Keyword : AES


Improvements on Security Evaluation of AES against Differential Bias Attack
Haruhisa KOSUGE Hidema TANAKA 
Publication:   
Publication Date: 2017/11/01
Vol. E100-A  No. 11 ; pp. 2398-2407
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block cipherside-channel attackformal security analysisleakage modelAESdifferential bias attackkey enumerationrank estimation
 Summary | Full Text:PDF

One-Bit to Four-Bit Dual Conversion for Security Enhancement against Power Analysis
Seungkwang LEE Nam-Su JHO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/10/01
Vol. E99-A  No. 10 ; pp. 1833-1842
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
power analysiscountermeasureblock cipherAES
 Summary | Full Text:PDF

Round Addition DFA on SPN Block Ciphers
Hideki YOSHIKAWA Masahiro KAMINAGA Arimitsu SHIKODA Toshinori SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/12/01
Vol. E97-A  No. 12 ; pp. 2671-2674
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
differential fault analysis (DFA)round additionblock cipherSPN block cipherAESKLEINLED
 Summary | Full Text:PDF

Throughput and Power Efficiency Evaluation of Block Ciphers on Kepler and GCN GPUs Using Micro-Benchmark Analysis
Naoki NISHIKAWA Keisuke IWAI Hidema TANAKA Takakazu KUROKAWA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/06/01
Vol. E97-D  No. 6 ; pp. 1506-1515
Type of Manuscript:  PAPER
Category: Fundamentals of Information Systems
Keyword: 
throughputpower efficiencyGPUOpenCLAESCamelliaSC2000KeplerGraphics Core Next
 Summary | Full Text:PDF

A Fast Power Current Simulation of Cryptographic VLSI Circuits for Side Channel Attack Evaluation
Daisuke FUJIMOTO Toshihiro KATASHITA Akihiko SASAKI Yohei HORI Akashi SATOH Makoto NAGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/12/01
Vol. E96-A  No. 12 ; pp. 2533-2541
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Device and Circuit Modeling and Analysis
Keyword: 
power supply currentelectromagnetic leakageinformation leakageAES
 Summary | Full Text:PDF

High Throughput Parallelization of AES-CTR Algorithm
Nhat-Phuong TRAN Myungho LEE Sugwon HONG Seung-Jae LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/08/01
Vol. E96-D  No. 8 ; pp. 1685-1695
Type of Manuscript:  PAPER
Category: Fundamentals of Information Systems
Keyword: 
AESmulti-coreGPUparallelization
 Summary | Full Text:PDF

Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 121-130
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
AEShash functionDavies-MeyerMatyas-Meyer-OseasMiyaguchi-PreneelPGVpreimagemeet-in-the-middleWhirlpool
 Summary | Full Text:PDF

A New Type of Fault-Based Attack: Fault Behavior Analysis
Yang LI Kazuo OHTA Kazuo SAKIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 177-184
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
fault-based attackAESfaulty behaviorphysical attacksmasking
 Summary | Full Text:PDF

Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
Yang LI Kazuo OHTA Kazuo SAKIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 234-241
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
side-channel attacksfault sensitivity analysiscountermeasuresWDDLAES
 Summary | Full Text:PDF

Software-Based Parallel Cryptographic Solution with Massive-Parallel Memory-Embedded SIMD Matrix Architecture for Data-Storage Systems
Takeshi KUMAKI Tetsushi KOIDE Hans Jurgen MATTAUSCH Masaharu TAGAMI Masakatsu ISHIZAKI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/09/01
Vol. E94-D  No. 9 ; pp. 1742-1754
Type of Manuscript:  PAPER
Category: Fundamentals of Information Systems
Keyword: 
matrix-processing architectureSIMDbit-serial and word-parallelCAMtable-lookup codingcryptographic algorithmAES
 Summary | Full Text:PDF

Mixed Bases for Efficient Inversion in F((22)2)2 and Conversion Matrices of SubBytes of AES
Yasuyuki NOGAMI Kenta NEKADO Tetsumi TOYOTA Naoto HONGO Yoshitaka MORIKAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1318-1327
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
AESinversiontoweringconversion matrixbases
 Summary | Full Text:PDF

Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System
Eun-Jun YOON Il-Soo JEON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/05/01
Vol. E94-D  No. 5 ; pp. 1113-1116
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
network securityautonomous systemcryptographyauthenticationAES
 Summary | Full Text:PDF

Secure Wake-Up Scheme for WBANs
Jing-Wei LIU Moshaddique Al AMEEN Kyung-Sup KWAK 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/04/01
Vol. E93-B  No. 4 ; pp. 854-857
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication Technology for Wellness and Medical Applications)
Category: 
Keyword: 
WBANwake-up authentication codelow energy consumptionAES
 Summary | Full Text:PDF

General Impossible Differential Attack on 7-Round AES
Meiling ZHANG Weiguo ZHANG Jingmei LIU Xinmei WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 327-330
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
AESgeneral impossible differential attacktime complexitydata complexity
 Summary | Full Text:PDF

On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
Kazuo SAKIYAMA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 172-179
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
fault analysisrandom switching logicAESclock-based fault analysis attack
 Summary | Full Text:PDF

Low Cost Design of an Advanced Encryption Standard (AES) Processor Using a New Common-Subexpression-Elimination Algorithm
Ming-Chih CHEN Shen-Fu HSIAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/12/01
Vol. E92-A  No. 12 ; pp. 3221-3228
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Embedded, Real-Time and Reconfigurable Systems
Keyword: 
AESVLSIcommon subexpression elimination (CSE)information securitylogic synthesis
 Summary | Full Text:PDF

A Scan-Based Attack Based on Discriminators for AES Cryptosystems
Ryuta NARA Nozomu TOGAWA Masao YANAGISAWA Tatsuo OHTSUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/12/01
Vol. E92-A  No. 12 ; pp. 3229-3237
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Embedded, Real-Time and Reconfigurable Systems
Keyword: 
scan-based attackside-channel attackscan chaintestabilitysecuritycryptographyAES
 Summary | Full Text:PDF

An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
Yibo FAN Jidong WANG Takeshi IKENAGA Yukiyasu TSUNOO Satoshi GOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 12-21
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
Unequal Secure Encryptionvideo encryptionselective encryptionH.264/AVCAESLEX
 Summary | Full Text:PDF

Improved MACs from Differentially-Uniform Permutations
Kazuhiko MINEMATSU Toshiyasu MATSUSHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/12/01
Vol. E90-A  No. 12 ; pp. 2908-2915
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
MACblock cipherAESdifferentially-uniform permutation
 Summary | Full Text:PDF

On the S-Box Architectures with Concurrent Error Detection for the Advanced Encryption Standard
Shee-Yau WU Huang-Ting YEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10 ; pp. 2583-2588
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
AEScomposite fielderror detectionfinite fieldparity checkparity predictionRijndaelS-Box
 Summary | Full Text:PDF

Differential Cryptanalysis of CAST-256 Reduced to Nine Quad-Rounds
Haruki SEKI Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/04/01
Vol. E84-A  No. 4 ; pp. 913-918
Type of Manuscript:  Special Section PAPER (Special Section on Fundamentals of Information and Communications)
Category: 
Keyword: 
block cipherAESCAST-256differential cryptanalysisweak key
 Summary | Full Text:PDF

E2--A New 128-Bit Block Cipher
Masayuki KANDA Shiho MORIAI Kazumaro AOKI Hiroki UEDA Youichi TAKASHIMA Kazuo OHTA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1 ; pp. 48-59
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
encryption algorithmblock cipherE2AESdesign strategy
 Summary | Full Text:PDF