Soichi Furuya, ``A Study on Design and Security Analysis
of Modes of Operation for Symmetric-key Cryptography,''
九州大学大学院システム情報科学研究科博士論文, 2004,
論文要旨(html,
ps(59KB),
pdf(24KB)).
Soichi Furuya, ``Improving Linear Cryptanalysis Using Probabilistic Counting Method,'' 九州大学大学院システム情報科学研究科修士論文, 1997.
Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi,
and Bart Preneel,
``A New Keystream Generator MUGI,''
IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences,
vol.~E87-A no.~1, pp.~37--45, 2004.
Soichi Furuya, Dai Watanabe, Yoichi Seto, Kazuo Takaragi,
``Integrity-Aware Mode of Stream Cipher,'' IEICE Transactions on
Fundamentals of Electronics, Communications and Computer Sciences,
vol.E85-A no.1, pp.58-65, 2002.
Makoto Aikawa, Kazuo Takaragi, Soichi Furuya, and Manabu
Sasamoto, ``A lightweight Encryption Method Suitable for Copyright
Protection,'' IEEE Trans. on Consumer Electronics vol.44, no.3,
pp.902-910, 1998, also appears in The International Conference on
Consumer Electronics.
国際講演予稿(査読あり)
Dai Watanabe and Soichi Furuya,
``A MAC forgery attack on SOBER-128,''
presented at Fast Software Encryption Workshop 2004,
February 2004, Delhi, India.
Soichi Furuya, Kouichi Sakurai, ``Risks with Raw-key Masking
the Security Evaluation of 2-key XCBC,'' Information and Communications
Security, 4th International Conference, ICICS 2002, Singapore, December
2002, Proceedings, ed. R. Deng, S. Qing, F. Bao, and J. Zhou,
pp.327-341, Lecture Notes in Computer Science vol.2513,
Springer-Verlag, 2002.
R. C.-W. Phan and S. Furuya, ``Sliding Properties of the DES
Key Schedule and Potential Extensions to the Slide Attacks,''
Information Security and Cryptology -- ICISC 2002, 5th International
Conference, Seoul, Korea, November 2002, Revised Papers, ed. P.J. Lee
and C.H. Lim, pp.138-148, LNCS vol.2587, Springer-Verlag, 2003.
Soichi Furuya, Kouichi Sakurai, ``Single-path
Authenticated-encryption Scheme Based on Universal Hashing,'' in
Selected Areas in Cryptography, 9th Annual Workshop, SAC 2002, St.
John's, Newfoundland, Canada, Aug. 2002, Revised Papers, ed. K.Nyberg
and H. Heys, pp.94-109, Lecture Notes in Computer Science vol.2595,
Springer-Verlag, 2002.
Dai Watanabe, Soichi Furuya, Kazuo Takaragi, Bart Preneel,
``A New Keystream Generator MUGI,'' Fast Software Encryption, 9th
International Workshop, FSE2002, Leuven, Belgium, February 4-6, 2002,
Revised Papers, ed. J. Daemen and V. Rijmen, pp.179-194, Lecture Notes
in Computer Science vol.2365, Springer-Verlag, 2002.
Soichi Furuya, ``Slide attacks with a known-plaintext
cryptanalysis,'' in Information Security and Cryptology -- ICISC 2001,
4th International Conference, Seoul, Korea, Dec. 2001, Proceedings, ed.
K. Kim, pp.214-225, Lecture Notes in Computer Science vol.2288,
Springer-Verlag, 2002.
Soichi Furuya and Vincent Rijmen, ``Observations on
Hierocrypt-3/L1 Key-scheduling Algorithms,'' Proceedingds of the second
open NESSIE Workshop, 2001.
Kouichi Sakurai, Souichi Furuya, ``Improving linear cryptanalysis
of LOKI91 by probabilistic counting method,'' in Fast Software
Encryption, 4th International Workshop, FSE'97, Haifa, Israel, January
20-22, 1997, Proceedings, ed. E. Biham, pp.114-133, Lecture Notes in
Computer Science vol.1267, Springer-Verlag, 1998.