A - Abstracts of IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences (Japanese Edition)

Archive Index

Online ISSN : 1881-0195
Volume J95-A No.5  (Publication Date:2012/05/01)
Previous | 
Next
Special Issue on Implementation Technologies for Cryptography and Information Security

pp.392-406  PAPER
Performance and Security Evaluation Methodologies for Cryptographic Hardware
Toshihiro KATASHITA  Akashi SATOH  
Summary | Full Text(in Japanese):PDF (2.2MB) >>Buy this Article

pp.407-415  PAPER
A Compact Implementation and Evaluation of Hash Function Luffa v2
Shugo MIKAMI  Dai WATANABE  Nagamasa MIZUSHIMA  Setsuko NAKAMURA  
Summary | Full Text(in Japanese):PDF (647.9KB) >>Buy this Article

pp.416-424  PAPER
Unified Implementation of BLAKE-256 and BLAKE-512
Teppei YAMAZAKI  Jean-Luc BEUCHAT  Eiji OKAMOTO  
Summary | Full Text(in Japanese):PDF (799.6KB) >>Buy this Article

pp.425-435  PAPER
Early Performance Estimation and an Example Implementation of Group Signature Hardware Using Two-Level Behavioral Synthesis
Sumio MORIOKA  Toshiyuki ISSHIKI  Satoshi OBANA  Kazue SAKO  
Summary | Full Text(in Japanese):PDF (934.1KB) >>Buy this Article

pp.436-445  PAPER
Power Attack Using Chosen Message against Diffie-Hellman Scheme
Kouichi ITOH  Takao OCHIAI  Naoya TORII  
Summary | Full Text(in Japanese):PDF (1.2MB) >>Buy this Article

pp.446-455  PAPER
Power Attack Using Chosen Message against Elliptic Scalar Multiplication
Kouichi ITOH  Dai YAMAMOTO  Kazuyoshi FURUKAWA  Tetsuya IZU  Masahiko TAKENAKA  Naoya TORII  
Summary | Full Text(in Japanese):PDF (568.2KB) >>Buy this Article

pp.456-463  PAPER
A Side-Channel Attack against an Implementation of Modular Inversion Based on Extended Binary GCD Method
Yoshio TAKAHASHI  Tsutomu MATSUMOTO  
Summary | Full Text(in Japanese):PDF (1.3MB) >>Buy this Article

Previous | 
Next
go to Page Top