KUWAKADO, Hidenori |
---|
Faculty, Department/Institute
- Faculty of Informatics Department of Informatics
Academic status (qualification)
- Professor Apr. 1,2013
Academic Degrees
- Sep. 1999 Kobe University
Research fields
Research fields | keyword |
---|---|
Information and communication engineering |
Awards
- Jan. 30,1993
- Jan. 29,1994
- May 20,2004
- Sep. 21,2005
- Nov. 1,2006
- Apr. 15,2011
Academic Associations
所属学会・団体名 | 役職名 (役職在任期間) |
---|---|
The Institute of Electronics ,Information and Communication Engineers | |
The Institute of Electrical and Electronics Engineers, Inc. | |
Information Processing Society of Japan |
Research Publications
No. | Type of publication | Date of publication (Date of presentation) | Title | Type of research result | Jointly authored or single authored | Publisher and journal name | Volume number |
---|---|---|---|---|---|---|---|
1 | Research report21 | 2017/7/20~2017,07,20,,, | Artificial Metrics of Electric Devices and Their Applications | In-house publication | Co-authored | JOURNAL of INFORMATICS | Vol. 46, pp.1-22 |
2 | Papers1 | 2017/3~2017,03,00,,, | Secure regenerating codes using linear regenerating codes and the all-or-nothing transform | Academic Journal | Co-author | IEICE TRANS-ACTIONS on Information and Systems | vol.E100-D, no.3, pp.483–495 |
3 | International academic conference8 | 2016/10~2016,10,00,,, | A pseudorandom-function mode based on Lesamnta-lw and the MDP domain extension and its application | Co-author | NIST Lightweight Cryptography Workshop 2016 | ||
4 | International academic conference8 | 2014/12~2014,12,00,,, | A collision attack on a double-block-length compression function instantiated with round- reduced AES-256 | Co-author | The 17th International Conference on Information Security and Cryptology (ICISC 2014), Lecture Notes in Computer Science | vol.8949, pp.271–285 | |
5 | International academic conference8 | 2014/10~2014,10,00,,, | Secure regenerating codes using linear MBR/MSR codes and the all-or-nothing transform | Co-author | Proceedings of the 2014 International Symposium on Information Theory and its Applications | pp.221–225 | |
6 | International academic conference8 | 2014~2014,00,00,,, | Forward-secure sequential aggregate message authentication revisited | Co-author | Provable Security, Lecture Notes in Computer Science | vol.8782, pp.87–102 | |
7 | International academic conference8 | 2014~2014,00,00,,, | A block-cipher-based hash function using an MMO-type double-block compression function | Co-author | Provable Security, Lecture Notes in Computer Science | vol.8782, pp.71–86 | |
8 | Papers1 | 2013/12~2013,12,00,,, | Multilane hashing mode suitable for parallel processing | Academic Journal | Co-author | IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences | vol.E96-A, no.12, pp.2434–2442 |
9 | International academic conference8 | 2013/12~2013,12,00,,, | Hashing mode using a lightweight blockcipher | Co-author | Proceedings of the 14th IMA International Conference on Cryptography and Coding (IMACC 2013), Lecture Notes in Computer Science | vol.8308, pp.213–231 | |
10 | International academic conference8 | 2013/7~2013,07,00,,, | Redactable signature scheme for tree-structured data based on Merkle tree | Other | Proceedings of SECRYPT 2013, 10th International Conference on Security and Cryptography | ||
11 | Papers1 | 2013/4~2013,04,00,,, | Secure regenerating codes based on MSR codes for distributed storage systems | Academic Journal | Co-author | IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences | Vol.J96-A No.4 pp.166-174 |
12 | Papers1 | 2013/2~2013,02,00,,, | Secure regenerating codes based on Rashmi-Shah-Kumar MBR codes | Academic Journal | Co-author | IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences | Vol.E96-A No.2 pp.635-648, |
13 | Papers1 | 2012/9~2012,09,00,,, | Length-preserving CBC enciphering scheme and its security analysis | Academic Journal | Single-Author | IPSJ Journal | |
14 | Papers1 | 2012/1~2012,01,00,,, | An AES based 256-bit hash function for lightweight applications: Lesamnta-LW | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol.E95-A, no.1, pp.89-99 |
15 | Papers1 | 2012/1~2012,01,00,,, | Collision resistance of hash functions in a weak ideal cipher model | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol.E95-A, no.1, pp.252-255 |
16 | Papers1 | 2011/1~2011,01,00,,, | Generalized classes of weak keys on RC4 using predictive state | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol.E94-A, no.1, pp.10-18 |
17 | International academic conference8 | 2011~2011,00,00,,, | A Lightweight 256-bit Hash Function for Hardware and Low-end Devices: Lesamnta-LW | Other | Co-author | Proceedings of the 13th Annual International Conference on Information Security and Cryptology, ICISC 2010, Lecture Notes in Computer Science | vol. 6584, pp.151-168 |
18 | International academic conference8 | 2011~2011,00,00,,, | Compression functions using a dedicated blockcipher for lightweight hashing | Other | Co-author | Preproceedings of the 14th Annual International Conference on Information Security and Cryptology | |
19 | Papers1 | 2010/1~2010,01,00,,, | Fast WEP-key recovery attack using only encrypted IP packets | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol.E93-A, no.1, pp.164-171 |
20 | International academic conference8 | 2010~2010,00,00,,, | Quantum distinguisher between the 3-round Feistel cipher and the random permutation | Other | Co-author | Proceedings of the 2011 IEEE International Symposium on Information Theory | pp.2682-2685 |
21 | Papers1 | 2009/10~2009,10,00,,, | Efficient pseudorandom-function modes of a block-cipher-based hash function | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E92-A, no. 10, pp. 2447-2453 |
22 | International academic conference8 | 2009/8~2009,08,00,,, | Quantum analysis of 2,3-round Feistel schemes | Other | Co-author | Proceedings of the 9th Asian Conference on Quantum Information Science | pp. 39-40 |
23 | Papers1 | 2009/7~2009,07,00,,, | Differentiability of four prefix-free PGV hash functions | Academic Journal | Co-author | IEICE Electronics Express | vol. 6, no. 13, pp. 955-958 |
24 | Papers1 | 2009/1~2009,01,00,,, | A chosen-IV key recovery attack on Py and PyPy | Academic Journal | Co-author | IEICE Transactions on Information and Systems | vol. E92-D, no. 1, pp. 32-40 |
25 | International academic conference8 | 2009~2009,00,00,,, | Pseudorandom-function property of the step-reduced compression functions of SHA-256 and SHA-512 | Other | Co-author | Information Security Applications, 9th International Workshop, WISA 2008, Lecture Notes in Computer Science | vol. 5379, pp. 174-189 |
26 | Papers1 | 2008/10~2008,10,00,,, | Compression functions suitable for the multi-property-preserving transform | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E91-A, no. 10, pp. 2851-2859 |
27 | International academic conference8 | 2008~2008,00,00,,, | A scheme to base a hash function on a block cipher | Other | Co-author | Preproceedings of SAC (Selected Areas in Cryptography) | pp. 243-256 |
28 | International academic conference8 | 2008~2008,00,00,,, | Multi-bit revocable network coding scheme for butterfly-like network | Other | Co-author | Proceedings of the 2008 International Symposium on Information Theory and its Applications | pp. 423-428 |
29 | Papers1 | 2007/10~2007,10,00,,, | Indifferntialbility of single-block-length and rate-1 compression functions | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E90-A, no. 10, pp. 2301-2308 |
30 | International academic conference8 | 2007/1~2007,01,00,,, | How to break Py and Pypy by a chosen-IV attack | Other | Co-author | Proc. of SASC 2007, The State of the Art of Stream Ciphers | pp. 340-352 |
31 | International academic conference8 | 2006/10~2006,10,00,,, | Collision-controllable hash function | Other | Co-author | Proc. of the 2006 International Symposium on Information Theory and its Applications | no. Tue2-2-2 |
32 | International academic conference8 | 2005/12~2005,12,00,,, | Visual cryptographic protocols using the trusted initializer | Other | Co-author | Information and Communications Security, 7th International Conference, ICICS 2005, Lecture Notes in Computer Science | vol. 3783, pp. 112-122 |
33 | Papers1 | 2005/8~2005,08,00,,, | Secure length-preserving all-or-nothing transform | Academic Journal | Co-author | IPSJ Journal | vol. 46, no. 8, pp. 1843-1851 |
34 | International academic conference8 | 2004/10~2004,10,00,,, | Signature scheme suitable for related files | Other | Co-author | Proc. of the 2004 International Symposium on Information Theory and its Applications | pp. 134-139 |
35 | Papers1 | 2004/5~2004,05,00,,, | Size-reduced visual secret sharing scheme | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E87-A, no. 5, pp. 1193-1197 |
36 | Papers1 | 2003/10~2003,10,00,,, | Efficient relative time-stamping scheme based on the ternary link | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E86-A, no. 10, pp. 2552-2559 |
37 | Papers1 | 2003/8~2003,08,00,,, | Threshold ring signature scheme based on the curve | Academic Journal | Co-author | IPSJ Journal | vol. 44, no. 8, pp. 2146-2154 |
38 | International academic conference8 | 2003/6~2003,06,00,,, | Threshold ring signature scheme based on the curve | Other | Co-author | Proc. of the 2003 IEEE International Symposium on Information Theory | p. 139 |
39 | Papers1 | 2003/5~2003,05,00,,, | Transitive signature scheme for directed trees | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E86-A, no. 5, pp. 1120-1126 |
40 | International academic conference8 | 2002/10~2002,10,00,,, | Digital signature schemes for information disclosure | Other | Co-author | Proc. of the 2002 International Symposium on Information Theory and its Applications | pp. 551-554 |
41 | Papers1 | 2002/6~2002,06,00,,, | Polynomial representation of a visual secret sharing scheme | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E85-A, no. 6, pp. 1379-1386 |
42 | Papers1 | 2002/5~2002,05,00,,, | All-or-nothing transform based on a linear code | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E85-A, no. 5, pp. 1084-1087 |
43 | Papers1 | 2002/1~2002,01,00,,, | Message authentication for stream | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E85-A, no. 1, pp. 190-193 |
44 | Papers1 | 2001/10~2001,10,00,,, | Equivalent keys in RC6-32/20/176 | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E84-A, no. 10, pp. 2474-2481 |
45 | Papers1 | 2001/4~2001,04,00,,, | Improvement on the cheater identifiable threshold scheme | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E84-A, no. 4, pp.957-960 |
46 | International academic conference8 | 2000/11~2000,11,00,,, | Secure digital signature scheme against subliminal channel | Other | Co-author | Proc. of the 2000 International Symposium on Information Theory and its Applications | vol.I, pp. 219-222 |
47 | Papers1 | 2000/1~2000,01,00,,, | New algorithm for finding preimages in a reduced version of the MD4 compression function | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E83-A, no. 1, pp. 97-100 |
48 | Papers1 | 1999/10~1999,10,00,,, | New subliminal channel embedded in the ESIGN | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E82-A, no. 10, pp. 2167-2171 |
49 | Papers1 | 1999/10~1999,10,00,,, | Image size invariant visual cryptography | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E82-A, no. 10, pp. 2172-2177 |
50 | Papers1 | 1999/1~1999,01,00,,, | On the security of the ElGamal-type signature scheme with small parameters | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E82-A, no. 1, pp. 93-97 |
51 | Papers1 | 1998/10~1998,10,00,,, | On the security of the improved knapsack cryptosystem | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E81-A, no. 10, pp. 2184-2185 |
52 | International academic conference8 | 1998/10~1998,10,00,,, | Cryptanalysis with the continued fraction | Other | Co-author | Proc. of the 1998 International Symposium on Information Theory and its Applications | pp. 239-242 |
53 | International academic conference8 | 1998/9~1998,09,00,,, | Fast algorithm for finding a small root of a quadratic modular equation | Other | Co-author | Proc. of the First International Workshop ISW'97, Lecture notes in Computer Science 1396 | pp. 75-81 |
54 | Papers1 | 1997/1~1997,01,00,,, | Improved elliptic curve methods for factoring and their performance | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E80-A, no. 1, pp. 25-33 |
55 | Papers1 | 1996/1~1996,01,00,,, | A new RSA-type scheme based on singular cubic curves (y-α x)(y-βx) = x3 (mod n) | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E79-A, no. 1, pp. 49-53 |
56 | Papers1 | 1995/1~1995,01,00,,, | A new RSA-type scheme based on singular cubic curves y2=x3+bx2 (mod n) | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E78-A, no. 1, pp. 27-33 |
57 | Papers1 | 1994/10~1994,10,00,,, | Security of RSA-type cryptosystems over elliptic curves against Hastad attack | Academic Journal | Co-author | Electronics Letters | vol. 30, no. 22, pp. 1843-1844 |
58 | Papers1 | 1994/8~1994,08,00,,, | Efficient cryptosystems over elliptic curves based on a product of form-free primes | Academic Journal | Co-author | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | vol. E77-A, no. 8, pp. 1309-1318 |
59 | International academic conference8 | 1994/7~1994,07,00,,, | A new RSA-type cryptosystem over singular elliptic curves | Other | Co-author | Proc. of Applications of Finite Fields | pp. 99-109 |
60 | International academic conference8 | 2018/10/28~2018/10/312018,10,28,2018,10,31 | Parallelizable Message Preprocessing for Merkle-Damgard Hash Functions | Academic Journal | Co-author | 2018 International Symposium on Information Theory and Its Applications | |
61 | International academic conference8 | 2018/12/10~2018/12/132018,12,10,2018,12,13 | Secret Sharing Schemes Using Modulo-2^{m} Arithmetic Operations | Academic Journal | Single-Author | The 2018 IEEE Conference on Dependable and Secure Computing | |
62 | International academic conference8 | 2019/12~2019,12,00,,, | Authenticated Encryption Based on Lesamnta-LW Hashing Mode | Academic Journal | Co-author | Information Security and Cryptology - ICISC 2019 | Lecture Notes in Computer Science, vol 11975, pp 52-69 |
63 | Academic presentation7 | 2020/1~2020,01,00,,, | White-Box Symmetric Cipher Using Quantum Memory | Other | Co-author | Proceedings of 2020 Symposium on Cryptography and Information Security | 2B2-4 |
Research reportArtificial Metrics of Electric Devices and Their ApplicationsUnrefereedIn-house publicationCo-authoredKUWAKADO,Hidenori;HORII, Yasushi;KOBAYASHI, Takashi;KAMBARA, Tomoyadevice fingerprint;artificial metrics;physical unclonable functionJOURNAL of INFORMATICSVol. 46, pp.1-222017/7/20~Faculty of Informatics, Kansai UniversityAn Identification of artificial objects is lately receiving much attention for two reasons: the problem of counterfeiting of artificial objects, such as goods that use brand names, in international trade and the necessity of achieving a secure communication in the Internet of Things (IoT), which is a network of artificial objects that are embedded with network connectivity. To identify artificial objects, “fingerprints” of artificial objects, introduced during manufacturing and non-separable characteristics from artificial objects themselves, have to be discovered. This article reports fingerprints for acceleration sensors, flash memory, non-Foster matching circuits and elemental techniques for identifying fingerprints or measuring fingerprints with stability. This article demonstrates an encoding method for recording fingerprints securely in a distributed storage system.
PapersSecure regenerating codes using linear regenerating codes and the all-or-nothing transformIn refereedAcademic JournalCo-authorH. Kuwakado;M. KuriharaIEICE TRANS-ACTIONS on Information and Systemsvol.E100-D, no.3, pp.483–4952017/3~10.1587/transinf.2016EDP7220
International academic conferenceA pseudorandom-function mode based on Lesamnta-lw and the MDP domain extension and its applicationIn refereedCo-authorS. Hirose;H. Kuwakado;H. YoshidaNIST Lightweight Cryptography Workshop 20162016/10~
Magazine articleIn refereedOtherSingle-Author2016/7~
Magazine articleIn refereedOtherSingle-Author2016/6~
PapersIn refereedAcademic JournalCo-author2015/2~
International academic conferenceA collision attack on a double-block-length compression function instantiated with round- reduced AES-256In refereedCo-authorJ. Chen;S. Hirose;H. Kuwakado;A. MiyajiThe 17th International Conference on Information Security and Cryptology (ICISC 2014), Lecture Notes in Computer Sciencevol.8949, pp.271–2852014/12~10.1007/978-3-319-15943-
0 17
International academic conferenceSecure regenerating codes using linear MBR/MSR codes and the all-or-nothing transform
In refereedCo-authorH. Kuwakado;M. KuriharaProceedings of the 2014 International Symposium on Information Theory and its Applications
pp.221–2252014/10~978-4-88552-291-8
International academic conferenceForward-secure sequential aggregate message authentication revisitedIn refereedCo-authorS. Hirose;H. KuwakadoProvable Security, Lecture Notes in Computer Sciencevol.8782, pp.87–1022014~10.1007/978-3-319-12475-9978-3-319-12474-2 (Print), 978-3-319-12475-9 (Online)
International academic conferenceA block-cipher-based hash function using an MMO-type double-block compression functionIn refereedCo-authorS. Hirose;H. KuwakadoProvable Security, Lecture Notes in Computer Sciencevol.8782, pp.71–862014~10.1007/978-3-319-12475-9978-3-319-12474-2 (Print), 978-3-319-12475-9 (Online)
PapersMultilane hashing mode suitable for parallel processingIn refereedAcademic JournalCo-authorH. Kuwakado;S. HiroseIEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciencesvol.E96-A, no.12, pp.2434–24422013/12~10.1587/transfun.E96.A.2434
International academic conferenceHashing mode using a lightweight blockcipherIn refereedCo-authorH. Kuwakado;S. HiroseProceedings of the 14th IMA International Conference on Cryptography and Coding (IMACC 2013), Lecture Notes in Computer Sciencevol.8308, pp.213–2312013/12~10.1007/978-3-642-45239-09783642452390 (online),
9783642452383
International academic conferenceRedactable signature scheme for tree-structured data based on Merkle treeOtherShoichi Hirose;Hidenori KuwakadoProceedings of SECRYPT 2013, 10th International Conference on Security and Cryptography2013/7~
PapersSecure regenerating codes based on MSR codes for distributed storage systemsAcademic JournalCo-authorMasazumi Kurihara;Hidenori KuwakadoIEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer SciencesVol.J96-A No.4 pp.166-1742013/4~
PapersSecure regenerating codes based on Rashmi-Shah-Kumar MBR codesAcademic JournalCo-authorMasazumi Kurihara;Hidenori KuwakadoIEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer SciencesVol.E96-A No.2 pp.635-648,2013/2~10.1587/transfun.E96.A.635
PapersLength-preserving CBC enciphering scheme and its security analysisIn refereedAcademic JournalSingle-AuthorH. KuwakadoIPSJ Journal2012/9~
PapersAn AES based 256-bit hash function for lightweight applications: Lesamnta-LWIn refereedAcademic JournalCo-authorS. Hirose;K. Ideguchi;H. Kuwakado;T. Owada;B. Preneel;H. YoshidaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol.E95-A, no.1, pp.89-992012/1~
PapersCollision resistance of hash functions in a weak ideal cipher modelIn refereedAcademic JournalCo-authorS. Hirose;H. KuwakadoIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol.E95-A, no.1, pp.252-2552012/1~
PapersGeneralized classes of weak keys on RC4 using predictive stateIn refereedAcademic JournalCo-authorR. Teramura;T. Ohigashi;H. Kuwakado;M. MoriiIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol.E94-A, no.1, pp.10-182011/1~
International academic conferenceA Lightweight 256-bit Hash Function for Hardware and Low-end Devices: Lesamnta-LWIn refereedOtherCo-authorS. Hirose;K. Ideguchi;H. Kuwakado;T. Owada;B. Preneel;H. YoshidaProceedings of the 13th Annual International Conference on Information Security and Cryptology, ICISC 2010, Lecture Notes in Computer Sciencevol. 6584, pp.151-1682011~
International academic conferenceCompression functions using a dedicated blockcipher for lightweight hashingIn refereedOtherCo-authorS. Hirose;H. Kuwakado;H. YoshidaPreproceedings of the 14th Annual International Conference on Information Security and Cryptology2011~
PapersFast WEP-key recovery attack using only encrypted IP packetsIn refereedAcademic JournalCo-authorR. Teramura;Y. Asakura;T. Ohigashi;H. Kuwakado;M. MoriiIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol.E93-A, no.1, pp.164-1712010/1~
International academic conferenceQuantum distinguisher between the 3-round Feistel cipher and the random permutationIn refereedOtherCo-authorH. Kuwakado;M. MoriiProceedings of the 2011 IEEE International Symposium on Information Theorypp.2682-26852010~
PapersEfficient pseudorandom-function modes of a block-cipher-based hash functionIn refereedAcademic JournalCo-authorS. Hirose;H. KuwakadoIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E92-A, no. 10, pp. 2447-24532009/10~
PapersIn refereedAcademic JournalCo-author2009/9~
International academic conferenceQuantum analysis of 2,3-round Feistel schemesIn refereedOtherCo-authorH. Kuwakado;M. MoriiProceedings of the 9th Asian Conference on Quantum Information Sciencepp. 39-402009/8~
PapersDifferentiability of four prefix-free PGV hash functionsIn refereedAcademic JournalCo-authorH. Kuwakado;S. HiroseIEICE Electronics Expressvol. 6, no. 13, pp. 955-9582009/7~
PapersA chosen-IV key recovery attack on Py and PyPyIn refereedAcademic JournalCo-authorT. Isobe;T. Ohigashi;H. Kuwakado;M. MoriiIEICE Transactions on Information and Systemsvol. E92-D, no. 1, pp. 32-402009/1~
International academic conferencePseudorandom-function property of the step-reduced compression functions of SHA-256 and SHA-512In refereedOtherCo-authorH. Kuwakado;S. HiroseInformation Security Applications, 9th International Workshop, WISA 2008, Lecture Notes in Computer Sciencevol. 5379, pp. 174-1892009~
PapersCompression functions suitable for the multi-property-preserving transformIn refereedAcademic JournalCo-authorH. Kuwakado;M. MoriiIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E91-A, no. 10, pp. 2851-28592008/10~
International academic conferenceA scheme to base a hash function on a block cipherIn refereedOtherCo-authorS. Hirose;H. KuwakadoPreproceedings of SAC (Selected Areas in Cryptography)pp. 243-2562008~
International academic conferenceMulti-bit revocable network coding scheme for butterfly-like networkIn refereedOtherCo-authorH. Kuwakado;M. MoriiProceedings of the 2008 International Symposium on Information Theory and its Applicationspp. 423-4282008~
PapersIndifferntialbility of single-block-length and rate-1 compression functionsIn refereedAcademic JournalCo-authorH. Kuwakado;M. MoriiIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E90-A, no. 10, pp. 2301-23082007/10~
International academic conferenceHow to break Py and Pypy by a chosen-IV attackIn refereedOtherCo-authorT. Isobe;T. Ohigashi;H. Kuwakado;M. MoriiProc. of SASC 2007, The State of the Art of Stream Cipherspp. 340-3522007/1~
International academic conferenceCollision-controllable hash functionIn refereedOtherCo-authorH. Kuwakado;M. MoriiProc. of the 2006 International Symposium on Information Theory and its Applicationsno. Tue2-2-22006/10~
International academic conferenceVisual cryptographic protocols using the trusted initializerIn refereedOtherCo-authorH. Kuwakado;M. Morii;H. TanakaInformation and Communications Security, 7th International Conference, ICICS 2005, Lecture Notes in Computer Sciencevol. 3783, pp. 112-1222005/12~
PapersSecure length-preserving all-or-nothing transformIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIPSJ Journalvol. 46, no. 8, pp. 1843-18512005/8~
International academic conferenceSignature scheme suitable for related filesIn refereedOtherCo-authorH. Kuwakado;H. TanakaProc. of the 2004 International Symposium on Information Theory and its Applicationspp. 134-1392004/10~
PapersSize-reduced visual secret sharing schemeIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E87-A, no. 5, pp. 1193-11972004/5~
PapersEfficient relative time-stamping scheme based on the ternary linkIn refereedAcademic JournalCo-authorY. Igarashi;H. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E86-A, no. 10, pp. 2552-25592003/10~
PapersThreshold ring signature scheme based on the curveIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIPSJ Journalvol. 44, no. 8, pp. 2146-21542003/8~
International academic conferenceThreshold ring signature scheme based on the curveIn refereedOtherCo-authorH. Kuwakado;H. TanakaProc. of the 2003 IEEE International Symposium on Information Theoryp. 1392003/6~
PapersTransitive signature scheme for directed treesIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E86-A, no. 5, pp. 1120-11262003/5~
International academic conferenceDigital signature schemes for information disclosureIn refereedOtherCo-authorH. Kuwakado;H. TanakaProc. of the 2002 International Symposium on Information Theory and its Applicationspp. 551-5542002/10~
PapersPolynomial representation of a visual secret sharing schemeIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E85-A, no. 6, pp. 1379-13862002/6~
PapersAll-or-nothing transform based on a linear codeIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E85-A, no. 5, pp. 1084-10872002/5~
PapersMessage authentication for streamIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E85-A, no. 1, pp. 190-1932002/1~
PapersEquivalent keys in RC6-32/20/176In refereedAcademic JournalCo-authorH. Mizuno;H. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E84-A, no. 10, pp. 2474-24812001/10~
PapersImprovement on the cheater identifiable threshold schemeIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E84-A, no. 4, pp.957-9602001/4~
International academic conferenceSecure digital signature scheme against subliminal channelIn refereedOtherCo-authorH. Kuwakado;H. TanakaProc. of the 2000 International Symposium on Information Theory and its Applicationsvol.I, pp. 219-2222000/11~
PapersNew algorithm for finding preimages in a reduced version of the MD4 compression functionIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E83-A, no. 1, pp. 97-1002000/1~
PapersNew subliminal channel embedded in the ESIGNIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E82-A, no. 10, pp. 2167-21711999/10~
PapersImage size invariant visual cryptographyIn refereedAcademic JournalCo-authorR. Ito;H. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E82-A, no. 10, pp. 2172-21771999/10~
PapersSingle-Author1999/9~
PapersOn the security of the ElGamal-type signature scheme with small parametersIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E82-A, no. 1, pp. 93-971999/1~
BookMonographCo-authored chapter1998/10~
PapersOn the security of the improved knapsack cryptosystemIn refereedAcademic JournalCo-authorH. Kuwakado;H. TanakaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E81-A, no. 10, pp. 2184-21851998/10~
International academic conferenceCryptanalysis with the continued fractionIn refereedOtherCo-authorH. Kuwakado;H. TanakaProc. of the 1998 International Symposium on Information Theory and its Applicationspp. 239-2421998/10~
International academic conferenceFast algorithm for finding a small root of a quadratic modular equationIn refereedOtherCo-authorH. Kuwakado;H. TanakaProc. of the First International Workshop ISW'97, Lecture notes in Computer Science 1396pp. 75-811998/9~
PapersImproved elliptic curve methods for factoring and their performanceIn refereedAcademic JournalCo-authorH. Kuwakado;K. KoyamaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E80-A, no. 1, pp. 25-331997/1~
PapersA new RSA-type scheme based on singular cubic curves (y-α x)(y-βx) = x3 (mod n)In refereedAcademic JournalCo-authorH. Kuwakado;K. KoyamaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E79-A, no. 1, pp. 49-531996/1~
PapersA new RSA-type scheme based on singular cubic curves y2=x3+bx2 (mod n)In refereedAcademic JournalCo-authorH. Kuwakado;K. Koyama;Y. TsuruokaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E78-A, no. 1, pp. 27-331995/1~
PapersSecurity of RSA-type cryptosystems over elliptic curves against Hastad attackIn refereedAcademic JournalCo-authorH. Kuwakado;K. KoyamaElectronics Lettersvol. 30, no. 22, pp. 1843-18441994/10~
PapersEfficient cryptosystems over elliptic curves based on a product of form-free primesIn refereedAcademic JournalCo-authorH. Kuwakado;K. KoyamaIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciencesvol. E77-A, no. 8, pp. 1309-13181994/8~
International academic conferenceA new RSA-type cryptosystem over singular elliptic curvesIn refereedOtherCo-authorH. Kuwakado;K. KoyamaProc. of Applications of Finite Fieldspp. 99-1091994/7~
PapersIn refereedAcademic JournalCo-authoredHIROSE, Shoichi;KUWAKADO, Hidenori;YOSHIDA, Hirotaka2018/1~
International academic conferenceParallelizable Message Preprocessing for Merkle-Damgard Hash FunctionsIn refereedAcademic JournalCo-authorKUWAKADO,Hidenori;HIROSE,Shoichi;MAMBO,Masahiro2018 International Symposium on Information Theory and Its Applications2018/10/28~2018/10/31Since well-known hash functions sequentially process a message, the time for computing a digest strongly depends on the performance of a single processor. Even if multi-core processors are available, it is difficult to reduce the time. This paper focuses on designing a message preprocessing that can fully utilize multi-core processors. Since our message preprocessing can be efficiently computed by massively parallel processing, it contributes to reduce the time for computing a digest. The experiments using graphics processing units show that our message preprocessing improves the throughput for computing a digest.
International academic conferenceSecret Sharing Schemes Using Modulo-2^{m} Arithmetic OperationsIn refereedAcademic JournalSingle-AuthorKUWAKADO,HidenoriThe 2018 IEEE Conference on Dependable and Secure Computing2018/12/10~2018/12/13Cloud services using secret sharing schemes have been launched recently. Since secret sharing schemes have been usually achieved over a finite field, the throughput for sharing and reconstructing a secret depends on the implementation of finite field operations. However, almost all the CPUs do not support finite-field operations as primary instructions. We study k-outof-n secret sharing schemes using the linear transform over Z_{2^m}. The advantage of the linear transform over Z_{2^m} is that almost all the CPUs support a modulo-2^m addition, a modulo-2^m subtraction, and a modulo-2^m multiplication as primary instructions. We show the conditions of an encoding matrix to achieve the k-out-of-n secret sharing scheme based on the linear transform over Z_{2^m}. The conditions suggest that the k-out-of-n secret sharing scheme over Z_{2^m} is non-ideal. We also show the maximum size of a secret if the Vandermonde matrix whose all the elements are a power of two is used as the encoding matrix.
PapersIn refereedAcademic JournalCo-authoredKUWAKADO,Hidenori;Shoichi Hirose;Masahiro Mambo2018/10~
PapersIn refereedAcademic JournalSingle-AuthorKUWAKADO,Hidenori2018/12~10.1109/DESEC.2018.8625126
International academic conferenceAuthenticated Encryption Based on Lesamnta-LW Hashing ModeIn refereedAcademic JournalCo-authorShoichi Hirose;Hidenori Kuwakado;Hirotaka YoshidaInformation Security and Cryptology - ICISC 2019Lecture Notes in Computer Science, vol 11975, pp 52-692019/12~
Academic presentationWhite-Box Symmetric Cipher Using Quantum MemoryUnrefereedOtherCo-authorHidenori Kuwakado;Shoichi Hirose;Masahiro MamboProceedings of 2020 Symposium on Cryptography and Information Security2B2-42020/1~
- Personal Information
- Research Activities
- Research Activities
- Community Service
- Courses Taught