2008 |
18 | EE | Hidenori Kuwakado,
Shoichi Hirose:
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512.
WISA 2008: 174-189 |
17 | EE | Shoichi Hirose:
Security Analysis of DRBG Using HMAC in NIST SP 800-90.
WISA 2008: 278-291 |
16 | EE | Shoichi Hirose:
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack.
IEICE Transactions 91-A(1): 74-82 (2008) |
2007 |
15 | EE | Shoichi Hirose,
Je Hong Park,
Aaram Yun:
A Simple Variant of the Merkle-Damgård Scheme with a Permutation.
ASIACRYPT 2007: 113-129 |
2006 |
14 | EE | Shoichi Hirose:
Some Plausible Constructions of Double-Block-Length Hash Functions.
FSE 2006: 210-225 |
13 | EE | Shoichi Hirose:
A Security Analysis of Double-Block-Length Hash Functions with the Rate 1.
IEICE Transactions 89-A(10): 2575-2582 (2006) |
2005 |
12 | EE | Shoichi Hirose:
Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability.
IEICE Transactions 88-A(1): 33-38 (2005) |
11 | EE | Mitsuhiro Hattori,
Shoichi Hirose,
Susumu Yoshida:
Complexity of Differential Attacks on SHA-0 with Various Message Schedules.
IEICE Transactions 88-A(12): 3668-3671 (2005) |
10 | EE | Kazuto Yano,
Shoichi Hirose,
Susumu Yoshida:
Cancellation Moderating Factor Control for DS-CDMA Non-linear Interference Canceller with Antenna Diversity Reception.
IEICE Transactions 88-A(7): 1921-1930 (2005) |
2004 |
9 | EE | Shoichi Hirose:
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model.
ICISC 2004: 330-342 |
8 | EE | Shoichi Hirose,
Susumu Yoshida:
An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt.
IEICE Transactions 87-A(1): 280-281 (2004) |
2003 |
7 | EE | Shoichi Hirose:
Yet Another Definition of Weak Collision Resistance and Its Analysis.
ICISC 2003: 87-96 |
6 | EE | Mitsuhiro Hattori,
Shoichi Hirose,
Susumu Yoshida:
Analysis of Double Block Length Hash Functions.
IMA Int. Conf. 2003: 290-302 |
2002 |
5 | EE | Shoichi Hirose:
Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model.
Selected Areas in Cryptography 2002: 339-352 |
2001 |
4 | EE | Shoichi Hirose,
Susumu Yoshida:
A User Authentication Scheme with Identity and Location Privacy.
ACISP 2001: 235-246 |
1999 |
3 | | Shoichi Hirose,
Kanta Matsuura:
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack.
ICICS 1999: 169-182 |
1998 |
2 | EE | Shoichi Hirose,
Susumu Yoshida:
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks.
Public Key Cryptography 1998: 135-148 |
1997 |
1 | EE | Shoichi Hirose,
Katsuo Ikeda:
A Conference Key Distribution System for the Star Configuration Based on the Discrete Logarithm Problem.
Inf. Process. Lett. 62(4): 189-192 (1997) |