Shinichi KAWAMURA


A Secure Communication Network Infrastructure Based on Quantum Key Distribution Technology
Yoshimichi TANIZAWA Ririka TAKAHASHI Hideaki SATO Alexander R. DIXON Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/05/01
Vol. E99-B  No. 5  pp. 1054-1069
Type of Manuscript:  Special Section PAPER (Special Section on Internet Architectures and Management Methods that Enable Flexible and Secure Deployment of Network Services)
Category: 
Keyword: 
secure communicationnetwork infrastructurekey managementQuantum Key Distribution
 Summary | Full Text:PDF

Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
Yang LI Kazuo SAKIYAMA Shinichi KAWAMURA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 191-199
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
side channel attacksmaskingFourier transforms-boxprobability density function
 Summary | Full Text:PDF

BS-CPA: Built-In Determined Sub-Key Correlation Power Analysis
Yuichi KOMANO Hideo SHIMIZU Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/09/01
Vol. E93-A  No. 9  pp. 1632-1638
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
side channel attackspower analysisCPAHamming weight and Hamming distance modelsDPA contest
 Summary | Full Text:PDF

Provably Secure Multisignatures in Formal Security Model and Their Optimality
Yuichi KOMANO Kazuo OHTA Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 107-118
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Signatures
Keyword: 
multisignaturestrapdoor one-way permutation (TOWP)claw-free permutation (CFP)provably securerandom oracle model
 Summary | Full Text:PDF

Toward the Fair Anonymous Signatures: Deniable Ring Signatures
Yuichi KOMANO Kazuo OHTA Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 54-64
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Signatures
Keyword: 
group signaturesring signaturesDLPCDHDDHrandom oracle model
 Summary | Full Text:PDF

FOREWORD
Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 1-1
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF

An SPA-Based Extension of Schindler's Timing Attack against RSA Using CRT
Yuuki TOMOEDA Hideyuki MIYAKE Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 147-153
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
SPAtiming attackMontgomery multiplicationRSAChinese remainder theorem
 Summary | Full Text:PDF

On the Security of Nested SPN Cipher against the Differential and Linear Cryptanalysis
Fumihiko SANO Kenji OHKUMA Hideo SHIMIZU Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 37-46
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block cipherSPNcryptanalysis
 Summary | Full Text:PDF

RNS Montgomery Multiplication Algorithm for Duplicate Processing of Base Transformations
Hanae NOZAKI Atsushi SHIMBO Shinichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 89-97
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Ciphers
Keyword: 
RSA cryptographymodular exponentiationresidue number systemsMontgomery multiplicationbase transformation
 Summary | Full Text:PDF