Zobrazeno 1 - 10
of 31
pro vyhledávání: '"Jun Yajima"'
Autor:
Jun Yajima, Maki Inui, Takanori Oikawa, Fumiyoshi Kasahara, Ikuya Morikawa, Nobukazu Yoshioka
Publikováno v:
Proceedings of the 1st International Conference on AI Engineering: Software Engineering for AI.
Publikováno v:
Journal of Information Processing. 28:65-74
Data Relation Analysis Focusing on Plural Data Transition for Detecting Attacks on Vehicular Network
Publikováno v:
Advances in Networked-based Information Systems ISBN: 9783030290283
NBiS
NBiS
On the Controller Area Network (CAN), there are three types of messages, namely periodic messages, event based periodic messages, and non-periodic messages. On the attack detection, there are many high accuracy methods for the periodic messages. For
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f601a67f8b89f9a7f60436258b32e619
https://doi.org/10.1007/978-3-030-29029-0_25
https://doi.org/10.1007/978-3-030-29029-0_25
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :2628-2638
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :3-12
This paper proposes a compact hardware (H/W) implementation for the MISTY block cipher, which is one of the ISO/IEC 18033-3 standard encryption algorithms. In designing the compact H/W, we focused on optimizing the implementation of FO/FI/FL function
Autor:
Terutoshi Iwasaki, Kazuo Ohta, Noboru Kunihiro, Thomas Peyrin, Yu Sasaki, Yusuke Naito, Takeshi Shimoyama, Jun Yajima
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :87-95
This paper proposes a new algorithm for evaluating the number of chaining variable conditions (CVCs) in the selecting step of a disturbance vector (DV) for the analysis of SHA-1 collision search. The algorithm is constructed by combining four strateg
Publikováno v:
IEICE Transactions on Information and Systems. :897-908
This paper proposes a new side channel attack to RSA cryptography. Our target is an implementation with a combination of countermeasures. These are an SPA countermeasure by m-ary method and a DPA countermeasure by randomizing exponent techniques. Her
Publikováno v:
Public Key Infrastructures, Services and Applications ISBN: 9783642400117
EuroPKI
EuroPKI
In 2009, Gentry first proposed a concrete method for constructing a fully homomorphic encryption FHE scheme, which supports arbitrary operations on encrypted data. The construction of the FHE scheme starts from a somewhat homomorphic encryption SHE s
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::91ce7355eb70d584988605ef018b03c7
https://doi.org/10.1007/978-3-642-40012-4_1
https://doi.org/10.1007/978-3-642-40012-4_1
Autor:
Mikako Aoki, Hiko Hyakusoku, Jun Yajima, Miyoko Kumakawa, Sanae Shimada, Mitsuyoshi Honda, Shigeaki Nakayama, Shotaro Maeda, Kiyoshi Mitsuhashi, Mieko Hata, Amiko Hashimoto
Publikováno v:
Skin Cancer. 11:95-98
A case of meibomian gland carcinoma was reported. Meibomian gland carcinoma is frequently misdiagnosed as a chalazion or meibomian gland infarction, because of its slow growth and the lack of sufficiently distinctive clinical features. We analyse the
Publikováno v:
IMIS
Surveillance cameras are widely used anywhere to record video data. Instead of the original video, extracted video are sometimes used to reduce the video size and keep the privacy. In order to counter the editing or copying by adversaries, assuring t