Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,206,836 papers from all fields of science
Search
Sign In
Create Free Account
CRYPTREC
Known as:
Cryptography Research and Evaluation Committees
CRYPTREC is the Cryptography Research and Evaluation Committees set up by the Japanese Government to evaluate and recommend cryptographic techniques…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
Advanced Encryption Standard process
Block cipher mode of operation
CBC-MAC
CLEFIA
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Security Evaluation of SHA-3 Report prepared for the CRYPTREC Project
Itai Dinur
2015
Corpus ID: 43502509
Draft FIPS PUB 202 [32] speci es the Secure Hash Algorithm-3 (SHA-3) family of functions. The SHA-3 functions are based on…
Expand
2011
2011
High-Performance Symmetric Block Ciphers on CUDA
Naoki Nishikawa
,
Keisuke Iwai
,
T. Kurokawa
Second International Conference on Networking and…
2011
Corpus ID: 18601821
From almost all research fields, GPU has been noticed as hardware with high cost-performance. Consequently, implementation of…
Expand
2010
2010
How to Evaluate the Security of Real-Life Cryptographic Protocols? - The Cases of ISO/IEC 29128 and CRYPTREC
Shin'ichiro Matsuo
,
K. Miyazaki
,
Akira Otsuka
,
D. Basin
Financial Cryptography Workshops
2010
Corpus ID: 17767326
Governments and international standards bodies have established certification procedures for security-critical technologies, such…
Expand
2009
2009
Higher Order Differential Attacks on Reduced-Round MISTY1
Y. Tsunoo
,
Teruo Saito
,
Maki Shigeri
,
Takeshi Kawabata
International Conference on Information Security…
2009
Corpus ID: 43571380
MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the…
Expand
2004
2004
A Weakness of the Linear Part of Stream Cipher MUGI
J. Golic
Fast Software Encryption Workshop
2004
Corpus ID: 2778402
The linearly updated component of the stream cipher MUGI, called the buffer, is analyzed theoretically by using the generating…
Expand
2004
2004
The Role of Antimonopoly Committees in the Former Soviet Union
Thomas A. Timberg
2004
Corpus ID: 40105268
ne of the characteristics of the economies in transition from communism has been the creation of antimonopoly committees (AMCs…
Expand
2003
2003
A reject timing attack on an IND-CCA2 public-key cryptosystem
K. Sakurai
,
T. Takagi
2003
Corpus ID: 15376574
EPOC-2 is a public-key cryptosystem that can be proved IND-CCA2 under the factoring assumption in the random oracle model. It was…
Expand
2002
2002
The NESSIE Project: Towards New Cryptographic Algorithms
B. Preneel
2002
Corpus ID: 537431
In spite of more than 25 years of open research on crypto- graphic algorithms, many applications still use insecure cryptography…
Expand
2002
2002
Evaluation of Security Level of Cryptography: RSA Signature Schemes (PKCS#1 v1.5, ANSI X9.31, ISO 9796)
A. Menezes
2002
Corpus ID: 60328878
2000
2000
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government
H. Imai
,
A. Yamagishi
International Conference on the Theory and…
2000
Corpus ID: 31866019
We will describe the outline of the cryptographic technology evaluation project in Japan and those present conditions. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE