Zobrazeno 1 - 10
of 59
pro vyhledávání: '"Kazumaro Aoki"'
Autor:
Kazumaro Aoki
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :11-16
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783030384708
SAC
SAC
Many cryptographers have focused on lightweight cryptography, and a huge number of lightweight block ciphers have been proposed. On the other hand, designing lightweight stream ciphers is a challenging task due to the well-known security criteria, i.
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::1dced6efd0c5834a9e22aed9e61340ef
https://doi.org/10.1007/978-3-030-38471-5_15
https://doi.org/10.1007/978-3-030-38471-5_15
Autor:
Kazumaro Aoki, Akira Kanaoka
This book constitutes the refereed proceedings of the 15th International Workshop on Security, IWSEC 2020, held in Fukui, Japan, in September 2020.• The 15 regular papers and 1 short paper presented in this volume were carefully reviewed and select
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :126-137
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :31-38
Autor:
Kazumaro Aoki
Publikováno v:
Advances in Information and Computer Security ISBN: 9783319979151
IWSEC
IWSEC
This paper analyzes two factoring algorithms, NFS (Number Field Sieve) and ECM (Elliptic Curve Method). The previous results only minimize their running times, however, we may need to minimize the storage size or running time with smaller success pro
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::40c0f8dc3a78ec6ee190bbf374b82d50
https://doi.org/10.1007/978-3-319-97916-8_8
https://doi.org/10.1007/978-3-319-97916-8_8
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783319968803
CRYPTO (2)
CRYPTO (2)
A fast correlation attack (FCA) is a well-known cryptanalysis technique for LFSR-based stream ciphers. The correlation between the initial state of an LFSR and corresponding key stream is exploited, and the goal is to recover the initial state of the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f3710b295a5141557b64df5678f75b6e
https://doi.org/10.1007/978-3-319-96881-0_5
https://doi.org/10.1007/978-3-319-96881-0_5
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :192-202
Autor:
Kazumaro Aoki, Yosuke Todo
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1944-1952
Publikováno v:
JSIAM Letters. 6:53-56