Folgen
Toshihiro Ohigashi
Toshihiro Ohigashi
Bestätigte E-Mail-Adresse bei tsc.u-tokai.ac.jp
Titel
Zitiert von
Zitiert von
Jahr
A practical message falsification attack on WPA
T Ohigashi, M Morii
Proc. JWIS 54, 66, 2009
852009
Full plaintext recovery attack on broadcast RC4
T Isobe, T Ohigashi, Y Watanabe, M Morii
International Workshop on Fast Software Encryption, 179-202, 2013
782013
A performance improvement method for the global live migration of virtual machine with IP mobility
H Watanabe, T Ohigashi, T Kondo, K Nishimura, R Aibara
Proceedings of the Fifth International Conference on Mobile Computing and …, 2010
372010
How to recover any byte of plaintext on RC4
T Ohigashi, T Isobe, Y Watanabe, M Morii
International Conference on Selected Areas in Cryptography, 155-173, 2013
282013
Falsification attacks against WPA-TKIP in a realistic environment
Y Todo, Y Ozawa, T Ohigashi, M Morii
IEICE TRANSACTIONS on Information and Systems 95 (2), 588-595, 2012
252012
An improved internal-state reconstruction method of a stream cipher RC4
Y Shiraishi, T Ohigashi, M Morii
Communication, Network, and Information Security, Track, 440-088, 2003
172003
Fast WEP-key recovery attack using only encrypted IP packets
R Teramura, Y Asakura, T Ohigashi, H Kuwakado, M Morii
IEICE transactions on fundamentals of electronics, communications and …, 2010
152010
How to Break Py and Pypy by a Chosen-IV Attack
T Isobe, T Ohigashi, HKM Morii
eSTREAM, ECRYPT Stream Cipher Project, Report 60 (1), 3, 2006
142006
A generic construction of integrated secure-channel free PEKS and PKE and its application to EMRs in cloud storage
T Suzuki, K Emura, T Ohigashi
Journal of medical systems 43 (5), 1-15, 2019
112019
Slide cryptanalysis of lightweight stream cipher rakaposhi
T Isobe, T Ohigashi, M Morii
International Workshop on Security, 138-155, 2012
112012
New weakness in the key-scheduling algorithm of RC4
T Ohigashi, Y Shiraishi, M Morii
IEICE transactions on fundamentals of electronics, communications and …, 2008
102008
Implementation of a strongly robust identity-based encryption scheme over type-3 pairings
H Okano, K Emura, T Ishibashi, T Ohigashi, T Suzuki
International Journal of Networking and Computing 10 (2), 174-188, 2020
92020
Development of the edge computing platform based on functional modulation architecture
T Kondo, H Watanabe, T Ohigashi
2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC …, 2017
92017
Full plaintext recovery attacks on RC4 using multiple biases
T Ohigashi, T Isobe, Y Watanabe, M Morii
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
92015
FMS attack-resistant WEP implementation is still broken
T Ohigashi, Y Shiraishi, M Morii
International Conference on Computational and Information Science, 17-26, 2005
92005
Most IVs of FMS attack-resistant WEP implementation leak secret key information
T Ohigashi
Proc. of SCIS2005 4, 1957-1962, 2005
92005
A Key recovery attack on WEP with less packets
T Ohigashi, H Kuwakado, M Morii
IEICE Technical Report; IEICE Tech. Rep. 107 (346), 61-68, 2007
82007
A generic construction of integrated secure-channel free PEKS and PKE
T Suzuki, K Emura, T Ohigashi
International Conference on Information Security Practice and Experience, 69-86, 2018
72018
Some proofs of joint distributions of keystream biases in RC4
S Jha, S Banik, T Isobe, T Ohigashi
International Conference on Cryptology in India, 305-321, 2016
72016
Breaking WEP with Any 104-bit Keys-All WEP Keys Can Be Recovered Using IP Packets Only
R Teramura
Proc. of SCIS2009, Jan., 2009
72009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20