Toshihiro Ohigashi

Orcid: 0000-0002-6628-8452

According to our database1, Toshihiro Ohigashi authored at least 40 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On the Effects of Neural Network-based Output Prediction Attacks on the Design of Symmetric-key Ciphers.
IACR Cryptol. ePrint Arch., 2024

2023
Editor's Message to Special Issue of Computer Security Technologies for Secure Cyberspace.
J. Inf. Process., 2023

A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers.
J. Inf. Process., 2023

Development of the Edge Computing Platform based on Modular Architecture using Intel SGX.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
Unbounded Revocable Decentralized Multi-Authority Attribute-Based Encryption Supporting Non-monotone Access Structures.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2022

Output Prediction Attacks on Block Ciphers Using Deep Learning.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Detecting Fake QR Codes Using Information from Error-Correction.
J. Inf. Process., 2021

Output Prediction Attacks on SPN Block Ciphers using Deep Learning.
IACR Cryptol. ePrint Arch., 2021

Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

2020
Secure-channel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation.
J. Comput. Syst. Sci., 2020

Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings.
Int. J. Netw. Comput., 2020

Verifiable Functional Encryption using Intel SGX.
IACR Cryptol. ePrint Arch., 2020

2019
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage.
J. Medical Syst., 2019

Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations.
Comput. J., 2019

Implementation of Platform Controller and Process Modules of the Edge Computing for IoT Platform.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Development of the Edge Computing Platform with Dynamic Modular Configuration for an IoT Platform.
Proceedings of the IEEE Pacific Rim Conference on Communications, 2019

Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

Password Strength Measurement without Password Disclosure.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Theoretical Understanding of Some Conditional and Joint Biases in RC4 Stream Cipher.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

A Generic Construction of Integrated Secure-Channel Free PEKS and PKE.
Proceedings of the Information Security Practice and Experience, 2018

2017
How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Development of the Edge Computing Platform Based on Functional Modulation Architecture.
Proceedings of the 41st IEEE Annual Computer Software and Applications Conference, 2017

2016
Some Proofs of Joint Distributions of Keystream Biases in RC4.
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016

2015
Full Plaintext Recovery Attacks on RC4 Using Multiple Biases.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2014
Expanding Weak-key Space of RC4.
J. Inf. Process., 2014

Comprehensive Analysis of Initial Keystream Biases of RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage Services.
Proceedings of the IEEE 38th Annual Computer Software and Applications Conference, 2014

2013
Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack.
J. Inf. Process., 2013

How to Recover Any Byte of Plaintext on RC4.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Full Plaintext Recovery Attack on Broadcast RC4.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Falsification Attacks against WPA-TKIP in a Realistic Environment.
IEICE Trans. Inf. Syst., 2012

Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI.
Proceedings of the Advances in Information and Computer Security, 2012

2011
Generalized Classes of Weak Keys on RC4 Using Predictive State.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

2010
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Supporting USB Devices for the Global Migration.
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

2009
A Chosen-IV Key Recovery Attack on Py and Pypy.
IEICE Trans. Inf. Syst., 2009

2008
New Weakness in the Key-Scheduling Algorithm of RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

A Chosen IV Attack Using Phase Shifting Equivalent Keys against DECIM v2.
IACR Cryptol. ePrint Arch., 2008

2005
FMS Attack-Resistant WEP Implementation Is Still Broken.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2003
Internal-State Reconstruction of a Stream Cipher RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003


  Loading...