default search action
Toshihiro Ohigashi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i5]Hayato Watanabe, Ryoma Ito, Toshihiro Ohigashi:
On the Effects of Neural Network-based Output Prediction Attacks on the Design of Symmetric-key Ciphers. IACR Cryptol. ePrint Arch. 2024: 1310 (2024) - 2023
- [j20]Toshihiro Ohigashi:
Editor's Message to Special Issue of Computer Security Technologies for Secure Cyberspace. J. Inf. Process. 31: 522 (2023) - [j19]Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi:
A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers. J. Inf. Process. 31: 550-561 (2023) - [c19]Yuma Nishihira, Takuya Ishibashi, Yoshio Kakizaki, Toshihiro Ohigashi, Hidenobu Watanabe, Tohru Kondo, Reiji Aibara:
Development of the Edge Computing Platform based on Modular Architecture using Intel SGX. AsiaJCIS 2023: 59-65 - 2022
- [c18]Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi:
Output Prediction Attacks on Block Ciphers Using Deep Learning. ACNS Workshops 2022: 248-276 - [c17]Takuya Ishibashi, Toshihiro Ohigashi, Hikaru Tsuchida:
Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-monotone Access Structures. SecITC 2022: 320-339 - 2021
- [j18]Toshihiro Ohigashi, Shuya Kawaguchi, Kai Kobayashi, Hayato Kimura, Tatsuya Suzuki, Daichi Okabe, Takuya Ishibashi, Hiroshi Yamamoto, Maki Inui, Ryo Miyamoto, Kazuyoshi Furukawa, Tetsuya Izu:
Detecting Fake QR Codes Using Information from Error-Correction. J. Inf. Process. 29: 548-558 (2021) - [c16]Shuntaro Ema, Yuta Sato, Keita Emura, Toshihiro Ohigashi:
Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC. CANDAR (Workshops) 2021: 320-325 - [c15]Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote:
Verifiable Functional Encryption Using Intel SGX. ProvSec 2021: 215-240 - [i4]Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi:
Output Prediction Attacks on SPN Block Ciphers using Deep Learning. IACR Cryptol. ePrint Arch. 2021: 401 (2021) - 2020
- [j17]Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki:
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings. Int. J. Netw. Comput. 10(2): 174-188 (2020) - [j16]Keita Emura, Katsuhiko Ito, Toshihiro Ohigashi:
Secure-channel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation. J. Comput. Syst. Sci. 114: 107-125 (2020) - [i3]Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi, Kazumasa Omote:
Verifiable Functional Encryption using Intel SGX. IACR Cryptol. ePrint Arch. 2020: 1221 (2020)
2010 – 2019
- 2019
- [j15]Keita Emura, Hayato Kimura, Toshihiro Ohigashi, Tatsuya Suzuki:
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations. Comput. J. 62(4): 614-630 (2019) - [j14]Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi:
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage. J. Medical Syst. 43(5): 128:1-128:15 (2019) - [c14]Taku Sugai, Toshihiro Ohigashi, Yoshio Kakizaki, Akira Kanaoka:
Password Strength Measurement without Password Disclosure. AsiaJCIS 2019: 157-164 - [c13]Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki:
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings. CANDAR 2019: 191-196 - [c12]Hayato Kimura, Takanori Isobe, Toshihiro Ohigashi:
Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers. CANDAR Workshops 2019: 333-338 - [c11]Tohru Kondo, Hidenobu Watanabe, Kai Kobayashi, Hayato Kimura, Toshihiro Ohigashi:
Development of the Edge Computing Platform with Dynamic Modular Configuration for an IoT Platform. PACRIM 2019: 1-6 - [c10]Hidenobu Watanabe, Tohru Kondo, Toshihiro Ohigashi:
Implementation of Platform Controller and Process Modules of the Edge Computing for IoT Platform. PerCom Workshops 2019: 407-410 - [i2]Hiroshi Okano, Keita Emura, Takuya Ishibashi, Toshihiro Ohigashi, Tatsuya Suzuki:
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings. IACR Cryptol. ePrint Arch. 2019: 1485 (2019) - 2018
- [j13]Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi, Santanu Sarkar:
Theoretical Understanding of Some Conditional and Joint Biases in RC4 Stream Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(11): 1869-1879 (2018) - [c9]Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi:
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE. ISPEC 2018: 69-86 - 2017
- [j12]Yuhei Watanabe, Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii:
How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(3): 803-810 (2017) - [c8]Tohru Kondo, Hidenobu Watanabe, Toshihiro Ohigashi:
Development of the Edge Computing Platform Based on Functional Modulation Architecture. COMPSAC (2) 2017: 284-285 - 2016
- [c7]Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi:
Some Proofs of Joint Distributions of Keystream Biases in RC4. INDOCRYPT 2016: 305-321 - 2015
- [j11]Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii:
Full Plaintext Recovery Attacks on RC4 Using Multiple Biases. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 81-91 (2015) - 2014
- [j10]Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii:
Comprehensive Analysis of Initial Keystream Biases of RC4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 139-151 (2014) - [j9]Atsushi Nagao, Toshihiro Ohigashi, Takanori Isobe, Masakatu Morii:
Expanding Weak-key Space of RC4. J. Inf. Process. 22(2): 357-365 (2014) - [c6]Toshihiro Ohigashi, Kouji Nishimura, Reiji Aibara, Kouta Yoshida:
Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage Services. COMPSAC Workshops 2014: 78-83 - 2013
- [j8]Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii:
Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack. Inf. Media Technol. 8(4): 987-994 (2013) - [j7]Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii:
Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack. J. Inf. Process. 21(4): 599-606 (2013) - [c5]Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii:
Full Plaintext Recovery Attack on Broadcast RC4. FSE 2013: 179-202 - [c4]Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii:
How to Recover Any Byte of Plaintext on RC4. Selected Areas in Cryptography 2013: 155-173 - 2012
- [j6]Yosuke Todo, Yuki Ozawa, Toshihiro Ohigashi, Masakatu Morii:
Falsification Attacks against WPA-TKIP in a Realistic Environment. IEICE Trans. Inf. Syst. 95-D(2): 588-595 (2012) - [c3]Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii:
Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI. IWSEC 2012: 138-155 - 2011
- [j5]Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii:
Generalized Classes of Weak Keys on RC4 Using Predictive State. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 10-18 (2011) - 2010
- [j4]Ryoichi Teramura, Yasuo Asakura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii:
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 164-171 (2010) - [c2]Hidenobu Watanabe, Hajime Masaoka, Toshihiro Ohigashi, Tohru Kondo, Kouji Nishimura, Reiji Aibara:
Supporting USB Devices for the Global Migration. SAINT 2010: 153-156
2000 – 2009
- 2009
- [j3]Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii:
A Chosen-IV Key Recovery Attack on Py and Pypy. IEICE Trans. Inf. Syst. 92-D(1): 32-40 (2009) - 2008
- [j2]Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii:
New Weakness in the Key-Scheduling Algorithm of RC4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 3-11 (2008) - [i1]Hidehiko Nakagami, Ryoichi Teramura, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii:
A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2. IACR Cryptol. ePrint Arch. 2008: 128 (2008) - 2005
- [c1]Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii:
FMS Attack-Resistant WEP Implementation Is Still Broken. CIS (2) 2005: 17-26 - 2003
- [j1]Yoshiaki Shiraishi, Toshihiro Ohigashi, Masakatu Morii:
Internal-State Reconstruction of a Stream Cipher RC4. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(10): 2636-2638 (2003)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint