-3058 Type of Manuscript: PAPER Category: Cryptography and Information Security Keyword: provable security, differential cryptanalysis, linear cryptanalysis, Feistel, CLEFIA, MISTY,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2008/09/01 Vol. E91-ANo. 9pp. 2607-2614 Type of Manuscript: PAPER Category: Cryptography and Information Security Keyword: hash function, random oracle, ideal cipher model,
Publication: IEICE TRANSACTIONS on Information and Systems Publication Date: 2008/05/01 Vol. E91-DNo. 5pp. 1338-1347 Type of Manuscript: Special Section PAPER (Special Section on Information and Communication System Security) Category: Implementation Keyword: wireless sensor network, Elliptic Curve Cryptosystem, TinyOS, Koblitz curve,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2008/02/01 Vol. E91-ANo. 2pp. 642-649 Type of Manuscript: PAPER Category: Cryptography and Information Security Keyword: MISTY 1, MISTY 2, weak-key classes, related-key amplified boomerang attack, block ciphers,
Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences Publication Date: 2005/01/01 Vol. E88-ANo. 1pp. 2-8 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Symmetric Key Cryptography Keyword: block cipher, linear cryptanalysis, multiple linear cryptanalsis,