UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Expert search   

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1 2 3 4 5
hits: 362
1.
  • mPoW: How to Make Proof of ... mPoW: How to Make Proof of Work Meaningful
    ASANUMA, Takaki; ISOBE, Takanori IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 03/2023, Volume: E106.A, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Proof of Work (PoW), which is a consensus algorithm for blockchain, entails a large number of meaningless hash calculations and wastage of electric power and computational resources. In 2021, it is ...
Full text
2.
  • An Improved Charge-Based Me... An Improved Charge-Based Method Extended to Estimating Appropriate Dead Time for Zero-Voltage-Switching Analysis in Dual-Active-Bridge Converter
    Zhang, Haoyu; Isobe, Takanori Energies, 01/2022, Volume: 15, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    This paper presents a comprehensive analysis of zero-voltage-switching (ZVS) realization with an improved charge-based method by considering both voltage dependency parasitic capacitance and dead ...
Full text

PDF
3.
  • The Inverse of χ and Its Ap... The Inverse of χ and Its Applications to Rasta-Like Ciphers
    Liu, Fukang; Sarkar, Santanu; Meier, Willi ... Journal of cryptology, 10/2022, Volume: 35, Issue: 4
    Journal Article
    Peer reviewed

    Rasta and Dasta are two fully homomorphic encryption friendly symmetric-key primitives proposed at CRYPTO 2018 and ToSC 2020, respectively. It can be found from the designers’ analysis that the ...
Full text
4.
  • SAT-based Analysis of Relat... SAT-based Analysis of Related-key Impossible Distinguishers on Piccolo and (Tweakable) TWINE
    UTSUMI, Shion; SAKAMOTO, Kosei; ISOBE, Takanori IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 08/2024, Volume: E107.A, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    Lightweight block ciphers have gained attention in recent years due to the increasing demand for sensor nodes, RFID tags, and various applications. In such a situation, lightweight block ciphers ...
Full text
5.
  • Improving the Security Boun... Improving the Security Bounds against Differential Attacks for Pholkos Family
    TAKEUCHI, Nobuyuki; SAKAMOTO, Kosei; SHIRAYA, Takuro ... IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 08/2024, Volume: E107.A, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    At CT-RSA 2022, Bossert et al. proposed Pholkos family, an efficient large-state tweakable block cipher. In order to evaluate the security of differential attacks on Pholkos, they obtained the lower ...
Full text
6.
  • Cube Attacks on Non-Blackbo... Cube Attacks on Non-Blackbox Polynomials Based on Division Property
    Todo, Yosuke; Isobe, Takanori; Hao, Yonglin ... IEEE transactions on computers, 12/2018, Volume: 67, Issue: 12
    Journal Article
    Peer reviewed

    The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the cube attack, the ...
Full text
7.
  • A Proof of Work Based on Ke... A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance
    ASANUMA, Takaki; ISOBE, Takanori IEICE Transactions on Information and Systems, 02/2022, Volume: E105.D, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Hashcash, which is a Proof of Work (PoW) of bitcoin, is based on a preimage problem of hash functions of SHA-2 and RIPEMD. As these hash functions employ the Merkle-Damgard (MD) construction, a ...
Full text

PDF
8.
  • A Single-Key Attack on the ... A Single-Key Attack on the Full GOST Block Cipher
    Isobe, Takanori Journal of cryptology, 01/2013, Volume: 26, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    The GOST block cipher is the Russian encryption standard published in 1989. In spite of considerable cryptanalytic efforts over the past 20 years, a key recovery attack on the full GOST block cipher ...
Full text
9.
  • Security Analysis of End-to... Security Analysis of End-to-End Encryption for Zoom Meetings
    Isobe, Takanori; Ito, Ryoma IEEE access, 2021, Volume: 9
    Journal Article
    Peer reviewed
    Open access

    In the wake of the global COVID-19 pandemic, video conference systems have become essential for not only business purposes, but also private, academic, and educational uses. Among the various ...
Full text

PDF
10.
  • On Optimality of the Round ... On Optimality of the Round Function of Rocca
    TAKEUCHI, Nobuyuki; SAKAMOTO, Kosei; ISOBE, Takanori IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2023/01/01, 2023-1-1, 20230101, Volume: E106.A, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    At ToSC 2021, Sakamoto et al. proposed Rocca, an AES-based encryption scheme, for Beyond 5G applications. They presented a class of round functions that achieved impressive performance in software by ...
Full text
1 2 3 4 5
hits: 362

Load filters