• Publications
  • Influence
Bit-Based Division Property and Application to Simon Family
TLDR
A bit-based division property is introduced and applied to the Simoni¾?family and it is shown that Simon48, 64, 96, and 128 probably do not have 17-, 20-, 25-, and 29-round integral characteristics, respectively.
Security on the quantum-type Even-Mansour cipher
  • H. Kuwakado, M. Morii
  • Computer Science, Mathematics
    International Symposium on Information Theory and…
  • 1 October 2012
TLDR
It is shown that the quantum version of the Even-Mansour cipher is insecure, that is, a key can be found in polynomial time in the key length, an example that the Quantum version of a secure classical cipher is not always secure.
Quantum distinguisher between the 3-round Feistel cipher and the random permutation
  • H. Kuwakado, M. Morii
  • Computer Science, Mathematics
    IEEE International Symposium on Information…
  • 13 June 2010
TLDR
The 3-round Feistel cipher with internal permutations may be insecure against a chosen plaintext attack on a quantum computer because there exists a polynomial quantum algorithm for distinguishing them.
Full Plaintext Recovery Attack on Broadcast RC4
TLDR
Several new biases in the initial (1st to 257th) bytes of the RC4 keystream, which are substantially stronger than known biases are introduced, which enable a plaintext recovery attack using a strong bias set of initial bytes.
Efficient bit-serial multiplication and the discrete-time Wiener-Hopf equation over finite fields
TLDR
It is shown that solving the DTWHE is equivalent to performing division over finite fields, and the proof provides a new interpretation of the relationship between bit- serial multiplication and DTWHEs that enables bit-serial multiplication over GF(2/sup m/) to be understood more easily.
Falsification Attacks against WPA-TKIP in a Realistic Environment
TLDR
Two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPATKIP) are proposed, one of which reduces the execution time for recovering a MIC key and the other expands its targets that can be attacked.
A Practical Message Falsification Attack on WPA
TLDR
This paper applies the Beck-Tews attack to the man-in-the-middle attack, and gives methods for reducing the execution time of the attack.
Generalized key-equation of remainder decoding algorithm for Reed-Solomon codes
TLDR
A key equation of the remainder decoding algorithm is presented and it is shown that several key equations proposed by L. Welch and E.R. Berlekamp and others can be derived from the proposed key equation.
On the systematic generation of Tardos’s fingerprinting codes
TLDR
A concrete and systematic construction of the Tardospsilas fingerprinting code using a chaotic map is presented and a hierarchical structure is introduced on the codewords for the reduction of computational costs required for the detection.
How to Break Py and Pypy by a Chosen-IV Attack
TLDR
A key recovery attack that has two new effective processes as compared to those of Wu and Preneel is proposed that can recover the 128-bit key with a time complexity of 2.
...
...