Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta (English)
- New search for: Sasaki, Y.
- New search for: Aoki, K.
- New search for: Sasaki, Y.
- New search for: Aoki, K.
In:
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E SERIES A
;
96
, 1
;
141-149
;
2013
-
ISSN:
- Article (Journal) / Print
-
Title:Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta
-
Contributors:Sasaki, Y. ( author ) / Aoki, K. ( author )
-
Published in:
-
Publisher:
-
Publication date:2013-01-01
-
Size:9 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 621.382
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 621.382 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 96, Issue 1
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
FOREWORDMatsumoto, T. et al. | 2013
- 1
-
Special Section on Cryptography and Information Security - Special Section on Wideband Systems - Special Section on Cryptography and Information Security - FOREWORDMatsumoto, Tsutomu et al. | 2013
- 2
-
Symmetric Key Cryptography - Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel StructuresYanagihara, Shingo et al. | 2013
- 2
-
Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel StructuresYanagihara, S. / Iwata, T. et al. | 2013
- 15
-
On the Construction of Boolean Functions with Optimal Algebraic Immunity Based on Factorization of Numbers of VariablesChen, Huajin et al. | 2013
- 25
-
Security of Hash-then-CBC Key Wrapping RevisitedOsaki, Yasushi et al. | 2013
- 35
-
Cryptanalysis of INCrypt32 in HID's iCLASS SystemsKim, ChangKyun et al. | 2013
- 42
-
Public Key Based Protocols - Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear AssumptionOkamoto, Tatsuaki et al. | 2013
- 42
-
Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear AssumptionOkamoto, T. / Takashima, K. et al. | 2013
- 53
-
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its ApplicationHattori, Mitsuhiro et al. | 2013
- 68
-
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim EncryptionMitsunaga, Takuho et al. | 2013
- 76
-
Generic Construction of Strongly Secure Timed-Release Public-Key EncryptionFujioka, Atsushi et al. | 2013
- 92
-
Message Recovery Signature Schemes from Sigma-ProtocolsAbe, Masayuki et al. | 2013
- 101
-
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key ExchangeManulis, Mark et al. | 2013
- 111
-
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned DatasetsKikuchi, Hiroaki et al. | 2013
- 121
-
Hash Functions - Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolSasaki, Yu et al. | 2013
- 121
-
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to WhirlpoolSasaki, Y. et al. | 2013
- 131
-
Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression FunctionSasaki, Yu et al. | 2013
- 141
-
Open-Key Distinguishers for the Internal Block Cipher of Tweaked LesamntaSasaki, Yu et al. | 2013
- 150
-
Foundations - Random Sampling Reduction with PrecomputationYoshino, Masayuki et al. | 2013
- 150
-
Random Sampling Reduction with PrecomputationYoshino, M. / Kunihiro, N. et al. | 2013
- 158
-
Computing a Sequence of 2-Isogenies on Supersingular Elliptic CurvesYoshida, Reo et al. | 2013
- 166
-
Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal AttacksWaseda, Atsushi et al. | 2013
- 171
-
On Constant-Weight Multi-Valued Sequences from Cyclic Difference SetsKaida, Takayasu et al. | 2013
- 177
-
A New Type of Fault-Based Attack: Fault Behavior AnalysisLi, Y. / Ohta, K. / Sakiyama, K. et al. | 2013
- 177
-
Implementation - A New Type of Fault-Based Attack: Fault Behavior AnalysisLi, Yang et al. | 2013
- 185
-
Correlated Noise Reduction for Electromagnetic AnalysisLiu, Hongying et al. | 2013
- 196
-
General Fault Attacks on Multivariate Public Key CryptosystemsHashimoto, Yasufumi et al. | 2013
- 206
-
Efficient Implementation of NTRU Cryptosystem Using Sliding Window MethodsLee, Mun-Kyu et al. | 2013
- 215
-
System Security - Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual MachinesSuzaki, Kuniyasu et al. | 2013
- 215
-
Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual MachinesSuzaki, K. / Iijima, K. / Yagi, T. / Artho, C. et al. | 2013
- 225
-
Catching the Behavioral Differences between Multiple Executions for Malware DetectionKasama, Takahiro et al. | 2013
- 233
-
Provable Security against Cryptanalysis with Impossible DifferentialsAoki, K. et al. | 2013
- 233
-
LETTERS - Provable Security against Cryptanalysis with Impossible DifferentialsAoki, Kazumaro et al. | 2013
- 237
-
A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday BoundYasuda, Kan et al. | 2013
- 242
-
Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature SchemeDou, Bennian et al. | 2013
- 244
-
Key Substitution Attacks on Multisignature SchemesDou, Bennian et al. | 2013
- 246
-
Special Section on Wideband Systems - FOREWORDItami, Makoto et al. | 2013
- 247
-
Software Radio-Based Distributed Multi-User MIMO Testbed: Towards Green Wireless Communications (INVITED)Murata, Hidekazu et al. | 2013
- 255
-
Performance Analysis of Coded-Sequence Self-Encoded Spread Spectrum over Rayleigh Fading ChannelDuraisamy, Poomathi et al. | 2013
- 264
-
Primary Signal to Noise Ratio Estimation Based on AIC for UWB SystemsFujii, Masahiro et al. | 2013
- 274
-
Examination of Effective UWB Avoidance Based on Experiments for Coexistence with Other Wireless SystemsLi, Huan-Bang et al. | 2013
- 285
-
Detection Capability of Downlink Signals in Mobile WiMAX and 3GPP LTE with an FFT-Based UWB ReceiverTakizawa, Kenichi et al. | 2013
- 293
-
A Max-Min Approach to Channel Shortening in OFDM SystemsTakahashi, T. / Miyajima, T. et al. | 2013
- 293
-
LETTERS - A Max-Min Approach to Channel Shortening in OFDM SystemsTakahashi, Tsukasa et al. | 2013
- 296
-
Hybrid DCT/DST Precoding Scheme for the PAPR Reduction of OFDM SystemsCho, Soobum et al. | 2013
- 298
-
Digital Signal Processing - Reliable Data Transmission for Resonant-Type Wireless Power TransferNoguchi, Shinpei et al. | 2013
- 298
-
Reliable Data Transmission for Resonant-Type Wireless Power TransferNoguchi, S. / Inamori, M. / Sanada, Y. et al. | 2013
- 304
-
Minimizing False Peak Errors in Generalized Cross-Correlation Time Delay Estimation Using Subsample Time Delay EstimationChoi, SooHwan et al. | 2013
- 312
-
A Thermal-Aware High-Level Synthesis Algorithm for RDR Architectures through Binding and AllocationKawamura, K. / Yanagisawa, M. / Togawa, N. et al. | 2013
- 312
-
VLSI Design Technology and CAD - A Thermal-Aware High-Level Synthesis Algorithm for RDR Architectures through Binding and AllocationKawamura, Kazushi et al. | 2013
- 322
-
Algorithms and Data Structures - Fast Bit-Parallel Polynomial Basis Multiplier for GF(2m) Defined by Pentanomials Using Weakly Dual BasisPark, Sun-Mi et al. | 2013
- 322
-
Fast Bit-Parallel Polynomial Basis Multiplier for GF(2^m) Defined by Pentanomials Using Weakly Dual BasisPark, S.-M. / Chang, K.-Y. / Hong, D. / Seo, C. et al. | 2013
- 332
-
Cryptography and Information Security - Enhanced Side-Channel Cube Attacks on PRESENTZhao, Xinjie et al. | 2013
- 332
-
Enhanced Side-Channel Cube Attacks on PRESENTZhao, X. / Guo, S. / Zhang, F. / Wang, T. / Shi, Z. / Luo, H. et al. | 2013
- 340
-
Vision - Deterioration of Visibility of Scrolling Text Presented Nearby Image Moving in the Opposite DirectionKihara, Ken et al. | 2013
- 340
-
Deterioration of Visibility of Scrolling Text Presented Nearby Image Moving in the Opposite DirectionKihara, K. / Seki, M. / Ohtsuka, S. et al. | 2013
- 345
-
Concurrent Systems - Computation of Sublanguages for Synthesizing Decentralized Supervisors for Timed Discrete Event SystemsNomura, Masashi et al. | 2013
- 345
-
Computation of Sublanguages for Synthesizing Decentralized Supervisors for Timed Discrete Event SystemsNomura, M. / Takai, S. et al. | 2013
- 356
-
Reduced Reconfigurable Logic Circuit Design Based on Double Gate CNTFETs Using Ambipolar Binary Decision DiagramNinomiya, H. / Kobayashi, M. / Watanabe, S. et al. | 2013
- 356
-
LETTERS - Circuit Theory - Reduced Reconfigurable Logic Circuit Design Based on Double Gate CNTFETs Using Ambipolar Binary Decision DiagramNinomiya, Hiroshi et al. | 2013
- 360
-
Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial RepresentationFu, S. / Li, C. / Qu, L. et al. | 2013
- 360
-
Cryptography and Information Security - Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial RepresentationFu, Shaojing et al. | 2013
- 363
-
Linear Complexity of Binary Whiteman Generalized Cyclotomic Sequences of Order 4Li, Xiaoping et al. | 2013
- 367
-
Information Theory - Several Types of Sequences with Optimal Autocorrelation PropertiesZeng, Fanxin et al. | 2013
- 367
-
Several Types of Sequences with Optimal Autocorrelation PropertiesZeng, F. / Zeng, X. / Zhang, Z. / Xuan, G. et al. | 2013
- 373
-
Low Complexity Decoder Design for Non-binary LDPC Coded MIMO System Using Quasi-Orthogonal STBCYan, Y. / Lee, M.H. et al. | 2013
- 373
-
Coding Theory - Low Complexity Decoder Design for Non-binary LDPC Coded MIMO System Using Quasi-Orthogonal STBCYan, Yier et al. | 2013
- 377
-
Construction of Shift Distinct Sequence Sets with Zero or Low Correlation ZoneChen, Xiaoyu et al. | 2013
- 383
-
Communication Theory and Signals - Channel Localization Mechanism for Wi-Fi SystemsHwang, Sungho et al. | 2013
- 383
-
Channel Localization Mechanism for Wi-Fi SystemsHwang, S. / Kim, K. et al. | 2013
- 387
-
Channel Condition Number Based Switching Detection Scheme in MIMO-OFDM SystemAhn, Jang-Kyun et al. | 2013
- 391
-
Intelligent Transport System - Traffic Flow Simulator Using Virtual Controller ModelLiang, Haijun et al. | 2013
- 391
-
Traffic Flow Simulator Using Virtual Controller ModelLiang, H. / Yang, H. / Yang, B. et al. | 2013
- 394
-
Image - Region Diversity Based Saliency Density Maximization for Salient Object DetectionHe, Xin et al. | 2013
- 394
-
Region Diversity Based Saliency Density Maximization for Salient Object DetectionHe, X. / Jing, H. / Han, Q. / Niu, X. et al. | 2013
-
ABSTRACTS - IEICE Trans. Fundamentals (Japanese Edition), Vol. J96-A, No. 1| 2013