Japanese page

This page will not be maintained any longer after April 2004.


Soichi

Soichi Furuya

Ex-doctoral student at Sakurai laboratory (from 2001 to 2004).

E-mail: ctc


Publications (only English ones)

Full papers
For Journals, transactions, proceedings
  1. Dai Watanabe and Soichi Furuya, ``A MAC forgery attack on SOBER-128,'' presented at Fast Software Encryption Workshop 2004, February 2004, Delhi, India.
  2. Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, and Bart Preneel, ``A New Keystream Generator MUGI,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.~E87-A no.~1, pp.~37--45, 2004.
  3. Soichi Furuya, Kouichi Sakurai, ``Risks with Raw-key Masking the Security Evaluation of 2-key XCBC,'' Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 2002, Proceedings, ed. R. Deng, S. Qing, F. Bao, and J. Zhou, pp.327-341, Lecture Notes in Computer Science vol.2513, Springer-Verlag, 2002.
  4. R. C.-W. Phan and S. Furuya, ``Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks,'' Information Security and Cryptology -- ICISC 2002, 5th International Conference, Seoul, Korea, November 2002, Revised Papers, ed. P.J. Lee and C.H. Lim, pp.138-148, LNCS vol.2587, Springer-Verlag, 2003.
  5. Soichi Furuya, Kouichi Sakurai, ``Single-path Authenticated-encryption Scheme Based on Universal Hashing,'' in Selected Areas in Cryptography, 9th Annual Workshop, SAC 2002, St. John's, Newfoundland, Canada, Aug. 2002, Revised Papers, ed. K.Nyberg and H. Heys, pp.94-109, Lecture Notes in Computer Science vol.2595, Springer-Verlag, 2002.
  6. Soichi Furuya, Dai Watanabe, Yoichi Seto, Kazuo Takaragi, ``Integrity-Aware Mode of Stream Cipher,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E85-A no.1, pp.58-65, 2002.
  7. Dai Watanabe, Soichi Furuya, Kazuo Takaragi, Bart Preneel, ``A New Keystream Generator MUGI,'' Fast Software Encryption, 9th International Workshop, FSE2002, Leuven, Belgium, February 4-6, 2002, Revised Papers, ed. J. Daemen and V. Rijmen, pp.179-194, Lecture Notes in Computer Science vol.2365, Springer-Verlag, 2002.
  8. Soichi Furuya, ``Slide attacks with a known-plaintext cryptanalysis,'' in Information Security and Cryptology -- ICISC 2001, 4th International Conference, Seoul, Korea, Dec. 2001, Proceedings, ed. K. Kim, pp.214-225, Lecture Notes in Computer Science vol.2288, Springer-Verlag, 2002.
  9. Soichi Furuya and Vincent Rijmen, ``Observations on Hierocrypt-3/L1 Key-scheduling Algorithms,'' Proceedingds of the second open NESSIE Workshop, 2001.
  10. Makoto Aikawa, Kazuo Takaragi, Soichi Furuya, and Manabu Sasamoto, ``A lightweight Encryption Method Suitable for Copyright Protection,'' IEEE Trans. on Consumer Electronics vol.44, no.3, pp.902-910, 1998, also appears in The International Conference on Consumer Electronics.
  11. Kouichi Sakurai, Souichi Furuya, ``Improving linear cryptanalysis of LOKI91 by probabilistic counting method,'' in Fast Software Encryption, 4th International Workshop, FSE'97, Haifa, Israel, January 20-22, 1997, Proceedings, ed. E. Biham, pp.114-133, Lecture Notes in Computer Science vol.1267, Springer-Verlag, 1998.